The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
2017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
The ubiquity of sensor enabled by Wireless Sensor Network (WSN) technologies cover many areas of modern daily lives. This offers the possibility to measure, simulate and control environments, from natural resources to urban environments. It is usually use Internet of Things (IoT) for centralized management or control of machines, equipment and personnel. This paper use WSN to get temperature and transmit...
A total of 269 Holstein cows were selected to test estrus using the independent "Jing M" detection system. For estrus cows detected by the system an experienced veterinarian checked them again by using rectum checks; after this the positive and accuracy rates of the system were evaluated. Finally the consistency of the detection system with rectum checking was analyzed using the Kappa value...
Development of big data has brought us convenience and benefits, but the privacy issues have become increasingly prominent. In order to solve the problem of personal sensitive information leakage, this paper propose a data masking scheme based on format-preserving encryption for privacy information. The scheme can be used to encrypt credit card number, date, e-mail address and other data with tight...
Due to the imbalanced distribution of business data, missing of user features and many other reasons, directly using big data techniques on realistic business data tends to deviate from the business goals. It is difficult to model the insurance business data by classification algorithms like Logistic Regression and SVM etc. This paper exploits a heuristic bootstrap sampling approach combined with...
we present a method based on a locally affineinvariant constraint for volumetric registration of 3D solid shapes. The core idea of this method is that an affine combination of the given point in 3D solid shapes that are directly connected to the given point, and the corresponding weight of each neighboring point can be obtained by the method of generalized least square. The input of our method is...
In order to further improve the accuracy of personalized recommendation algorithm in social network, on the basis of summarizing the traditional recommendation algorithm, this paper introduces the social relationship between users, the trust propagation mechanism and time sequence information and user-item score matrix information are fused to the probability matrix decomposition model, a new personalized...
The purpose of data mining is to explore, find and hence analyze relevant data from a massive data source using various technical means. This paper introduces the development of data mining to date, its functions, tasks and algorithms, as well as the process of data mining. The application and problems of data mining are also presented and finally the potential future development of data mining technology...
In order to provide end users with better video quality, This paper presents an adaptive extension H264/AVC video streams based multipath scalable video coding algorithm, with the path diversity provided by video distribution network (VDN). Our method adapts to the variety of end-users using the scalable video coding. Moreover, it adapts to network bandwidth fluctuation by observing the changes of...
Aiming at the problem that the 3D DV-Hop localization algorithm has great error in the location of coal mine roadway, an improved three-dimensional DV-Hop fixed node location method is proposed based on the relationship between the geometric model of coal mine roadway and the sensor node. Based on the traditional 3D DV-Hop calculation hops and the lack of distance between nodes, the difference method...
The technology of 3D reconstruction of medical image can provide more comprehensive and detailed information for doctors. This paper analyses the efficiency of traditional marching cubes(MC) algorithm and its derivative algorithms, puts forward an improved MC algorithm which can improve drawing efficiency by quadratic median approximation method instead of linear interpolation method. With the aid...
With the Extension and application of cloud computing, users are more inclined to store data in the cloud. Hence the user data privacy protection have become important issues to be solved urgently. Encryption is an effective way to protect privacy, but encryption has a great impact on the performance of data processing. Encrypted data are often lost maneuverability. To cope with this problem, in this...
Increasing scale and the need for quick response to heterogeneity is hard to meet with current monolithic manycore scheduler architectures. This limits the rate at which new features can be made effective use of, decreasing efficiency and utilization, and eventually restricting manycore systems’ growth. We propose a new approach to meet these needs by parallelism, shared resource state, and transactional...
In embedded applications, some real-time transactions may trigger external device. If these transactions fail, the influence caused by the triggered external device should be removed. The real-time database can't eliminate the influence, then we exploit compensatory task to compensate for the external influences. In this paper, the real-time transaction is divided into two parts: main task and compensatory...
With the rapid development of cloud computing, more and more users choose to deploy the application services on the virtual machine in the cloud platform. OpenStack is one of the most popular platforms in open source. At present, there are a few researches on the load balancing of virtual machines in cloud platform. Most of the researches adopt the traditional dynamic load balancing algorithm, the...
In this paper, the effect of air pollutants (PM2.5, PM10, SO2, NO2, CO and O3) on the Air quality index (AQI) from Jan. to Feb., 2016 in Jinan was studied by using correlation analysis and path analysis. The results of the correlation analysis show that AQI has a negative correlation with O3, and has a positive correlation with PM2.5, PM10, SO2, NO2 and CO. Meanwhile, PM2.5, PM10, SO2, NO2 and CO...
The hydraulic simulation is an important work in the design and construction of gas pipeline network in the city. It is also a necessary means to improve pipeline network, optimize the operation and management of pipe network, and ensure the safety of gas supply. In this paper, based on the model of hydraulic calculation and the finite element nodal method, the research on the hydraulic simulation...
In recent years, the number of services in Internet of Things (IoT) has increased rapidly, and service discovery in IoT has become more difficult in large-scale registration. In the traditional matching method, in order to get a better match results, all the matching parameters for services had to be calculated together, thus it would waste a lot of computing resource and time. This paper presents...
In cloud storage, auditing for operation behavior logs (OBLs) plays an increasingly important role in the field of cloud auditing. In this paper, we first introduce our third party auditing model for user's operation behavior. Further, a novel secure logging approach is proposed to ensure the OBLs security in cloud. Then, we present a secure public auditing scheme for OBLs. Specifically, BLS signature...
Recommender systems have proved to be an important response to the information overload problem, by providing users with more proactive and personalized information services. Collaborative filtering is the most popular method in implementing a recommender system. The Slope One algorithm, which is one of collaborative filtering algorithms, is not only easy to implement, but also efficient and effective...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.