A novel approach of rough-fuzzy hybridization is proposed for efficient personalized Web retrieval. Variable precision rough set model is used to discover user preference. Fuzzy sets are incorporated to take care of t...
详细信息
A novel approach of rough-fuzzy hybridization is proposed for efficient personalized Web retrieval. Variable precision rough set model is used to discover user preference. Fuzzy sets are incorporated to take care of the real-valued weights in each document vector. Discerning keywords are identified to refine a query for more focused representation. To further filter out irrelevant documents for the user, retrieved results are re-ranked according to rough similarity measures. Experiments compared with traditional search engine are presented and experimental results indicate the performance of document retrieval is greatly improved.
Chinese software companies are increasingly using open source software (OSS) components in software development. Development with OSS components faces challenges with respect to component selection, component integrat...
详细信息
As various applications of ad hoc network have been proposed, security issues have become a central concern and are increasingly important. In this paper, we propose a distributed key management approach by using the ...
详细信息
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-ba...
详细信息
To enhance the quality of service (QoS) support in IEE 802.11, IEEE 802.11e has been studied, which introduces the so-called hybrid coordination function (HCF). HCF includes two medium access mechanisms: contention-based channel access (EDCA), and contention-free channel access (HCCA). Although IEEE 802.11e has provided differentiated channel access mechanism, when call demand rises for important festivals such as New Year's Day or large scale natural disasters such as earthquakes, the delay of voice will increase and the QoS of voice nodes will drop down rapidly. Through our simulation study, in order to guarantee the QoS of emergency voice calls in congested situation, a higher priority for these calls will be required.
In this paper, a new notion which we call compact sequential aggregate signatures is introduced and formalized. Informally, a compact sequential aggregate signature states the following thing: for a given message vect...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper, a new notion which we call compact sequential aggregate signatures is introduced and formalized. Informally, a compact sequential aggregate signature states the following thing: for a given message vector m=(m"1, m(ι)), a public key vector PK=(PK"1, PK(ι)) and a path p=(v"1, v(ι)), where vi=(idi, PKi), the size of the third component σ in a sequential aggregate signature (m, p, σ) is independent of the path length ι We propose a novel implementation of RSA-based regular signature scheme that works in an extended domain, and then transform it into a compact sequential aggregate signature scheme that works in a common domain such that the size of overflow bits is independent of the path length ι Finally, we show that our implementation is provably secure in the random oracle model assuming that the RSA problem is hard. Copyright 2007 ACM.
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key gener...
详细信息
In recent years, many pairing-based signcryption schemes have been proposed. There is, however, an inherent weakness in these schemes: the private key escrow problem, in which the "trusted" private key generator (PKG) can easily impersonate any user at any time without being detected. In this paper we present a pairing-based signcryption scheme using self-certified public keys. In our scheme, users can choose their private keys independently. The public keys of users can be implicitly verified with the subsequent signature verification in a logically single step. A trusted PKG is no longer required. If the dishonest PKG impersonates an honest user to communicate with others, the user can provide a proof of treachery of the PKG afterwards, which is similar to certificate-based systems.
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserve...
详细信息
ISBN:
(纸本)1595934804;9781595934802
In this paper, we presented a method to improve structural modeling based on conserved domain clusters and structure-anchored alignments. We first constructed a template library of structural clusters for all conserved sequence domains. Then, for each cluster, we built the profile using the structure and sequence information. Finally we use the profile and structural alignments as anchors to increase the alignment accuracy between a query and its templates. Our preliminary results show that this method can be used for the partial prediction for a majority of known protein sequences with better qualities. Copyright 2007 ACM.
Based on the property of Human vision system (HVS) that human eye's sensitivity to an image varies with different information regions of the image, Pulse-coupled neural network (PCNN) model is modified for image s...
详细信息
Based on the property of Human vision system (HVS) that human eye's sensitivity to an image varies with different information regions of the image, Pulse-coupled neural network (PCNN) model is modified for image segmentation. The modified PCNN stimulated by an input image has pulse output with multiple pulse values rather than only two in the conventional PCNN, according to the local information rate of the input image. This results in image segmentation according to local information rate delivered from the image by the modified PCNN. Experiments with the modified PCNN on image segmentation and image compression on the segmented images with the principle that the lower information rate is, the higher compression rate is applied, show much better performance in compression rate compared with that on the segmented images with the conventional PCNN.
Web Intelligence (WI) is a new and active research field in current AI and IT. Intelligent B2C Portals are an important research topic in WI. In this paper, we first investigate and analyze the architecture of a B2C p...
详细信息
Mobile ad hoc network (MANET) is an autonomous system of mobile wireless nodes connected dynamically without any preexisting infrastructure. Here, since the nodes are mobile, the network topology changes rapidly and u...
详细信息
Mobile ad hoc network (MANET) is an autonomous system of mobile wireless nodes connected dynamically without any preexisting infrastructure. Here, since the nodes are mobile, the network topology changes rapidly and unpredictably over time. Quality of Service (QoS) requirements in networks with uncertain parameters has become a very important research issue in the mobile ad hoc networks. This paper present a fuzzy controllers based QoS routing algorithm with different priority controller architecture in MANET. Simulation shows that the approach is efficient, promising and applicable in ad hoc networks.
暂无评论