You are previewing International Journal of Interdisciplinary Telecommunications and Networking (IJITN) Volume 8, Issue 2.
O'Reilly logo
International Journal of Interdisciplinary Telecommunications and Networking (IJITN) Volume 8, Issue 2

Book Description

The International Journal of Interdisciplinary Telecommunications and Networking (IJITN) examines timely and important telecommunications and networking issues, problems, and solutions from a multidimensional, interdisciplinary perspective for researchers and practitioners. IJITN emphasizes the cross-disciplinary viewpoints of electrical engineering, computer science, information technology, operations research, business administration, economics, sociology, and law. The journal publishes theoretical and empirical research findings, case studies, and surveys, as well as the opinions of leaders and experts in the field. The journal's coverage of telecommunications and networking is broad, ranging from cutting edge research to practical implementations. Published articles must be from an interdisciplinary, rather than a narrow, discipline-specific viewpoint. The context may be industry-wide, organizational, individual user, or societal.

This issue contains the following articles:

  • A State Decision Tree based Backtracking Algorithm for Multi-Sensitive Attribute Privacy Preserving
  • Research on System Structure of Mobile Internet Security Audit
  • Extracting Influential Nodes in Social Networks on Local Weight Aspect
  • Combining Block DCV and Support Vector Machine for Ear Recognition
  • Semantic Similarity Measurement Using Knowledge-Augmented Multiple-prototype Distributed Word Vector
  • Application of Hadoop in the Document Storage Management System for Telecommunication Enterprise
  • Research on the Extension of SCTP Protocol on the Heterogeneous Wireless Network
  • Research on Cache Timing Attack Against RSA with Sliding Window Exponentiation Algorithm
  • Constructing the Routing Table Automatically for NUMA System based on Uncore Disturbance Pattern

Table of Contents

  1. Cover
  2. Masthead
  3. Call For Articles
  4. Special Issue on Emerging Networks and Data Processing Techniques
  5. A State Decision Tree based Backtracking Algorithm for Multi-Sensitive Attribute Privacy Preserving
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. DEFINITION AND ANALYSIS OF CONCERNED PROBLEMS
    4. 3. SIMULATION AND ANALYSIS
    5. 4. CONCLUSION
    6. ACKNOWLEDGMENT
    7. REFERENCES
  6. Research on System Structure of Mobile Internet Security Audit
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. THE PRESENT RESEARCH
    4. 3. MOBILE INTERNET SECURITY
    5. 4. MOBILE INTERNET SECURITY AUDIT FUNCTION FRAMEWORK
    6. 5. MOBILE INTERNET SECURITY AUDIT APPLICATION
    7. 6. CONCLUSION
    8. REFERENCES
  7. Extracting Influential Nodes in Social Networks on Local Weight Aspect
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. MATERIALS AND METHODS
    4. 3. EXPERIMENT RESULTS AND ANALYSIS
    5. 4. CONCLUSION
    6. ACKNOWLEDGMENT
    7. REFERENCES
  8. Combining Block DCV and Support Vector Machine for Ear Recognition
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. BLOCK DISCRIMINATIVE COMMON VECTOR ALGORITHM
    4. 3. SUPPORT VECTOR MACHINE
    5. 4. EXPERIMENTAL PROCEDURE AND RESULTS
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  9. Semantic Similarity Measurement Using Knowledge-Augmented Multiple-prototype Distributed Word Vector
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. RELATED WORK
    4. 3. WORDNET
    5. 4. METHODOLOGY
    6. 5. EXPERIMENTS
    7. 6. CONCLUSION
    8. ACKNOWLEDGMENT
    9. REFERENCES
    10. ENDNOTES
  10. Application of Hadoop in the Document Storage Management System for Telecommunication Enterprise
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. HADOOP ANALYSES
    4. 3. THE DESIGN OF OFFICE DOCUMENT STORAGE MANAGEMENT PLATFORM
    5. 4. THE KEY TECHNOLOGY IN THE DESIGN OF MANAGEMENT PLATFORM
    6. 5. THE SYSTEM PROCESSING FLOW CHART AND SYSTEM VERIFICATION
    7. 6. CONCLUSION AND PROSPECT
    8. REFERENCES
  11. Research on the Extension of SCTP Protocol on the Heterogeneous Wireless Network
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. SOLUTION DESCRIPTION
    4. 3. WM-SCTPTHROUGHPUT MODEL ANALYSIS
    5. 4. SIMULATION
    6. 5. CONCLUSION
    7. REFERENCES
  12. Research on Cache Timing Attack Against RSA with Sliding Window Exponentiation Algorithm
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. CACHE TIMING ATTACK
    4. 3. ATTACK ON MULTI-THREADING PROCESSORS BASED DATA-CACHE
    5. 4. COUNTERMEASURES AGAINST CACHE TIMING ATTACK
    6. 5. CONCLUSION
    7. ACKNOWLEDGMENT
    8. REFERENCES
  13. Constructing the Routing Table Automatically for NUMA System based on Uncore Disturbance Pattern
    1. ABSTRACT
    2. 1. INTRODUCTION
    3. 2. THE NUMA ARCHITECTURE
    4. 3. AUTOMATIC ALGORITHM FOR ROUTING TABLE CONSTRUCTING
    5. 4. EXPERIMENT RESULTS
    6. 5. CONCLUSION AND FUTURE WORK
    7. ACKNOWLEDGMENT
    8. REFERENCES
  14. Call For Articles