ID management method is the foundation to implement and maintain DHT overlays, especially for Constant Degree DHTs based on de Bruijn and Kautz, because their topologies are not incrementally expandable and using bit-...
详细信息
ID management method is the foundation to implement and maintain DHT overlays, especially for Constant Degree DHTs based on de Bruijn and Kautz, because their topologies are not incrementally expandable and using bit-shifting route schema etc. However, corresponding researches on Constant Degree DHTs are scarce, and realized Constant Degree DHTs usually use pure centralized or distributed ID management methods simply, thus cannot guarantee overlay's balance with low cost both in theory and practice. Analyzing the universal tree structures of Constant Degree diagraph, we propose an ID management method based on the internal structure Routing Forest, which regularly aggregates local balancing information to guide new nodes' joining for overall balance. The experimental results validate, with low maintenance and routing message overhead, node IDs' length differ by at most 2 in system, thus the load balancing is efficiently ensured.
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems,a structured data storage and high efficient data retrieval model is proposed ...
详细信息
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems,a structured data storage and high efficient data retrieval model is proposed in this *** this model,the circular queue structure is used in the dynamic shared memory buffer pool,which has improved the storage efficiency of real-time data flow;the circular queue data storage structure and an improved B+ tree index structure are used in the hard disk,which has solved the problem that how to store new data when the storage space is full,and improved the data retrieval efficiency in some *** results show that this model has better data storage capacity and faster data retrieval speed.
Currently, in most virus detection techniques the signature recognition process of unknown viruses are challenging task. The process has become more difficulties after the complexities of the viruses' structure ha...
详细信息
ISBN:
(纸本)9780769538921
Currently, in most virus detection techniques the signature recognition process of unknown viruses are challenging task. The process has become more difficulties after the complexities of the viruses' structure have developed, as in the Polymorphic computer viruses. This paper reviews and then explains some used techniques to detect the known polymorphic viruses. Besides, the paper contains the review of some biological models for virus detection. Finally, a new biological model for detecting polymorphic viruses is suggested
Collaborative spectrum sensing among secondary users (SUs) in cognitive networks is shown to yield a significant performance *** this paper,we study the dynamics of a network of SUs in order to reduce the interference...
详细信息
Collaborative spectrum sensing among secondary users (SUs) in cognitive networks is shown to yield a significant performance *** this paper,we study the dynamics of a network of SUs in order to reduce the interference on the PU through collaborative *** existing literature mainly focused on centralized solutions for collaborative sensing,we propose a collaboration formation through game theory,and propose a distributed algorithm for coalition formation through simple merge-and-split *** this algorithm,SUs can auto-nomously collaborate,while maximizing their detection proba-bility taking into account the false alarm as cooperation *** results show that the proposed algorithm reduce the average probability of missing the detection of the *** addition,we study the maximum number of SUs per formed coalition in the proposed utility model.
In the field of computer Vision(CV),multiple object tracking has been one of the hot issues,and it is especially one of difficulties to effectively track multiple objects in occlusion *** this paper,we propose an effe...
详细信息
In the field of computer Vision(CV),multiple object tracking has been one of the hot issues,and it is especially one of difficulties to effectively track multiple objects in occlusion *** this paper,we propose an effective algorithm to dissolve the occlusion issue in tracking multiple objects,combining the feature of overlap region with the feature of RGB-based dominant color histogram(DCH). Firstly,occlusion can be judged by computing the size of overlap ***,if occlusion takes place,RGB-based DCH can be used to estimate the likelihood of occluded objects. And then,the occluded objects are tracked effectively. Additionally,RGB-based DCH is only computed when merging and splitting,and the computational complexity is effectively *** the experimental results,the proposed algorithm can improve the validity and robustness of tracking multiple objects.
In the System of Target Tracking Recognition,infrared sensors and visible light sensors are two kinds of the most commonly used sensors;fusion effectively for these two images can greatly enhance the accuracy and reli...
