The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
User requirements obtained through text data mining are very important to improve the competitiveness of enterprises. In this paper an algorithm of acquiring user requirements in machinery products by using text association rule is proposed. In the algorithm, the user requirement documents are represented by vector space model. The feature words matrix is obtained by transposing the documents matrix...
The thesis proposes a hybrid intrusion detection model based on the parallel genetic algorithm and the rough set theory. Due to the difficult for the status of intrusion detection rules. This model, taking the advantage of rough set's streamline the edge to data and genetic algorithm's high parallelism, succeeds in introducing the genetic-rough set theory to the instrusion detection. The application...
Efficient data mining and indexing is important for multimedia analysis and retrieval. In the field of large-scale video analysis, effective genre categorization plays an important role and serves one of the fundamental steps for data mining. Existing works utilize domain-knowledge dependent feature extraction, which is limited from genre diversification as well as data volume scalability. In this...
Four group detection models (e.g. GDM, OGDM, SoDM and ComDM) are developed based on crime data features. These detection models are compared more common baseline SNA group detection algorithms. It is intended to find out, whether these four crime data specific group detection models can perform better than widely used k-core and n-clique algorithms. Two data sets which contain previously known criminal...
Network security becomes the key issue in network environment. Illegal intrusion is a very common security issue. To detect intrusion accurately and efficiently, scientists, scholars and engineers have carried research on it for many years, and there are a lot of research reports achieved and published. This paper introduced a new model for intrusion detection, which takes full advantage of normal...
This paper designs a P2P video-on-demand prototype system. A hybrid push-pull scheduling mechanism with random linear network coding in Galois field 2 and a weight function based caching strategy are adopted in the design. After careful and suitable segment and block division on video, random linear network coding in Galois field 2 is carried out on the blocks within a segment, and then the push-pull...
In the field of data mining, clustering is one of the important methods. K-Means is a typical distance-based clustering algorithm; 2-tier clustering should implement scalable clustering by means of dividing, sampling and knowledge integrating. Among those tools of distributed processing, Map-Reduce has been widely embraced by both academia and industry. Hadoop is an open-source parallel and distributed...
Abstract-By analyzing the process of classification and MapReduce computing paradigms, it is found that the parallel and distributed computing model in MapReduce is appropriate for constructing classifier model. This paper presents a MapReduce algorithm for parallel and distributed classification, aiming to reduce the computational time in training process on large scale documents. Our experiment...
Computational fluid dynamics (CFD) simulation is becoming an important aspect in the design and analysis of engineering equipment. CFD allows engineers to reduce losses related to fluid flows and hence increase the performance. The first part of CFD simulation is building suitable mesh for the geometry to be analyzed. Tetrahedral mesh is widely used in meshing complex domain due to its flexibility...
In the search of new architecture for distributed computing, peer-to-peer is studied as a new way forward. But, its intrinsic properties like the absence of centralized topology or the dynamic reorganization of the network make it difficult to reach high performances. Furthermore, it is not trivial to execute applications on an existing testbed which brings together a sufficient number of nodes. That...
Composite Web services are often long-running, loosely coupled and cross-organizational applications. They always run in a highly dynamic environment. For the applications and environment, advanced transaction support is required to ensure the quality of reliable execution. Towards composite service adaptive mechanism unavailable for lacking transaction support, this paper proposes a self-healing...
One of the key activities needed to construct a quality service-oriented solution is specification of the architectural elements. Selection of an appropriate and proven method for specification of the elements consisted of services, flows, and components is thus fundamental to successful service-oriented system development in an enterprise. Existing methods for service specification ignore the automation...
Jet Grouting (JG) is a Geotechnical Engineering technique that is characterized by a great versatility, being the best solution for several soil treatment improvement problems. However, JG lacks design rules and quality control. As the result, the main JG works are planned from empirical rules that are often too conservative. The development of rational models to simulate the effect of the different...
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Recent progress in grid computing concept and its allied application technologies has helped us to device an efficient tool for heavy workload management. Concept of this middleware technology supports to build more and more complex application which can process large real time data set. Mobilization of under utilized resources among the needy processes can easily be carried out with distributed grid...
Load balancing is an important requirement for the efficient execution of parallel numerical simulations. In particular when the simulation domain changes over time, the mapping of computational tasks to processors needs to be modified accordingly. State-of-the-art libraries for this problem are based on graph repartitioning. They have a number of drawbacks, including the optimized metric and the...
This paper presents an imitation mechanism and a study of its behavior in spatial grid-based configurations. The imitation mechanism replicates external signals without associating with objects, as in higher-level imitation; it is therefore a model of proto-imitation where agents imitate unconditionally the agents they happen to interact with. We study the mechanism in 2D space to understand how it...
This work proposes characterization of single-length cycle cellular automata (CA) attractors with the target to model this class of CA for designing efficient pattern recognizer. Identification of essential properties of a CA while forming multi-length cycles provides the basis of such characterization. A scheme has been developed that synthesizes the single-length cycle attractor CA, avoiding multi-length...
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access rights as an attribute of a graph node, and the use of a resource as a predicate on an edge of the graph. We also propose to model cloud computation semantically as a set of paths in a subgraph of the cloud such that every edge...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.