Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
Although ciphertext-policy attribute-based encryption (CP-ABE) is promising for realizing fine-grained attribute-based data sharing, attribute privacy protection issues remain to be solved. In this paper, we propose an anonymous CP-ABE scheme (ANON-CP-ABE) and prove its security under the Decisional Modified Bilinear Diffie-Hellman assumption. In the proposed scheme, the sensitive attribute values...
Designing Chinese-Uighur-English online dictionary is very important for the development of ethnic scientific research and education, which is the basis for the work of Uighur semantic study. Online dictionary with a huge thesaurus can be implemented by knowledge graph, existing works have not addressed in much detail. In order to design the thesaurus of the online dictionary, this paper is based...
Cloud storage service has been increasing in popularity as cloud computing plays an important role in the IT domain. Users can be relieved of the burden of storage and computation, by outsourcing the large data files to the cloud servers. However, from the cloud service providers' point of view, it is wise to utilize the data deduplication techniques to reduce the costs of running large storage system...
This paper proposes a novel kernel-based image subspace learning method for face recognition, by encoding an face image as a tensor of second order (matrix). First, we propose a kernel based discriminant tensor criterion, called kernel bilinear fisher criterion (KBFC), which is designed to simultaneously pursue two projection vectors to maximize the interclass scatter and at the same time minimize...
The design of recommendation method is the core of personalized recommendation, and the implementation of recommendation depends on the matching relation between user preference and resource object. This paper proposes a hybrid personalized recommendation method based on context-based collaborative filtering and knowledge recommendation, which is based on personalized recommendation knowledge model,...
This paper tries to gain a more comprehensive understanding of the logistics discipline, supply chain optimization theory, and the complex networks. We formulate the inference problem to the cascade transmission model as the diffusion network inference problem. The inference model is also given out. In the experiment, our algorithm's performance is accepted. The precision is decreasing when the recall...
The individual applications of network coded opportunistic routing and successive interference cancellation have been proven with significant improvement on throughput performance of wireless multi-hop networks, but there lacks practical optimization on their combination application. Based on a TDMA system, this paper models the throughput maximization as network utility function maximization problem...
MOOC is characterized by large amount of users and curriculums. The current main MOOC platforms are divided into information isolated island. So how to dynamic uniformly recommend courses to users that he or she is interested in, which is one of the challenges of such teaching network nowadays. MOOC course recommender system is a kind of knowledge service system based on the recommended models so...
Spaceborne detection can obtain more direct, comprehensive and accurate astronomical data. Providing massive storage for spaceborne applications is the urgent requirement of applying Big Data technologies to advance astronomy research. Spacecraft storage must have the good balance between high performances, redundancy and low power consumption. Deepening inside the Existing research, it is difficult...
Mobile device forensics is an interdisciplinary field consisting of techniques applied to a wide range of computing devices. Android devices are among the most disruptive technologies of the last years, gaining even more diffusion and success in the daily life of a wide range of people categories. Android devices became even more important in the forensic field due to the rich amount of personal information...
An AC arc fault simulation test device with arc breaking function was developed. The device can meet the requirements on the basic functions of test device specified in Electrical fire monitoring system - Part 4: Arc fault detectors (GB14287.4), can effectively simulate the arc fault trigger and forming conditions of both circuits in series and parallel, and can achieve effective control of the number...
Most of the existing population behavior studies are about the analysis of the population dynamic behavior of genetic algorithm, while there is little analysis of the population dynamic behavior of particle swarm optimization (PSO). Therefore, there is an urgent need for a new method to characterize the population dynamic behavior of PSO in the search process. In this paper, we propose some metrics...
This paper defined a unified architecture of IoT system, on which IoT node model, virtual things, the basic service of things and overall hierarchical model of services had been described. IoT nodes must be connected directly to Internet and provide basic services of things in this architecture, and started from the base services which were compatible with Internet applications system of SOA, built...
The increasing demand for secure interactions between network domains brings in new challenges to access control technologies. In this paper we design an access control framework which provides a multilevel mapping method between hierarchical access control structures for achieving multilevel security protection in cross-domain networks. Hierarchical access control structures ensure rigorous multilevel...
This paper introduces the technological techniques of data cleaning and data extraction. The current state of domestic and international research in these two areas is reviewed and their future development considered. The following concepts are all explained: the basic principle of data cleaning, the framework models, the need for and the objectives of data cleaning, the testing method and the cleaning...
Medical wrist band, also known as medical identification tape, is a kind of wrist band, mainly used to mark the basic information of patients and help medical personnel to identify patients status. However, the traditional medical wrist has a single function, it cannot monitor the vital signs of patients. Based on the traditional medical wrist band, through the hardware facilities such as sensor and...
Hadoop is a famous distributed computing framework that is applied to process large-scale data. "Straggling tasks" have a serious impact on Hadoop performance due to imbalance of slow tasks distribution. Speculative execution (SE) presents a way to deal with Straggling tasks by monitoring the real-time progress of running tasks and replicating potential "Stragglers" on another...
The optimal scheduling algorithms in real-time multiprocessor systems are considered impractical. This is mainly because of the overhead generated due to the frequent scheduling points, migrations and preemptions. The solution to this problem is either to propose new algorithms with less overhead or to improve the existing ones. In this article, some simple heuristics to control the overhead are proposed...
A lot of work has been done to design algorithms that utilize three or more anchors to locate the unknownposition sensor nodes. In this paper, we propose a new sensor network node localization technique based on incremental LMS (least mean squared) distributed estimation algorithm with variable step size. In our network topology, the location-aware anchor nodes are deployed along the border of monitoring...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.