Explore chapters and articles related to this topic
User and Network-Asserted Identity in SIP
Published in Radhika Ranjan Roy, Handbook on Session Initiation Protocol, 2018
A user may have multiple devices, especially if the user is mobile, where the user can be reached. For example, a service provider, as Third Generation Partnership Project’s (3GPP’s) Internet Protocol (IP) multimedia subsystem (IMS) specification allows, may permit a user to have several SIP user identities (SUIs). Different SUIs may serve as aliases for a particular user. These SUIs are totally interchangeable because they are associated to the same set of services and are transparently associated to the same devices. The user may use them to differentiate between different groups of contacts for different purposes, such as relatives versus friends versus strangers. A user may typically have a telephone Uniform Resource Identifier (tel URI) as an alias to a SIP URI. Different indoor units (IDUs) may also permit the user to endorse several personas (e.g., member of an association, owner of a private business). In this case, the IDUs may be associated to different service profiles and possibly to different devices (but they can also be associated to the same).
Building Cloud Networks
Published in John W. Rittinghouse, James F. Ransome, Cloud Computing, 2017
John W. Rittinghouse, James F. Ransome
When a user accesses a virtual service provided by the server cluster, the packet destined for the virtual IP address (the IP address for the virtual server) arrives. The load balancer (Linux Director) examines the packet’s destination address and port. If they are matched for a virtual service, a real server is chosen from the cluster by a scheduling algorithm, and the connection is added into the hash table which records connections. Then, the load balancer forwards the packet directly to the chosen server. When the incoming packet belongs to this connection and the chosen server can be found in the hash table, the packet is also routed directly to the server. When the server receives the forwarded packet, the server finds that the packet is for the address on its alias interface or for a local socket, so it processes the request and finally returns the result directly to the user. After a connection terminates or times out, the connection record is removed from the hash table. The load balancer simply changes the MAC address of the data frame to that of the chosen server and retransmits it on the LAN. This is why the load balancer and each server must be connected directly to one another by a single uninterrupted segment of a LAN.
Viewing a drawing
Published in Bob McFarlane, Beginning AutoCAD 2002, 2012
A transparent command is one which can be activated while using another command and zoom has this facility. Restore the original Fig. 23.2(a) – zoom all?Select the LINE icon and: The transparent command was activated by entering ‘ZOOM <R> or ‘Z <R> at the command line.Only certain commands have transparency, generally those which alter a drawing display, e.g. GRID, SNAP and ZOOM.Do not save this drawing modification.NoteIn this exercise we enter Z <R> to activate the zoom command and this is an example of using an AutoCAD Alias or Abbreviation. Many of the AutoCAD commands have an alias, which allows the user to activate the command from the keyboard by entering one or two letters. Typical aliases are:
Optimizing user profile matching: a text-based approach
Published in International Journal of Computers and Applications, 2023
Youcef Benkhedda, Faical Azouaou
These types of user matching schemes use profile discrete characteristics, including but not limited to username, full name, address, gender, and profile picture, are frequently accessible information on multiple platforms. Early literature proposed various solutions that utilized these attributes for matching user identities. Zafarani and Liu [25] were among the first to conduct initial investigation on the efficacy of using usernames to match user accounts on various social networking sites. They suggested a user linkage system that relies on the public user URL, which includes the corresponding username. Liu et al. [26] analyzed human behavior in relation to the use of public usernames, suggested an unsupervised user matching approach based on alias disambiguation and found that only 46.8% of their data set can be correctly matched based on username, and later suggested a better matching scheme based on display names [27]. Motoyama and Varghese [18] studied the reliability of using multiple profile attributes such as email address, name, age, gender, and school website. More recently, [28] proposed a framework that links users based on a myriad of attributes available on their public profile, such as username, name, bio and profile image, based on K-means clustering. Ahmad and Ali [29] selected only the user's screen name as a unique feature to determine the similar profile of users on three different social networks, used a token and character based similarity algorithms to determine the similarity of the social account of the users.