期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
A Link Analysis Algorithm for Identification of Key Hidden Services
1
作者 Abdullah Alharbi Mohd Faizan +5 位作者 Wael Alosaimi Hashem Alyami Mohd Nadeem Suhel Ahmad Khan Alka Agrawal Raees Ahmad Khan 《Computers, Materials & Continua》 SCIE EI 2021年第7期877-886,共10页
The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities.The network has ... The Tor dark web network has been reported to provide a breeding ground for criminals and fraudsters who are exploiting the vulnerabilities in the network to carry out illicit and unethical activities.The network has unfortunately become a means to perpetuate crimes like illegal drugs and firearm trafficking,violence and terrorist activities among others.The government and law enforcement agencies are working relentlessly to control the misuse of Tor network.This is a study in the similar league,with an attempt to suggest a link-based ranking technique to rank and identify the influential hidden services in the Tor dark web.The proposed method considers the extent of connectivity to the surface web services and values of the centrality metrics of a hidden service in the web graph for ranking.The modified PageRank algorithm is used to obtain the overall rankings of the hidden services in the dataset.Several graph metrics were used to evaluate the effectiveness of the proposed technique with other commonly known ranking procedures in literature.The proposed ranking technique is shown to produce good results in identifying the influential domains in the tor network. 展开更多
关键词 Dark web Tor hidden services RANKING link analysis
下载PDF
Using Link Analysis Technique with a Modified Shortest-Path Algorithm to Fight Money Laundering
2
作者 CHEN Yunkai MAI Quanwe LU Zhengding 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1352-1356,共5页
Effective link analysis techniques are needed to help law enforcement and intelligence agencies fight money laundering. This paper presents a link analysis technique that uses a modified shortest-path algorithms to id... Effective link analysis techniques are needed to help law enforcement and intelligence agencies fight money laundering. This paper presents a link analysis technique that uses a modified shortest-path algorithms to identify the strongest association paths between entities in a money laundering network. Based on two-tree Dijkstra and Priority'First-Search (PFS) algorithm, a modified algorithm is presented. To apply the algorithm, a network representation transformation is made first. 展开更多
关键词 link analysis shortest-path algorithm fight money laundering
下载PDF
A select link analysis method based on logit–weibit hybrid model
3
作者 Pengjie Liu Xiangdong Xu +2 位作者 Anthony Chen Chao Yang Longwen Xiao 《Journal of Modern Transportation》 2017年第4期205-217,共13页
Select link analysis provides information of where traffic comes from and goes to at selected links.This disaggregate information has wide applications in practice.The state-of-the-art planning software packages often... Select link analysis provides information of where traffic comes from and goes to at selected links.This disaggregate information has wide applications in practice.The state-of-the-art planning software packages often adopt the user equilibrium(UE) model for select link analysis.However,empirical studies have repeatedly revealed that the stochastic user equilibrium model more accurately predicts observed mean and variance of choices than the UE model.This paper proposes an alternative select link analysis method by making use of the recently developed logit–weibit hybrid model,to alleviate the drawbacks of both logit and weibit models while keeping a closed-form route choice probability expression.To enhance the applicability in large-scale networks,Bell’s stochastic loading method originally developed for logit model is adapted to the hybrid model.The features of the proposed method are twofold:(1) unique O–D-specific link flow pattern and more plausible behavioral realism attributed to the hybrid route choice model and(2) applicability in large-scale networks due to the link-based stochastic loading method.An illustrative network example and a case study in a large-scale network are conducted to demonstrate the efficiency and effectiveness of the proposed select link analysis method as well as applications of O–D-specific link flow information.A visualizationmethod is also proposed to enhance the understanding of O–D-specific link flow originally in the form of a matrix. 展开更多
关键词 Select link analysis Logit model Weibit model Hybrid model Bell loading
下载PDF
Using Link-Based Consensus Clustering for Mixed-Type Data Analysis
4
作者 Tossapon Boongoen Natthakan Iam-On 《Computers, Materials & Continua》 SCIE EI 2022年第1期1993-2011,共19页