详细信息
In the System of Target Tracking Recognition,infrared sensors and visible light sensors are two kinds of the most commonly used sensors;fusion effectively for these two images can greatly enhance the accuracy and reliability of *** the accuracy of registration in infrared light and visible light images by modifying the SIFT algorithm,allowing infrared images and visible images more quickly and accurately *** method can produce good results for registration by infrared image histogram equa-lization,reasonable to reduce the level of Gaussian blur in the pyramid establishment process of sift algorithm,appropriate adjustments to thresholds and limits the scope of direction of sub-gradient *** features are invariant to rotation,image scale and change in illumination.
As the Internet continues to expand and develop,e-learning offers a completely new teaching *** paper presents an e-learning system for courses study,whose structure,application,and evaluation are *** on such the e-le...
详细信息
As the Internet continues to expand and develop,e-learning offers a completely new teaching *** paper presents an e-learning system for courses study,whose structure,application,and evaluation are *** on such the e-learning system,provision for distance teaching methods and removal of time and space constraint,and positive response from students indicates that the presented platform is extremely useful for courses ***’s more,due to the fullest use of supervision,guidance and encouragement,the course objectives,content,implementation and evaluation can be associated as a whole,help the students to carry out their targets of learning.
Driven by considerable technological development such as digitalization of information and the coming together of ICT,network convergence has emerged as an important phenomenon *** China,recent policies about the conv...
详细信息
Driven by considerable technological development such as digitalization of information and the coming together of ICT,network convergence has emerged as an important phenomenon *** China,recent policies about the convergence of Telecom,Broadcasting and Internet networks has produced a timeframe to speed up the three-network convergence and has shown Government’s determination to remove the regulatory barriers,changing convergence from a conceptional trend to operational *** Telecom operators,network convergence brings business opportunities but also poses challenges and forces them to face a more complicated and uncertain environment coupled with advances in technology and *** to understand convergence in a broader perspective and detect competitive forces beyond industrial competitive boundaries may in the future lead to costly ***,it is highly necessary to understand to which extend network convergence can affect the *** this purpose,this paper not only analyzes the network convergence as an inevitable trend but also with a gradual process in China from technology,market and regulatory *** focusing on the implications of the network convergence on Telecom operators in China,this paper found that change of competitors and customers behaviors are the main ***,more business opportunities will be achieved by enhancing the capabilities of service offering and the expansion of *** on this analysis,suggestions are given to the Telecom operators in China for making convergence-oriented strategies.
We have studied the theoretical problems of logic of beta-PSML (Problem Solver Markup Language) constructed by combining description logic and Horn clauses. In the nonrecursive case, we show that a single step of appl...
详细信息
ISBN:
(纸本)9780769538921
We have studied the theoretical problems of logic of beta-PSML (Problem Solver Markup Language) constructed by combining description logic and Horn clauses. In the nonrecursive case, we show that a single step of applying a Horn clause needs to be replaced by a more sophisticated reasoning step in beta-PSML. We call it as the hybrid reasoning algorithm. We described the hybrid reasoning algorithm in former paper In this paper, we will prove the correctness of the hybrid reasoning algorithm. Hybrid reasoning algorithm provides a sound and complete inference procedure for nonrecursive beta-PSML knowledge bases in which the description logic component is decidable.
SHA is one of the most widely used cryptographic hash functions nowadays, but researches shown that it can't hold some key security properties such as avalanche effect and collision resistance. Since Wang etc. int...
详细信息
SHA is one of the most widely used cryptographic hash functions nowadays, but researches shown that it can't hold some key security properties such as avalanche effect and collision resistance. Since Wang etc. introduced the first theoretical collision attack of SHA-0 in 1997, a lot of work has been done, which mainly focusing on improving the attack efficiency. However, why the attack happen still remaining lack of explanation, this paper firstly present systematic analysis of why the collision attack can be implemented, focusing on vulnerabilities analysis of SHA-0, including the MSB bit problem in modular addition, local collision and the way of message expanding lack of diffusion and confusion, etc., and this analysis also apply to SHA-1. In order to avoid the explored vulnerabilities, we present some suggestions and principles for the design of the new generation of secure Hash functions.
暂无评论