The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Various attribute and relation information is used in social recommendation systems. However, previous approaches fail to use them in a unified way. In this paper, we propose a unified framework for social recommendation. Entities like users and items are described by their tags. We model each entity using topic models like Latent Dirichlet Allocation(LDA) and then connect these topic models to form...
This paper analyzes a new image encryption scheme proposed in "A new encryption based on Henon mapping" and proves that this encryption algorithm is insecure in the image-known attack. By analyzing the properties of the round function, there are two weaknesses: on the one hand, the confusing process will not completely destroy the correlation of image pixels, on the other hand, because of...
Estimating agent's skill ratings from team competition results has many applications in the real world. Existing models assume skills are the same for all contexts. However, skills are context-sensitive in a variety of cases. In this paper, we present a Factor-Based Context-Sensitive Skill Rating System(FBCS-SRS). Instead of estimating agent skills under every context, which is hard due to data sparisity,...
At present government entity information system is independent construction by entity, there are many differences in the using software, data formats, and other aspects, It lacks of unified planning and overall normative standards, resulting in difficulties of information sharing and interaction between various systems. Therefore, We should plan by emergency data sharing and exchange platform uniformly,...
Certificateless public key cryptography eliminates certificate management in traditional public key infrastructure and solves the key escrow problem in identity-based cryptography. Certificateless signcryption is one of the most important primitives in certificateless public key cryptography which achieves confidentiality and authentication simultaneously. Multi-receiver signcryption signcrypts a...
Impressive advances in space technology are enabling complex missions, with potentially strong and long term impact on human life and activities. The peculiarities of space channels require a massive re-engineering of many of the protocols usually adopted in terrestrial networks; among them, security solutions are to be deeply reviewed, and tailored to the specific space requirements. In the context...
Fast and efficient disparity estimation and compensation are the key techniques in multi-view video processing. When implementing multi-view video coding, there are lots of temporal and inter-viewpoint redundancy among viewpoints, which makes the compression work more challenging. It is found that the inter-viewpoint relationship is subject to the epipolar geometry, which provides constraints between...
Secure communications in the context of civil space missions gained a major attention in the last few years, several research groups and international organizations are currently developing the required security mechanisms, based on widely used protocols of the Consultative Committee for Space Data Systems (CCSDS) Packet TM and TC family. However, given the hostile space communication environment,...
Associative classification has high classification accuracy and strong flexibility. However, it still suffers from overfitting since the classification rules satisfied both minimum support and minimum confidence are returned as strong association rules back to the classifier. In this paper, we propose a new association classification method based on compactness of rules, it extends Apriori Algorithm...
A novel method to characterize CMOS process fluctuations in subthreshold current mirrors (SCM) is reported in this paper. The proposed model is succinct in methodology and calculation complexity comparing to the reported statistical models, however, provides favorable estimations of CMOS process fluctuations on the SCM circuit, which makes it being promising for engineering applications. The model...
This paper presents a subspace algorithm called block independent component analysis (B-ICA) for face recognition. Unlike the traditional ICA, in which the whole face image is stretched into a vector before calculating the independent components (ICs), B-ICA partitions the facial images into blocks and takes the block as the training vector. Since the dimensionality of the training vector in B-ICA...
In this paper, a parallel classification algorithm based on an improved hybrid genetic algorithm (PC-HGA) is presented. It attempts to solve the problems of lower classification rule quality, more redundancy rules after optimizing generations and classification accuracy using the traditional genetic algorithm in classification mining. A rule extraction approach to improve the classification accuracy...
Issues about reliable applications of wireless sensor networks (WSN) are discussed and actuality is reviewed. A prototype of WSN integrated into industrial process control system is proposed. Based on it, the communication architecture of individual node is brought forward, and the network layers are detailed expounded. Collective reliability of nodes and the wireless industrial environment are studied...
In this paper, we present a method to retrieve natural images by sketch query. To measure the similarity between the sketch and an image, relevant regions are first located in that image through a multi-resolution search, and a normalized local shape similarity is proposed for image retrieval. Efficiency and other implementation issues are discussed. Experimental results show that it is an effective...
In this study, we discuss omni-directional walking of a quadruped robot to walk on a slope. A method for successive gait-transition on a slope with specified body posture is introduced. Using this method, a trade-off between the moving speed and the body posture has been verified. Simulations and experiments showed that the proposed method for stable slope walking of a quadruped robot is valid
This system is a small electronic commerce system- On-line bookstore system based on JSP and JavaBean, has self-contained onstage and background processing function, can make readers register and login, query and scan booklist, order and modify order form, view and issue message and so on, may provide convenient on-line shopping environment for the user, conforms to domestic popular electronic commerce...
Resource discovery is very critical in mobile computing technology. With wireless grid technology advances, an increasing number of resources, how to find the necessary resources accurately and efficiently for users in a large mobile grid environment, has become a problem has to be solved in grid technology. In this article, we mix the two distributed technology mobile grid and mobile agent together,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.