A mix between numerical and nominal data types commonly presents many modern-age data collections.Examples of these include banking data,sales history and healthcare records,where both continuous attributes like age a... A mix between numerical and nominal data types commonly presents many modern-age data collections.Examples of these include banking data,sales history and healthcare records,where both continuous attributes like age and nominal ones like blood type are exploited to characterize account details,business transactions or individuals.However,only a few standard clustering techniques and consensus clusteringmethods are provided to examine such a data thus far.Given this insight,the paper introduces novel extensions of link-based cluster ensemble,LCEWCT and LCEWTQ that are accurate for analyzing mixed-type data.They promote diversity within an ensemble through different initializations of the k-prototypes algorithm as base clusterings and then refine the summarized data using a link-based approach.Based on the evaluationmetric of NMI(NormalizedMutual Information)that is averaged across different combinations of benchmark datasets and experimental settings,these new models reach the improved level of 0.34,while the best model found in the literature obtains only around the mark of 0.24.Besides,parameter analysis included herein helps to enhance their performance even further,given relations of clustering quality and algorithmic variables specific to the underlying link-based models.Moreover,another significant factor of ensemble size is examined in such a way to justify a tradeoff between complexity and accuracy. 展开更多
关键词 Cluster analysis mixed-type data consensus clustering link analysis
下载PDF
Link Budget and Networking Analysis of FuTURE 4G TDD Trial System
5
作者 Xu Xiaodong Li Yazhuo Tao Xiaofeng (Wireless Technology Innovation Institute (WTI),Beijing University of Posts and Telecommunications,Beijing 100876,China) 《ZTE Communications》 2007年第3期6-9,共4页
The FuTURE 4G Time Division Duplex (TDD) trial system uses 3.5 GHz carrier frequency and several crucial technologies including broadband Multiple Input Multiple Output (MIMO) and Orthogonal Frequency Division Multipl... The FuTURE 4G Time Division Duplex (TDD) trial system uses 3.5 GHz carrier frequency and several crucial technologies including broadband Multiple Input Multiple Output (MIMO) and Orthogonal Frequency Division Multiplexing (OFDM). These technologies challenge the link budget and networking analysis of the FuTURE 4G TDD trial network. This paper analyzes the practical 3.5 GHz propagation model and the link budget of Radio Frequency (RF) parameters of the trial system. Moreover,it introduces networking analysis and network planning of the trial system,which combines the field test results of the MIMO system. The FuTURE 4G TDD trial system and its trial network have been accomplished with successful checkup. The trial system fulfills all the requirements with two Access Points (AP) and three Mobile Terminals (MT),which supports multi-user,mobility,a high peak rate of 100 Mb/s,High-Definition TV (HDTV),high-speed data download,and Voice over IP (VoIP) services. 展开更多
关键词 TDD link Budget and Networking analysis of FuTURE 4G TDD Trial System BLER Radio MIMO DBM
下载PDF
Identify Implicit Communities by Graph Clustering
6
作者 YANG Nan MENG Xiaofeng 《Wuhan University Journal of Natural Sciences》 CAS 2006年第5期1109-1113,共5页
How to find these communities is an important research work. Recently, community discovery are mainly categorized to HITS algorithm, bipartite cores algorithm and maximum flow/minimum cut framework. In this paper, we ... How to find these communities is an important research work. Recently, community discovery are mainly categorized to HITS algorithm, bipartite cores algorithm and maximum flow/minimum cut framework. In this paper, we proposed a new method to extract communities. The MCL algorithm, which is short for the Markov Cluster Algorithm, a fast and scalable unsupervised cluster algorithm is used to extract communities. By putting mirror deleting procedure behind graph clustering, we decrease comparing cost considerably. After MCL and mirror deletion, we use community member select algorithm to produce the sets of community candidates. The experiment and results show the new method works effectively and properly. 展开更多
关键词 Web community link analysis graph clustering MCL
下载PDF
Extracting the Cores of Implicit Communities
7
作者 YANG Nan LIN Songxiang GAO Qiang 《Wuhan University Journal of Natural Sciences》 CAS 2007年第5期783-788,共6页
In this paper, we improve the trawling and point out some communities missed by trawling. We use the DBG (Dense Bipartite Graph) to identify a structure of a potential community instead of CBG (Complete Bipartite G... In this paper, we improve the trawling and point out some communities missed by trawling. We use the DBG (Dense Bipartite Graph) to identify a structure of a potential community instead of CBG (Complete Bipartite Graph). Based on DBG, we proposed a new method based on edge removal to extract cores from a web graph. Moreover, we improve the crawler to save only potential pages as fans of a core and save a lot of disk storage space. To evaluate the set of cores whether or not belong to a community, the statistics of term frequency is used. In the paper, the dataset of experiment were crawled under domain ".cn". The result show that the our algorithm works properly and some new cores can be found by our method. 展开更多
关键词 Web community link analysis dense bipartite graph
下载PDF
Identifying Achilles-heel roads in real-sized networks
