The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Privacy-preserving data mining aims at securely extracting knowledge from two or more parties' private data. Secure multi-party computation is the paramount approach to it. In this paper, we study privacy-preserving add and multiply exchanging technology and present three new different approaches to privacy-preserving add to multiply protocol. After that, we analyze and compare the three different...
The properties of value vector and coefficient vector of symmetric Boolean functions with maximum algebraic immunity are studied by applying combinatory and Lucas formula. Basing on that, we proved the algebraic immunity of three classes (2m -2)-variable symmetric Boolean functions with mges3 is not maximum.
Study of trust in P2P network now is focus on how to effectively against various malicious behaviors such as providing fake or misleading feedback about other peers and the management of the trust in a P2P environment. But the scotoma of portability that trust peer can join (leave) a certain P2P network at anytime and anywhere is seldom discussed. In this paper, a structured topology for trust management...
The automated vehicle recognition is of great importance today in intelligent transportation systems. In the process of the feature extraction of vehicle recognition system, the edge vector must be extracted first. However, there are many regions in an image, and it is difficult to extract the edge vectors of the regions of the image. Therefore a novel edge tracing method based on scan-line of image...
Web has already become the richest information resource of the world. Web sources are open, dynamic, and autonomous. Evaluating and selecting high quality Web source is a key for the success of Web-based applications. Currently, most of the web source evaluation and selection are performed by Web experts. However, there are too many Web sources in any field, this process has proved to be very time...
Eye gaze control is playing an important role in AR system. However, the physiology mechanism of eye gaze control canpsilat be totally understood for the limitation of biomedicine presently. The research on evolving networks has been widely studied recently and the degree distributions of these networks are of a power-law form. To enhance the calibration accuracy and improve the judgment effects of...
In this paper, a hardware implementation of 802.16e-2005 Turbo encoder and decoder is presented with an efficient interleaver implementation and normalization scheme. The normalization scheme is based on rescaling, which results in area and memory reduction and speed enhancement. It is shown that this normalization technique saves up to 12% of the required storage in addition to saving hardware resources...
The GPRS network has been well integrated in global system for mobile (GSM) network, the most dominant cellular standard, to accomplish efficient spectrum utilization for data traffic. It has become a popular service which carries critical business and social information of many subscribers. The issue of survivability for a GPRS network requires more investigation. This work introduces a new measure...
One of the key challenging aspects of peer-to-peer systems has been efficient search for objects. To achieve this, we need to minimize the number of nodes that have to be searched, thereby use minimum number of messages during the search process. This can be done by selectively sending requests to nodes having higher probability of a hit for the queried object. In this paper we present an algorithm...
These wireless ad hoc sensor networks (WSNs) have received considerable academia research attention at present. The main purpose of a sensor network is information gathering and delivery. Therefore, the quantity and quality of the data delivered to the end-user is very important. The energy-constrained sensor nodes in WSNs operate on limited batteries, so it is a very important issue to use energy...
Dynamic cluster organization is a hotspot research field for wireless sensor networks. A new algorithm of building and regroup clusters - improved distributed cluster organization algorithm (IDCOA) is proposed in this paper. By IDCOA, nodes are clustered via the way that some nodes propose invitations, and the other sensors respond. Member nodes in the networks save the cluster's id, but header nodes...
Sensor networks have recently emerged as a premier research topic. Sensor networks pose a number of new conceptual and optimization problems. Some, such as location, deployment, and tracking, are fundamental issues, in that many applications rely on them for needed information. While designing the sensor networks according to performed computation, the limited number of sensors to cover an area will...
This paper presents a global optimal technique based on moving least square (MLS) fitting technique and improved differential evolution algorithm (IDEA) for inverse problems on optimizing electromagnetic equipments. In the proposed method, MLS are firstly used to simulate complex objective functions as a response surface model (RSM) in multidimensional space, for transforming an implicit function...
Component behavior modeling and relativity analysis is a crucial issue for the component-based software maintenance and evolution. There are two prerequisites for each application of maintenance or evolution strategy. The first is modeling the behavior of the evolving component, and the second is determining the components which are behavior related with the evolving one. In this paper we provided...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.