2006 IEEE International Conference on Acoustics Speed and Signal Processing Proceedings
DOI: 10.1109/icassp.2006.1660697
|View full text |Cite
|
Sign up to set email alerts
|

Principal Component Analysis of the Fractional Brownian Motion for 0 < H < 0.5

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 12 publications
0
4
0
Order By: Relevance
“…While PC2 showed a lower percentage of variance (11.4%) compared to PC1 and the resulting PC3 calculations for protein-ligand complex simulated at different temperatures showed minimum changes depicted from 5.95 to 7.93%. In addition, the principal component analysis values for the data range from 0.30 to 0.68 for 300, 305, 310, and 320 K, respectively, indicating the simulation is converged and the limit range of 0 < H < 0.5 [73] .…”
Section: Methodsmentioning
confidence: 95%
“…While PC2 showed a lower percentage of variance (11.4%) compared to PC1 and the resulting PC3 calculations for protein-ligand complex simulated at different temperatures showed minimum changes depicted from 5.95 to 7.93%. In addition, the principal component analysis values for the data range from 0.30 to 0.68 for 300, 305, 310, and 320 K, respectively, indicating the simulation is converged and the limit range of 0 < H < 0.5 [73] .…”
Section: Methodsmentioning
confidence: 95%
“…When modeling bursty traffic in high‐speed network in communication field, the network arrival process is often assumed as Poison arrival. However, Bellmore's survey on packet traffic analysis of LANs and many other analysis reports on Internet traffic on wide area network published in various institutes show that the process of bursty traffic arrival is much more coincident with exact or asymptotic self‐similarity model than Poison arrival. To estimate H parameter, it is useful in characterizing such self‐similarity feature.…”
Section: Distributed Denial‐of‐service Attacks and Self‐similarity Studymentioning
confidence: 99%
“…Typically, arrival pattern of bursty traffic in high‐speed communication network is assumed to follow Poisson distribution. However, from the survey reported in on local and wide area network traffic and from the analysis of other research groups as reported in and , it is evident that the arrival of bursty traffic follows asymptotic self‐similarity model. The basic limitation of Poisson model is that it cannot hold or unable to capture traffic burstiness, which characterizes data traffic (opposite to voice traffic in old telephone systems).…”
Section: Introductionmentioning
confidence: 97%
“…However, Bellmore's survey on LAN's packet traffic [1,2] , as well as many research institute's analysis on internet traffic on Wide Area Network (WAN) [3][4][5] , show that the process of bursting traffic arrival is much more coincident with exact or asymptotic self-similarity model than Poison arrival. The Hurst parameter is an important parameter used to describe the bursting feature of self-similarity network traffic.…”
Section: Introductionmentioning
confidence: 99%