8
作者 Saeed Asadi Bagloee Majid Sarvi +1 位作者 Russell George Thompson Abbas Rajabifard 《Journal of Modern Transportation》 2017年第1期1-11,共11页
Ensuring a minimum operational level of road networks in the presence of unexpected incidents is becoming a hot subject in academic circles as well as industry. To this end, it is important to understand the degree to... Ensuring a minimum operational level of road networks in the presence of unexpected incidents is becoming a hot subject in academic circles as well as industry. To this end, it is important to understand the degree to which each single element of the network contributes to the operation and performance of a network. In other words, a road can become an "Achilles-heel" for the entire network if it is closed due to a simple incident. Such insight of the detrimental loss of the closure of the roads would help us to be more vigilant and prepared. In this study, we develop an index dubbed as Achilles-heel index to quantify detrimental loss of the closure of the respective roads. More precisely, the Achilles-heel index indicates how many drivers are affected by the closure of the respective roads (the number of affected drivers is also called travel demand coverage). To this end,roads with maximum travel demand coverage are sorted as the most critical ones, for which a method known as "link analysis"--is adopted. In an iterative process, first, a road with highest traffic volume is first labeled as "target link," and second, a portion of travel demand which is captured by the target link is excluded from travel demand. For the next iteration, the trimmed travel demand is then assigned to the network where all links including the target links run on the initial travel times. The process carries on until all links are labeled. The proposed methodology is applied to a large- sized network of Winnipeg, Canada. The results shed light on also bottleneck points of the network which may warrant provision of additional capacity or parallel roads. 展开更多
关键词 Critical roads Achilles-heel roads Sensorlocation problem. Flow-bundle link analysis
下载PDF
Link Budget Analysis for Massive-Antenna-Array-Enabled Terahertz Satellite Communications 被引量:1
9
作者 甄儒辰 韩充 《Journal of Shanghai Jiaotong university(Science)》 EI 2018年第1期20-27,共8页
Broadband satellite communications can enable a plethora of applications in customer services, global nomadic coverage and disaster prediction and recovery. Terahertz(THz) band is envisioned as a key satellite communi... Broadband satellite communications can enable a plethora of applications in customer services, global nomadic coverage and disaster prediction and recovery. Terahertz(THz) band is envisioned as a key satellite communication technology due to its very broad bandwidth, astrophysical observation advantages and device maturing in recent years. In this paper, a massive-antenna-array-enabled THz satellite communication system is proposed to be established in Tanggula, Tibet, where the average altitude is 5.068 km and the mean-clear-sky precipitable water vapor(PWV) is as low as 1.31 mm. In particular, a link budget analysis(LBA) framework is developed for THz space communications, considering unique THz channel properties and massive antenna array techniques. Moreover, practical siting conditions are taken into account, including the altitude, PWV, THz spectral windows, rain and cloud factors. On the basis of the developed link budget model, the massive antenna array model, and the practical parameters in Tanggula, the performances of signal-to-noise ratio(SNR) and capacity are evaluated. The results illustrate that 1 Tbit/s is attainable in the 0.275~0.37 THz spectral window in Tanggula, by using an antenna array of the size 64. 展开更多
关键词 terahertz(THz) band satellite communications massive antenna arrays link budget analysis(LBA)
原文传递
Identifying Composite Crosscutting Concerns with Scatter-Based Graph Clustering
10
作者 HUANG Jin BETEV Latchezar +2 位作者 CARMINATI Federico ZHU Jianlin LU Yansheng 《Wuhan University Journal of Natural Sciences》 CAS 2012年第2期114-120,共7页
Identifying composite crosscutting concerns(CCs) is a research task and challenge of aspect mining.In this paper,we propose a scatter-based graph clustering approach to identify composite CCs.Inspired by the state-o... Identifying composite crosscutting concerns(CCs) is a research task and challenge of aspect mining.In this paper,we propose a scatter-based graph clustering approach to identify composite CCs.Inspired by the state-of-the-art link analysis tech-niques,we propose a two-state model to approximate how CCs tangle with core modules.According to this model,we obtain scatter and centralization scores for each program element.Espe-cially,the scatter scores are adopted to select CC seeds.Further-more,to identify composite CCs,we adopt a novel similarity measurement and develop an undirected graph clustering to group these seeds.Finally,we compare it with the previous work and illustrate its effectiveness in identifying composite CCs. 展开更多
关键词 software engineering aspect mining link analysis undirected graph clustering
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部