As privacy becoming a more and more important topic in the data mining field,the technique of data mining regarding privacy preservation has developed quickly. It is different from the exiting technique of data interf...
详细信息
As privacy becoming a more and more important topic in the data mining field,the technique of data mining regarding privacy preservation has developed quickly. It is different from the exiting technique of data interference and safety *** betraying the original data,after analyzed the exiting technique of privacy preservation and traditional decision tree computing,we bring forward a method that uses probability instead of original data in the construction of decision *** was validated to be a method that supports high veracity in classification,so that it meets the requirement in privacy preservation.
E-education is an important approach to provide the education to people regardless of time and *** the development of the information technology,multimedia becomes a popular technique to advance traditional forms of *...
详细信息
E-education is an important approach to provide the education to people regardless of time and *** the development of the information technology,multimedia becomes a popular technique to advance traditional forms of *** merge multiple media into E-education seamlessly,visual communication design becomes a necessity to pay more attention *** paper depicts the current status of visual commurtication used in E-education area,and discusses its probable development trend in future.
In this paper,the semantic tree consists of contents of How Net to eliminate the ambiguities of words and cluster semantic similar documents based on clustering of contents,we address a novel method to solve"key ...
详细信息
In this paper,the semantic tree consists of contents of How Net to eliminate the ambiguities of words and cluster semantic similar documents based on clustering of contents,we address a novel method to solve"key word obstacle"problem,namely concept semantic tree. The novel method based on semantic information of How Net makes the construction of the concept semantic tree more flexible,which can add and delete nodes *** also features combining relevancy to solve semantic ambiguity,which can well analyze semantics and improve the effect of text clustering.
The problem of identity authentication in mobile commerce has greatly limited development of mobile commerce The One-Time Password(OTP)technology which is implemented simply,has lower cost and needs no third-party not...
详细信息
The problem of identity authentication in mobile commerce has greatly limited development of mobile commerce The One-Time Password(OTP)technology which is implemented simply,has lower cost and needs no third-party notarization is more suitable for mobile commerce identity *** this paper,the authentication mechanism of an improved OTP is presented,which uses hash value generated by different random seeds and secret pass phase's connection to authenticate Mobile Client and Server each other,and uses encryption to slove security questions of sensitive information stored *** emulated experimentation,it has desired effect which is suitable for identity,authentication of mobile commerce.
This paper describes a robust inventory control strategy to find the optimal decision variables to weaken the bullwhip effect in cluster supply chains under environment of demand *** model is established to combine re...
详细信息
This paper describes a robust inventory control strategy to find the optimal decision variables to weaken the bullwhip effect in cluster supply chains under environment of demand *** model is established to combine real-time optimization and simulation with regarding to the across-chain inventory *** robust inventory control based on switched system(SRCS)incorporates online inventory decision-making system to overcome model uncertainties and external *** is proved that this method is more effective and efficient to tune the controller in face of changing environment.
A novel image compression algorithm using competitive learning neural network is proposed to improve the original LBG algorithm,by using which higher image compression quality could be *** proposed scheme is based on ...
详细信息
A novel image compression algorithm using competitive learning neural network is proposed to improve the original LBG algorithm,by using which higher image compression quality could be *** proposed scheme is based on vector quantization and modifies the learning rate and scaling function of updating equation, which is used to train the ***,to demonstrate the feasibility of this scheme,experimental results are presented,which show the proposed scheme can improve the quality of codebook greatly.
An evolutionary image segmentation method by genetic algorithm(GA)is *** has global search abilities but it may suffer from premature convergence on multi-modal *** is due to the decrease of population's diversity...
详细信息
An evolutionary image segmentation method by genetic algorithm(GA)is *** has global search abilities but it may suffer from premature convergence on multi-modal *** is due to the decrease of population's diversity in search space that leads to fitness *** improved GA(IGA)is proposed and the mutation rate in IGA is controlled by the population's diversity which can balance the population's diversity and have more chances located in the region of global *** effectiveness of IGA is shown by the experiment of image segmentation,the results show that IGA has great advantage of convergence speed and success ratio over GA.
With the rapid development of web service the voice of improving web service quality and performance is increasingly *** paper proposes a web communication model on the basis of anycast technology and this paper can p...
详细信息
With the rapid development of web service the voice of improving web service quality and performance is increasingly *** paper proposes a web communication model on the basis of anycast technology and this paper can provide for the clients the web service with better quality and shorter response *** this paper the web communication model is deeply analyzed and discussed,and in IFv6 simulation by implementing WWW service its feasibility and validity are proved.
The temporal logic of actions is a logic for specifying and reasoning about concurrent *** kind of logic brought forward by Leslie Lamport[1].And its syntax and complete formal semantics are summarized in about a *** ...
详细信息
The temporal logic of actions is a logic for specifying and reasoning about concurrent *** kind of logic brought forward by Leslie Lamport[1].And its syntax and complete formal semantics are summarized in about a *** is extremely powerful,both in principle and in *** the process of researching Internet banking system we put forward safety transition condition,safety action and safety transition system based on TLA;then,specify Internet banking system using TLA+ which is based on safety transition system. The spacification is checked by TLC,and the results show that the system based on safety transition is more secure.
The traditional BP Neural Network forecasting model influenced clearly by the complexity of network frame and sample,which lead to the over-learning or low-extensive ***,paper puts forward a new model to improve the B...
详细信息
The traditional BP Neural Network forecasting model influenced clearly by the complexity of network frame and sample,which lead to the over-learning or low-extensive ***,paper puts forward a new model to improve the BP Neural Network load forecasting model,which use attribution reduction algorithm of rough sets to reduce the various historical data related to the load and eliminate the property not related to the decision-making *** was tested that this method reduces the input variables of the BP Neural Network,so shortens the training time of the BP Neural Network load forecasting *** last the forecasting capability is improved.
暂无评论