Computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based ...
详细信息
ISBN:
(纸本)9781479954599
Computer forensics is an important part of the computer crime investigation. So a Forensics system aimed to Foxmail data analysis and investigation is proposed in this paper. The system can index the email data based on Lucene technology and the MMSeg participle algorithm, and provides the full text retrieval of the email content function. Subsequently, a visual communication graph would be generated according to the retrieval results. Based on the communication graph, an algorithm on graphic structure analysis is proposed, and by means of centrality and minimum traffic filtering method, multilevel analysis is carried out on the graph, which can detect the possible suspicious personnel and their relationships and provide strong support for the computer crime investigation.
We show that the error in 3D gaze depth (vergence) estimated from binocularly-tracked gaze disparity is related to the viewing distance of the screen calibration plane at which 2D gaze is recorded. In a stereoscopic (...
详细信息
ISBN:
(纸本)9781450327510
We show that the error in 3D gaze depth (vergence) estimated from binocularly-tracked gaze disparity is related to the viewing distance of the screen calibration plane at which 2D gaze is recorded. In a stereoscopic (virtual) environment, this relationship is evident in gaze to target depth error: vergence error behind the screen is greater than in front of the screen and is lowest at the screen depth. In a physical environment, with no accommodation-vergence conflict, the magnitude of vergence error in front of the 2D calibration plane appears reversed, increasing with distance from the viewer.
The quadratic assignment problem (QAP) is a classic combinatorial optimization problem, which is of the NP-hard nature. In this paper, a hybrid artificial fish school optimization algorithm (HAFSOA) is proposed. In HA...
详细信息
The quadratic assignment problem (QAP) is a classic combinatorial optimization problem, which is of the NP-hard nature. In this paper, a hybrid artificial fish school optimization algorithm (HAFSOA) is proposed. In HAFSOA, the heuristic information is used in constructing some better initial individuals and its search ability of the global optimal solution is improved by a combination of the modified fish school optimization and differential evolution. In addition, by taking different visual distances for three behaviors: preying, clustering and following, the convergence speed of the proposed HAFSOA is speeded up. Many QAP experimental results show that the proposed HAFSOA can solve QAP better.
The research of topic trend prediction can be a good reference for maximizing the propagation effects of network advertisements as well as guiding and controlling the network *** paper proposes PTEP(the Prediction of ...
详细信息
ISBN:
(纸本)9781479957286
The research of topic trend prediction can be a good reference for maximizing the propagation effects of network advertisements as well as guiding and controlling the network *** paper proposes PTEP(the Prediction of Topic Energy Peak) method to model the life cycle of a topic and predicts the time when a hot topic will ***, taking the number and the authority of followers and the interest of users to a topic into consideration, we design a topic-related user authority (TRUA) algorithm to measure the authority of ***, we calculate the energy value considering both the tweets and users authority related to the ***,we measure the fluctuation of the energy value based on wavelet ***, we present rules to predict topic *** results show that our method can effectively predict the peak of a topic in advance with a low omission rate.
Particulate flows are commonly encountered in both engineering and environmental applications. The discrete element method (DEM) has attracted plentiful attentions since it can predict the whole motion of the particul...
详细信息
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente...
详细信息
ISBN:
(纸本)9781479954599
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presented. The method aims at providing the necessary data support to build the behavior pattern library for investigation. The records of the user's browsing history are collected to be analyzed. The obtained original data are pretreated to transactional data which are suitable for association rule mining. Frequent browsing time and frequent web browsing sequences are obtained from the transactional data by Apriori algorithm. The mining results are helpful for identification and recognition of anonymous or suspicious web browsing behavior patterns.
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a ...
详细信息
ISBN:
(纸本)9781479957286
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a new replica placement policy with bidding thought is *** policy combines the own characteristics of replica and factors of bidding mode(e.g, bidding time, bidding standard, bidding price etc.) and starts replica bidding activity when the file data availability cannot meet the given *** placement is based on capacity and accessing probability of data *** experimental results show that our policy has a better performance in both load balance and response time comparing to the static replica policy and CDRM scheme.
Memory is a fundamental component in human brain and plays very important roles for all mental processes. The analysis of memory systems through cognitive architectures can be performed at the computational, or functi...
详细信息
Memory is a fundamental component in human brain and plays very important roles for all mental processes. The analysis of memory systems through cognitive architectures can be performed at the computational, or functional level, on the basis of empirical data. In this paper we discuss memory systems in the extended Consciousness and Memory Model (CAM) The knowledge representations used in CAM for working memory, semantic memory, episodic memory and procedural memory are introduced. It will be explained how, in CAM, all of these knowledge types are represented in dynamic decription logic (DDL), a formal logic with the capability for description and reasoning regarding dynamic application domains characterized by actions.
In this paper, we propose a novel queue-based privacy-preserving data aggregation scheme for additive aggregation function. In the scheme, sensor nodes are divided into clusters in a distributed way first, and then, i...
详细信息
ISBN:
(纸本)9781845649302
In this paper, we propose a novel queue-based privacy-preserving data aggregation scheme for additive aggregation function. In the scheme, sensor nodes are divided into clusters in a distributed way first, and then, in each cluster, cluster members will form a queue and adopt a new queue-based privacy-preserving scheme to send data for aggregation upon the cluster head's request. We evaluate our scheme in terms of overheads, capacity of privacy-preservation, and data aggregation accuracy. The results show that our scheme is efficient and reasonable.
Finding correspondences between two related feature point sets is a basic task in computer vision and pattern recognition. In this paper, we present a novel method for point pattern matching via spectral graph analysi...
详细信息
暂无评论