The ecological system theory brings out a view of innovation for labor relation management. This paper uses the function structure analysis methods todescribe the ecological root cause of imbalance of labor relation m...
详细信息
The ecological system theory brings out a view of innovation for labor relation management. This paper uses the function structure analysis methods todescribe the ecological root cause of imbalance of labor relation management. At the end of this paper, an analysis framework has been structured.
Compliance is generally understood as the documenting and auditing of evidence deemed sufficient todemonstrate conformance toa rule, a specification, a policy or a law. In this paper, we consider, in the specific cont...
详细信息
Compliance is generally understood as the documenting and auditing of evidence deemed sufficient todemonstrate conformance toa rule, a specification, a policy or a law. In this paper, we consider, in the specific context of software development, what are the legal and technical challenges raised by such an understanding of compliance. More specifically, we ask a) whatis the nature of this evidence;b) how can sufficiency be defined, and c) how precisely defined is the task of auditing this evidence.
Based on quotient space and granular computing theory, the image retrieval process is analyzed, and a multigranular method based on quotient space is proposed for Thangka image retrieval. With the proposed method, an ...
详细信息
Based on quotient space and granular computing theory, the image retrieval process is analyzed, and a multigranular method based on quotient space is proposed for Thangka image retrieval. With the proposed method, an image is divided intodifferent granularities based on hierarchical thinking, and different quotient spaces are constituted according todifferent behaviors under different granularities of the image. The synthetic features are obtained by composing the attribute functions at different granularity levels based on the theory of composing multi-granularity attribute functions in the quotient space. Finally, the images are retrieved by the synthetic method. The experiment showed that the synthetic method could be able toeffectively retrieve Thangka images.
In machine learning and data mining, in order todeal with the problem of combining labeled and unlabeled data toimprove the classification performance, active learning has attracted much attention in recent years. How...
详细信息
In machine learning and data mining, in order todeal with the problem of combining labeled and unlabeled data toimprove the classification performance, active learning has attracted much attention in recent years. However, most studies on active learning are cost-insensitive. Cost-sensitive learning is a type of learning that misclassification costs are taken intoconsideration in the learning algorithm. In this paper, we propose a cost-sensitive active learning algorithm based on self-training. In addition, labeling costis alsoconsidered in this paper. The results of experiments show a better performance of our algorithm compared tothe current methods.
Combining outputs from different classifiers to achieve high accuracy in classification task is one of the most active research areas in ensemble method. Although many state-of-art approaches have been introduced, no ...
详细信息
Many industries nowadays use management and decision making based on artificial neural networks. However, the major drawback of neural networks lies in their time and computational complexity. The problem with computa...
详细信息
Many industries nowadays use management and decision making based on artificial neural networks. However, the major drawback of neural networks lies in their time and computational complexity. The problem with computational complexity could be eliminated using sharing of the computing needs on multiple computing nodes. This article focuses on the architectural design of a distributed system, which aims to solve large neural networks. The article describes the technology GPGPU and the next part of the article deals with an overview of methods for speeding up the calculation and distribution of artificial neural network. The main section describes the design of a model architecture description of the algorithm that allows correct data distribution on computational nodes.
An infrared target recognition method in complicated group backdrop based on SURF is studied in this paper. Firstly, the image is preprocessed by image enhancement method of wavelet decomposition, histogram equalizati...
详细信息
An infrared target recognition method in complicated group backdrop based on SURF is studied in this paper. Firstly, the image is preprocessed by image enhancement method of wavelet decomposition, histogram equalization and adaptive median filtering toincrease the gray differences between target and background, and then SURF is used torealize infrared target recognition. The simulation focuses on SURF feature matching threshold and the number of matching feature points. Experimental results show that the proposed method works well on infrared target recognition in complicated ground backdrop.
Computation of maximal exact matches (MEMs) is an important problem in comparing genomic sequences. Optimal sequential algorithms for computing MEMs have been already introduced and integrated in a number of software ...
详细信息
Computation of maximal exact matches (MEMs) is an important problem in comparing genomic sequences. Optimal sequential algorithms for computing MEMs have been already introduced and integrated in a number of software tools. To cope with large data and exploit new computing paradigms like cloud computing, it is important to develop efficient and ready-to-use solutions running on distributed parallel architecture. In a previous work, we have introduced a distributed algorithm running on a computer cluster for computing the MEMs. In this paper, we extend this work in two directions: First, we introduce new variants of this algorithm; one of them has a better time complexity than the published one. These variants as we will demonstrate by experiments are faster in practice. Second, we introduce a cloud based implementation, where we automate the process of creating and configuring the cluster, submitting the jobs, and finally collecting the results and terminating the cloud machines.
N th -Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU crypto...
详细信息
ISBN:
(纸本)9781479930814
N th -Dimensional Truncated Polynomial Ring (NTRU) is a lattice-based public-key cryptosystem that offers encryption and digital signature solutions. It was designed by Silverman, Hoffstein and Pipher. The NTRU cryptosystem was patented by NTRU Cryptosystems Inc. (which was later acquired by Security Innovations) and available as ieee 1363.1 and X9.98 standards. NTRU is resistant to attacks based on Quantum computing, to which the standard RSA and ECC public-key cryptosystems are vulnerable to. In addition, NTRU has higher performance advantages over these cryptosystems. Considering this importance of NTRU, it is highly recommended to adopt NTRU as part of a cipher suite along with widely used cryptosystems for internet security protocols and applications. In this paper, we present our analytical study on the implementation of NTRU encryption scheme which serves as a guideline for security practitioners who are novice to lattice-based cryptography or even cryptography. In particular, we show some non-trivial issues that should be considered towards a secure and efficient NTRU implementation.
Society today is the information society, with global connections, telepresence, omnipresence, instantaneity, wide reach, multi formats, convergence, and more. People don't live without technology, then, what the ...
详细信息
Society today is the information society, with global connections, telepresence, omnipresence, instantaneity, wide reach, multi formats, convergence, and more. People don't live without technology, then, what the technology can do for education? Despite all technology available, the education still suffers from old problems: distance between technologies and teaching methods, the students have difficulty learning, the school dropout, is necessary to understand the habits and mode of action of the new generations. This work is a PhD thesis in progress and inquires if and how it's possible to measure evidence of students' learning in class, at lab practice specially, and how it may support teacher's decisions on student guidance.
暂无评论