With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a u...
详细信息
ISBN:
(纸本)9781479947249
With the widespread use of mobile devices, the location-based service(LBS) applications become increasingly popular, which introduces the new security challenge to protect user's location privacy. On one hand, a user expects to report his own location as far as possible away from his real location to protect his location privacy. On the other hand, in order to obtain high quality of service(QoS), users are required to report their locations as accurate as possible. To achieve the dedicated tradeoff between privacy requirement and QoS requirement, we propose a novel approach based on cloaking technique. We also discuss the disadvantage of the traditional general system model and propose an improved model. The basic idea of our approach is to select a sub-area from the generated cloaking area as user's reported location. The sub-area may not contain a user's real location,which prevents an adversary from performing attack with side information. Specifically, by defining an objective function with a novel location privacy metric and a QoS metric, we are able to convert the privacy issue to an optimization problem. Then, location privacy metric and QoS metric are given. To reduce the complexity of the optimization, a heuristic algorithm is *** privacy-preserving analysis and comparison with related work [8], we demonstrate the effectiveness and efficiency of our approach.
Multi Criteria Decision Making (MCDM) is a major technique in the field of performance appraisal. In time to time numerous MCDM procedures are proposed to solve multi criteria problems. The different methods may provi...
详细信息
Multi Criteria Decision Making (MCDM) is a major technique in the field of performance appraisal. In time to time numerous MCDM procedures are proposed to solve multi criteria problems. The different methods may provide different results on the same problem, which is the major fault of MCDM. To overcome this our proposed technique namely as Modified Group Decision Analysis (MGDA) plays the vital role. Indian Premier League (IPL) T-20 cricket tournament dataset is to be considered for applying MGDA. The assessment of the players by using four different MCDM techniques considered as an input of group decision method and the output produces the rank of the players. The result shows that proposed model yields more realistic way to judge the players and resolve deficiency of MCDM process.
The thriving growth in mobile consumer electronics makes energy efficiency in the embedded system design an important and recurring theme. Phase Change Memory (PCM) has shown its potential in replacing DRAM as the mai...
详细信息
ISBN:
(纸本)9781479962792
The thriving growth in mobile consumer electronics makes energy efficiency in the embedded system design an important and recurring theme. Phase Change Memory (PCM) has shown its potential in replacing DRAM as the main memory option due to its (65%) reduced energy requirements. However, when considering the usage of PCM main memory, its write endurance becomes a critical issue, and wear leveling design is a common approach to resolve this issue. Even though the wear leveling design should stress operation efficiency and overhead reduction, existing wear leveling strategies designed for PCM main memory are usually dedicated to prolonging the lifetime of PCM. In this paper, we propose the perspective that, instead of valuing PCM lifetime exploitation as the first priority, we should turn to satisfy the product warranty period. To this end, further enhancement of operation efficiency and reduction of management overhead could be achieved. We thus propose a warranty-aware page management design to enhance the operation efficiency for managing the endurance issue in PCM. To show the effectiveness of the proposed design, we collected real traces on fiasco. OC by running SPEC2006 benchmarks with different write intensity workloads. The experiment results showed that our design reduced the overhead to one third of that of the state-of-the-art designs while still providing the same level of performance.
Sunspots are dark areas with respect to their surrounding area because the temperature of sunspot areas is lower than the average temperature of the solar surface. It provides essential information for many aspects of...
详细信息
ISBN:
(纸本)9781479947249
Sunspots are dark areas with respect to their surrounding area because the temperature of sunspot areas is lower than the average temperature of the solar surface. It provides essential information for many aspects of solar physics. A sunspot is composed of umbra and penumbra. It is a prerequisite for studying solar physics and spatial atmosphere to accurately segment and extract sunspot structures. Consequently, we propose an automated detection technique for segmenting and extracting them. The detection procedure is composed of two steps:(1) segmenting and extracting sunspot umbra with morphological reconstruction;(2) detecting and segmenting sunspot penumbra with region growing. For evaluating the accuracy of the detection procedure,we used a high-resolution observation obtained by Solar Optical Telescope onboard Hinode, and other obtained with the Dutch Open Telescope to illustrate the performance. The results demonstrate that our proposed technique is significant effective and accurate, and is suitable for studying the sunspot evolution and their physical phenomena.
If potential contributors leading to system failure can be identified when a scientific workflow is modelled, a lot of system vulnerabilities may thus be revealed and improved. In this paper, we first use data depende...
详细信息
Servers and network contribute about 60% to the total cost of data center in cloud computing. How to efficiently place virtual machines so that the cost can be saved as much as possible, while guaranteeing the quality...
详细信息
ISBN:
(纸本)9781479975761
Servers and network contribute about 60% to the total cost of data center in cloud computing. How to efficiently place virtual machines so that the cost can be saved as much as possible, while guaranteeing the quality of service plays a critical role in enhancing the competitiveness of service cloud provider. Considering the heterogeneous servers and the random property of multiple resources requirements of virtual machines, the problem is formulated as a multi-objective nonlinear programming in this paper. Virtual machine cluster with higher traffic is made staying together. This reduces the communication delay while saving the inter-server bandwidth consumption, especially the relatively scarce higher level bandwidth, by exploiting the topology information of data center. At the same time, statistic multiplex and newly defined “similarity” techniques are leveraged to consolidate virtual machines. The violation of resource capacity is kept at any designated minimal probability. Thus the quality of service will not be deteriorated while saving servers and network cost. An offline and an online algorithms are proposed to address this problem. Experiments compared with several baseline algorithms show the validity of the new algorithms: more cost is cut down at less computation effort.
Many practical problems can be converted to solving a polynomial equations in triangular form. For the sake of real-time control, the engineers want to simplify the polynomial equations usually, so that every polynomi...
详细信息
Dixon's method is a practical approach for computing the multivariate resultant in the quantifier elimination. The method is found to be quite restrictive as the Dixon matrix is singular always, and the Dixon resu...
详细信息
This paper focuses the concept of data mining and association rules mining algorithm. Apriori algorithm and FP-growth algorithm, which are well-known and important data mining algorithms, are studied. According to the...
详细信息
This paper focuses the concept of data mining and association rules mining algorithm. Apriori algorithm and FP-growth algorithm, which are well-known and important data mining algorithms, are studied. According to the Apriori algorithm for weighted multidimensional data mining, this paper provides an optimized method which searches the candidate itemsets avoiding to scan the database repeatedly in order to improve the efficiency of data mining. The rule analysis on the achievement of senior students of a certain middle school is used for evaluation of the algorithm.
暂无评论