Video real-time communication of Intelligent terminal is the core technology for video telephone, telemedicine and tele-education. By discussing the video communication hardware platform of both IP carmer and STB and ...
详细信息
For various applications in today's service-oriented enterprise computing systems, such as process-oriented service discovering or clustering, it is necessary to measure the distance between two process models. In...
详细信息
Considering the important reference value of weather radar data in the process of weather modification and based on the analysis of historical weather modification data of Yunnan province, china, and the study of vari...
详细信息
Due to current real-time data compression algorithms is not efficient enough, we have proposed a two-phase real-time data compression algorithm which can be very fast in data compression with high compression rate. Th...
详细信息
Due to our increased dependence on Internet and growing number of intrusion incidents, building effective intrusion detection systems are essential for protecting Internet resources and yet it is a great challenge. In...
详细信息
Due to our increased dependence on Internet and growing number of intrusion incidents, building effective intrusion detection systems are essential for protecting Internet resources and yet it is a great challenge. In literature, many researchers utilized Artificial Neural Networks (ANN) in supervised learning based intrusion detection successfully. Here, ANN maps the network traffic into predefined classes i.e. normal or specific attack type based upon training from label dataset. However, for ANN-based IDS, detection rate (DR) and false positive rate (FPR) are still needed to be improved. In this study, we propose an ensemble approach, called MANNE, for ANN-based IDS that evolves ANNs by Multi Objective Genetic algorithm to solve the problem. It helps IDS to achieve high DR, less FPR and in turn high intrusion detection capability. The procedure of MANNE is as follows: firstly, a Pareto front consisting of a set of non-dominated ANN solutions is created using MOGA, which formulates the base classifiers. Subsequently, based upon this pool of non-dominated ANN solutions as base classifiers, another Pareto front consisting of a set of non-dominated ensembles is created which exhibits classification tradeoffs. Finally, prediction aggregation is done to get final ensemble prediction from predictions of base classifiers. Experimental results on the KDD CUP 1999 dataset show that our proposed ensemble approach, MANNE, outperforms ANN trained by Back Propagation and its ensembles using bagging & boosting methods in terms of defined performance metrics. We also compared our approach with other well-known methods such as decision tree and its ensembles using bagging & boosting methods.
Recently, the rapid evolution of large-scale domain ontologies brought about higher requirements for data access in the Semantic Web community. The basic reasoning services for ontologies, however, cannot meet the nee...
详细信息
Recently, the rapid evolution of large-scale domain ontologies brought about higher requirements for data access in the Semantic Web community. The basic reasoning services for ontologies, however, cannot meet the needs of dealing with complex queries (mainly conjunctive queries) in data-intensive applications. For that purpose, significant research efforts are recently directed toward the design and implemrntatuon of query answering algorithms for ontologies and description logic (DL) knowledge bases (KBs). Many practical tools capable of storing a knowledge base, and also performing queries on it, were constructed. Fuzzy extensions to ontologies and DLs have recently gained considerable attention especially for the purposes of handling vague information in the Semantic Web. In this study, we focus on fuzzy conjunctive queries over fuzzy DL KBs of the expressive f-SH family. We show soundness, completeness and termination of fuzzy query entailment in proper sublogics of f-SHOIQ by providing a corresponding tableau-based algorithm. We show the algorithm is sound for f-SHOIQ, and analyse the reason leading to nontermintion. We close the open problem of the complexity for answering fuzzy conjunctive queries in expressive fuzzy description logics by establishing two complexity bounds: for data complexity, we prove a CONP upper bound, as long as only simple roles occur in the query;Regarding combined complexity, we prove a CO3NEXPTIME upper bound in the size of the knowledge base and the query.
Classic rateless codes, such as Raptor codes and LT codes are long codes. But special applications such as data storage systems usually require short-length codes (a few hundred in size). In response to this demand, w...
详细信息
Classic rateless codes, such as Raptor codes and LT codes are long codes. But special applications such as data storage systems usually require short-length codes (a few hundred in size). In response to this demand, we propose a new construction method of short-length rateless codes. The generator matrix of our proposed coding scheme is a special 0-1 random matrix in which every element is valued independently and identically and has same probability to be valued 1. Based on the proposed short-length rateless codes, a new data redundancy scheme for distributed storage systems is also proposed. Theoretical analysis and numerical simulation show that our method is effective.
This paper presents a research which based on the protocol.802.11,which is a universal standard put forward for each manufacturer. The advance of this proposal not only guaranteed the data exchange of Wireless network...
详细信息
Everybody on internet wants to have faster access of data files from the servers. Howsoever servers are very fast but when it is the question of bulk accessing then we need smarter ways to access data files from these...
详细信息
Everybody on internet wants to have faster access of data files from the servers. Howsoever servers are very fast but when it is the question of bulk accessing then we need smarter ways to access data files from these distant servers. Present system of file access from distant servers is a time consuming and conventional way, which doesn't make any difference. Here in this paper we propose better routing architecture which not only solves issues like larger server response time but also deals with the optimization of routing algorithms used in existing routers.
Smart mobile devices, such as smartphones and tablets, are gaining strong demands recently with the advances in processors, memories, storages, communication networks, and software applications. However, due to their ...
详细信息
Smart mobile devices, such as smartphones and tablets, are gaining strong demands recently with the advances in processors, memories, storages, communication networks, and software applications. However, due to their limited form factors and battery capacities, the current generation of smart mobile devices cannot yet fulfill the requirements of sophisticated applications. Leveraging a cloud service to offload the application workload can potentially overcome these limitations. In the paper, we enhance our previous works on mobile-cloud computing by extending the programming model on Android smartphones with a flow-based programming paradigm to provide more flexibility for application migration. For properly provisioning the resources and making smart decisions based on the performance gain, we add a profile-based policy manager and profiling service into our framework to enable a dynamic offload scheme.
暂无评论