The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To improve the energy efficient of n-Epidemic routing protocol in the opportunistic networks, where lack end to end forwarding path, a novel adjustments strategy of parameter n is proposed. Firstly, nodes dynamically update their energy level of current environment while moving around. Secondly, nodes with low energy level take the large n avoiding energy consumption during the messages exchange and...
In recent years, the data mining technology has been developed rapidly. New efficient algorithms are emerging. Association data mining plays an important role in data mining, and the frequent item sets are the highest and the most costly. This paper is based on the association rules data mining technology. The advantages and disadvantages of Apriori algorithm and FP-growth algorithm are deeply analyzed...
One-class support vector machine (OCSVM) is one of the most well-known kernel methods, in which one attempts to use the hyperplane defined on feature space to separate the normal data from all other possible abnormal data. However, the standard OCSVM ignores the importance of the data distribution. With respect to the drawback of OCSVM, the information of data distribution is introduced to improve...
This paper explores knowledge formation and knowledge management for urban construction in the context of sustainable development. The primary goal of this research is to propose an approach to helping achieve the harmony and the sustainability of urban construction and development, by the research of knowledge management based on symbiosis. As the theoretical basis of this paper, the previous related...
In this paper, the stability analysis of the unconditionally stable one-step leapfrog alternating direction implicit (ADI) finite-difference time-domain (FDTD) method for periodic structures is presented. The amplification matrix of the proposed leap-frog ADI-FDTD method is obtained through the spatial domain with Fourier method and eigenvalues of the Fourier amplification matrix are obtained analytically...
Mobile application services are growing sharply in China at present. However there is a great lack of human resources in this domain. Therefore, it is of great significance to cultivate people who are good at mobile application service development for social needs. The requirements for human resources in the mobile application services is overlapping, diverse, and practical, thus its curriculum includes...
A QoS-aware and priority-based multipath routing (QoSPMR) algorithm is proposed for WMSNs. The proposed algorithm comprehensively considers the categories and priorities of multimedia streams, the residual energy of nodes, the local link reliability between nodes, the local congestion status and the distance from the candidate next hop nodes to the sink. Simulation results show the QoSPMR algorithm...
This article summarizes the features of liquefied petroleum gas tanker accident, puts forwards the procedures and measures to deal with the accidents and proposes requirements for the rescue action.
A novel wideband slot-fed cylindrical dielectric resonator antenna (DRA) is proposed in this paper. The dielectric resonator is lifted from the ground plane to form an isolated dielectric resonator (DR) and an equivalent air-dielectric DR. The hybrid structure is excited by a slot-fed mechanism to obtain a smooth transition between each resonant mode. It is found that the bandwidth of the proposed...
We analyze in this paper the capacity of colored Gaussian noise watermarking channel with perceptual distortion measure. It is shown that this capacity is independent of the noise covariance matrix. The capacity achieving distribution is Gaussian with covariance matrix proportional to the host covariance matrix. Namely, the capacity achieving input satisfies the power spectrum condition for energy...
Two-dimensional principal component analysis (2DPCA) and two-dimensional linear discriminant analysis (2DLDA) are new techniques for face recognition. The main ideas behind 2DPCA and 2DLDA are that they are based on 2D matrices as opposed to the traditional PCA and LDA, which are based on 1D vector. In some literature, there has been a tendency to prefer 2DLDA over 2DPCA because, as intuition would...
An effective face recognition method is described in the proposed paper, which is based on Gabor Wavelets and 2D Linear Discriminant Analysis (Gabor-2DLDA). Although Gabor features has been recognized as one of the most successful face representations, its huge number of features often brings about the problem of curse of dimensionality. In this paper, we use Gabor feature matrix to represent the...
The paper proposes an effective algorithm for face recognition using face Gabor image and support vector machine (SVM). The face Gabor image is firstly derived by downsampling and concatenating the Gabor wavelets representations which are the convolution of the face image with a family of Gabor kernels, and then the 2D principle component analysis (2DPCA) method is applied to the face Gabor image...
In this paper, we propose a novel face hallucination approach based on the pyramid regression strategy'. A pyramid framework is built which divides the whole face hallucination process into several levels. The output of last level is the input of next one. For the face hallucination at each level, the searching strategy is mixed: globally best-matching and locally best-matching. The former is got...
This paper first points out that Kim et al's schemes will suffer from the Sybil attack and conspiracy attack, and then proposes a secure admission control scheme for P2P networks. The new scheme proposed not only can withstands Sybil attack and conspiracy attack, but also possesses all properties of Kim et al's schemes
For most P2P file-swapping applications, sharing is a volunteer action, and peers are not responsible for their irresponsible bartering history. It is necessary to establish a trust mechanism for the P2P network. Among the existing trust models based on recommendation, the Dempster-Shafer (D-S) evidence theory can solve uncertain problem. But in the existing researches on D-S evidence theory, no one...
In this paper, we point out Castelluccia's schemes suffer from the Sybil attack and conspiracy attack, and propose a secure key management scheme for P2P networks. The proposed new scheme cannot only withstand Sybil attack and conspiracy attack, but also is possessed of all properties of Castelluccia's schemes
Peer-to-peer network can be seen as truly distributed computing system. Each peer is both a client and a server in these networks. The trust between peers cannot be set up simply on the traditional trust mechanism. A reasonable trust construction approach comes from the social network analysis. Trust relations between individuals are set up upon recommendations of other individuals. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.