This paper deploys active feedback control method for achieving generalized projective synchronization (GPS) of double-scroll chaotic systems, viz. identical Li systems (2009), and non-identical L252;-Chen system (2...
详细信息
Several cluster analysis techniques have been developed till the present to group objects having similar property or similar characteristics and K-means clustering is one of the most popular statistical clustering tec...
详细信息
With the rapid development of cloud computing, cloud service is becoming one of the research hotspots. As the current UDDI standard and implementation cannot describe the quality and low-level resources information of...
详细信息
With the rapid development of cloud computing, cloud service is becoming one of the research hotspots. As the current UDDI standard and implementation cannot describe the quality and low-level resources information of cloud service well, it is difficult to meet the new requirement of optimal cloud services query, selection and access. Therefore, the paper proposes an extended UDDI model CloudUDDI, which is suitable for the cloud computing environment. It supports the presentation and storage of the quality and low-level resource information of cloud services for facilitating cloud service's registry and selection. The experimental results show that it improves the precision ratio of cloud services selection and effectively access the optimal services that meet both quality and low-level resource requirements.
The combination and decomposition of database are two important problems in knowledge discovery and data mining, and their mathematic model are the combination and decomposition of information tables. In this paper, b...
详细信息
The combination and decomposition of database are two important problems in knowledge discovery and data mining, and their mathematic model are the combination and decomposition of information tables. In this paper, by giving the definitions of object-combined formal contexts and attribute-combined formal contexts, we discuss the relationship of attribute characteristic between object-combined formal contexts and the original formal contexts, attribute-combined formal contexts and the original formal contexts, respectively.
Genetic data is very important for biological research,but it is hard to be obtained by *** this paper,we introduce an algorithm for generating simulated genetic data based on K-mediods.A concept of Cluster Channel is...
详细信息
Genetic data is very important for biological research,but it is hard to be obtained by *** this paper,we introduce an algorithm for generating simulated genetic data based on K-mediods.A concept of Cluster Channel is proposed in this algorithm and used to generate simulated *** noise of origin data could be eliminated using the proposed *** experimental results show reliability of simulated genetic *** is used to analyze the simulated data and original data,and we get a conclusion that the simulated data can effectively validate differentially expressed gene detected algorithm.
This paper focuses on large scale application software systems based on Internet of Things and cloud computing. It proposes framework methods to further describe systems' characteristics, as well as the refinement...
详细信息
This paper focuses on large scale application software systems based on Internet of Things and cloud computing. It proposes framework methods to further describe systems' characteristics, as well as the refinement and formalization of the abstract description. It also discusses the functional frameworks and its applications in system disintegrations, system architecture, and stable intermediate forms. It points out that the frameworks contribute to improvement of building, deployment, and maintenance of these applications.
Mobile cloud computing which combines mobile computing, mobile internet, and cloud computing, has become an important research area in the informationtechnology since 2009. By introducing the concept and features of ...
详细信息
Mobile cloud computing which combines mobile computing, mobile internet, and cloud computing, has become an important research area in the informationtechnology since 2009. By introducing the concept and features of mobile cloud computing, we analyze the system structure of mobile cloud computing. Meanwhile, the security threats present in mobile cloud computing environment are given, and solutions for against the corresponding threat are introduced. Finally, an improved security service scheme is put forward to help realize the controllability, customizability and adaptability of the mobile cloud computing environment in this paper.
An innovative approach to hydrogen reactor modeling based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is proposed to improve the approximating and self-adaptive ability of existing models. To exert the informat...
详细信息
An innovative approach to hydrogen reactor modeling based on Adaptive Neuro-Fuzzy Inference System (ANFIS) is proposed to improve the approximating and self-adaptive ability of existing models. To exert the information of the hydrogen reactor operation data for constructing the optimization model reasonably, the adaptive neural network algorithm is combined with the fuzzy logic inference mechanism and the subtractive clustering method. There are good agreements between the actual values and the ones obtained using the proposed model. The results show that the ANFIS model with high accuracy and few convergence epoches have the capability to be applied to engineering simulation applications.
Named Data Networking (ndN) featuring in-network caching capability is a large effort that exemplifies information-centric approach to networking by shifting emphasis from hosts to data so as to meet growing demand on...
详细信息
Named Data Networking (ndN) featuring in-network caching capability is a large effort that exemplifies information-centric approach to networking by shifting emphasis from hosts to data so as to meet growing demand on content. This work explores a scheme that enables a ndN domain to make full use of its in-network caches to enhance its performance, availability, and reliability. Currently, each ndN router independently determines what contents to cache and is unaware of content cached in nearby routers and thus their caches are not utilized in an efficient way. This paper proposes to have routers in a ndN domain share cached data and coordinate to make caching decisions (which is dubbed in-network cooperative caching) and formulates it into a constrained optimization problem. The Lagrangian relaxation and primal-dual decomposition method is applied to decompose the optimization problem into object placement subproblems and object locating subproblems, each of which can be solved in a distributed manner at each router, such that the in-network cooperative caching is addressed in a distributed way. Our simulation results, although preliminary, suggest that our scheme can benefit users, Internet Service Providers (ISPs) as well as content servers, and the improvement can be as much as 88% compared to current ndN caching policy.
In order to achieve secure data aggregation without exposing the data privacy of data providers, a distributed Top-k aggregation query method is proposed in this paper based on the Privacy-preserving. The center node ...
详细信息
In order to achieve secure data aggregation without exposing the data privacy of data providers, a distributed Top-k aggregation query method is proposed in this paper based on the Privacy-preserving. The center node in this algorithm will firstly do privacy protection processing for data objects from the list provided by participants. Then, it will use secure multiparty computation operations to do privacy protection for each list of data objects based on the three-stage threshold algorithm. In this way, the data objects provided by participants can be protected;meanwhile, the Top-k query results can be accessed quickly and accurately.
暂无评论