The secondary structure prediction of protein plays an important role to obtain its tertiary structure and function. In the past thirty years, a huge amount of algorithms have been employed to this task. The better pr...
详细信息
Current researches on routing protocol in sensor network mainly pursue a single metric such as the minimum delay or the maximum power saving. As the application requirements become more and more complex, the two metri...
详细信息
Current researches on routing protocol in sensor network mainly pursue a single metric such as the minimum delay or the maximum power saving. As the application requirements become more and more complex, the two metrics need to be considered simultaneously in routing protocol design. This problem has been proved NP-Complete and many existing heuristic algorithms in traditional wired/wireless network cannot be applied in sensor network because of the scarce resource of sensor nodes. We propose a heuristic routing protocol DLEC (delay-constrained least energy consumption) in sensor network single-source single-sink scenario here, which costs the least energy while meeting the delay constraint. This protocol bases on the searching-path set generated by AMODV multi-path construction algorithm, makes use of the local information of each node and the dynamic programming strategy. The theoretical proof and simulation show that this protocol does come up to our expectations.
In open multi-agent systems (MAS), interaction between agents is uncertain. Trust plays an important role in deciding with whom to interact and how to interact with it. Current trust models have solved the problem of ...
详细信息
In open multi-agent systems (MAS), interaction between agents is uncertain. Trust plays an important role in deciding with whom to interact and how to interact with it. Current trust models have solved the problem of how to quantify, deduce and evaluate trust, but there are still challenges. This paper presents FIRE + trust model using utility loss of issue to evaluate trust values. With the representation of matrix, it efficiently increases the rating information. Also by introducing D-S theory and WMA, it can handle uncertain information and dishonest witness finely. Meanwhile, our approach introduces the concept of information-amount to derive each issue 's weight so as to gain the whole trust value of the target agent. It also takes witness reliability into account. Experiments show that FIRE + is more effective than others.
Jun ware is one of the famous Chinese ancient porcelain produced in Song dynasty. In this work, support vector machines, as new chemometrics algorithms especially suitable for the data processing of small sample sets,...
详细信息
ISBN:
(纸本)9781601320254
Jun ware is one of the famous Chinese ancient porcelain produced in Song dynasty. In this work, support vector machines, as new chemometrics algorithms especially suitable for the data processing of small sample sets, have been used for the mathematical model-building for Jun glazes. It has been found that compared with PCA or KNN algorithms, support vector machines can give more reliable mathematical models for the identification of ancient Jun ware.
IKE becomes the most significant protocol of the key exchange in Internet. Following an introduction to the mechanism of IKE, the security of the whole message-exchanging process is analyzed. Considering the existing ...
详细信息
IKE becomes the most significant protocol of the key exchange in Internet. Following an introduction to the mechanism of IKE, the security of the whole message-exchanging process is analyzed. Considering the existing deficiency of IKE, a new improved model is presented in the main mode with a pre-shared key in order to protect the security of the pre-shared key and resist the attacks of man-in-the-middle and DoS. Meanwhile, the concept of identity-hashing payload and the idea of adopting twice authentication are provided. Finally, based on the open code of freeS/WAN, the paper modifies and adds some appropriate functions to put the idea into improvement.
How to resolve access control on Web services has become one of the important research tasks about the application of Web services. In this paper, we propose a policy based adaptive Web services security framework. In...
详细信息
How to resolve access control on Web services has become one of the important research tasks about the application of Web services. In this paper, we propose a policy based adaptive Web services security framework. In this framework, the ReiT policy is a declarative language based on the rules and ontologies. The non-structural knowledge is represented by rules and the structural temporal knowledge is represented by ontology. Moreover, we propose a mixer reasoning mechanism to evaluate the ReiT policy. The access control policy including the context of the user and Web services is evaluated by the reasoner. According to the evaluated result agent authorizes the access control of the Web services.
The security of Web services has become one of the important research topics about the application of Web services. In this paper, we propose an agent-based policy aware framework for Web services security. In this fr...
详细信息
The security of Web services has become one of the important research topics about the application of Web services. In this paper, we propose an agent-based policy aware framework for Web services security. In this framework, a policy language called ReiT which is a declarative language based on the rules and ontologies is introduced. The non-structural knowledge is represented by rules and the structural temporal knowledge is represented by ontology. Moreover, we propose a mixed reasoning mechanism to evaluate the ReiT policy. The access control policy including the context of the user and Web services is evaluated by the reasoner. In addition, we present a policy aware BOID agent to authorize the access control of the Web services. And we implement the policy aware BOID agent by extending the JADE platform.
Dimension reduction is an important issue for analysis of gene expression microarray data, of which principle component analysis (PCA) is one of the frequently used methods, and in the previous works, the top several ...
详细信息
Dimension reduction is an important issue for analysis of gene expression microarray data, of which principle component analysis (PCA) is one of the frequently used methods, and in the previous works, the top several principle components are selected for modeling according to the descending order of eigenvalues. While in this paper, we argue that not all the first features are useful, but features should be selected form all the components by feature selection methods. We demonstrate a framework for selecting good feature subsets from all the principle components, leading to reduced classifier error rates on the gene expression microarray data. As a case study, we have considered PCA for dimension reduction, genetic algorithms and the floating backward search method for feature selection, and support vector machines for classification. Experimental results illustrate that our proposed framework is effective to reduce classification error rates.
The Increasing adoption of the techniques of mobile wireless ad hoc network in the field of civilian applications arouses many urgent problems. As we known nodes to consist a MANET may belong to different users, thus ...
详细信息
The Increasing adoption of the techniques of mobile wireless ad hoc network in the field of civilian applications arouses many urgent problems. As we known nodes to consist a MANET may belong to different users, thus each node aims to pursue the best quality of service for its owner, i.e., they are self-interested nodes trying to achieve the maximum utility. Researchers have shown that selfish nodes in a MANET can greatly decrease the performance of the network, even to the point where no messages can be sent at all. By the similarities between MANET and multi-agent system (MAS), to research some problems in MANET from the view of MAS is an impressive idea. In this paper nodes in MANET are modeled as intelligent agents using an agent programming language named Conceptual Agent Notation (CAN). We don't use CAN directly but extend its semantics with a set of core operations which capture the essence of ad hoc network, thus provide some solid theoretic underpinning for researching MANET from the view of MAS.
In recent years, there has been considerable interest in collaborative tagging. This paper proposes a hybrid fuzzy clustering method for collaborative tagging. key feature of the method includes using a combination of...
详细信息
ISBN:
(纸本)9781424431779
In recent years, there has been considerable interest in collaborative tagging. This paper proposes a hybrid fuzzy clustering method for collaborative tagging. key feature of the method includes using a combination of the fuzzy c-means and the subtractive clustering to handle collaborative tagging problems. The method allows a resource to belong to more than one laggings with different membership grade. The HFCT method need not know in advance the number of laggings, in order to avoid the difficulty of initial guesses of the number of taggings.
暂无评论