Sharing Semantic Web datasets provided by different publishers in a decentralized environment calls for efficient support from distributed computing technologies. Moreover, we argue that the highly dynamic ad-hoc sett...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem,and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself,and it can defend positive attack of dealer and participants.
Recently, Cloud computing, as one of the hottest words in IT world, has drawn great attention. Many IT companies such as IBM, Google, Amazon, Microsoft, Yahoo and others vigorously develop cloud computing systems and ...
详细信息
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they ...
详细信息
In(k,m)-DOT~nScheme,the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas' s scheme,they give two solutions that are applicable for the case k>m/2,in Nikov et al.'s scheme,they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k,in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
Image segmentation is still a crucial problem in image processing. It hasn yet been solved very well. In this study, we propose a novel multi-level thresholding image segmentation method based on PSNR using artificial...
详细信息
Warped Discrete Fourier Transform (WDFT) is able to increase frequency resolution at any selected parts of spectral axis without extending the number of sampling points. However, in ordinary WDFT synthesis block, inve...
详细信息
We present a hierarchical chunk-to-string translation model, which can be seen as a compromise between the hierarchical phrasebased model and the tree-to-string model, to combine the merits of the two models. With the...
详细信息
A method of river detection for SAR images is put forward by this paper. It uses kernelized fuzzy c-means (KFCM) algorithm to realize initial segmentation of river in original SAR images. It utilizes mathematical morp...
详细信息
Link Detection (abbr. LDT) is to determine whether two stories discuss the same topic in Topic Detection and Tracking (abbr. TDT) track. The key issue is to correctly measure the relevance between two stories. Most re...
详细信息
Link Detection (abbr. LDT) is to determine whether two stories discuss the same topic in Topic Detection and Tracking (abbr. TDT) track. The key issue is to correctly measure the relevance between two stories. Most researches on LDT use a series of independent words to describe stories (each story is a text specially discussing news), and the relevance between two stories is determined based on the percentage and weight of overlapping words between them. Although substantial improvement has been achieved, inadequate descriptions of word sense and semantics still have negative influences on the accuracy of LDT. In this paper we propose an online semantic tree, which is hierarchically constructed by the most relevant words extracted from previous story streams. In online semantic tree, word sense is described by a series of words in a sense closed-loop, and semantic relation among words is measured by depth and width of level that words locate in. In LDT, online semantic tree is built for each story, and the relevance between two stories is determined by measuring the KL divergence between their online semantic trees. The method performs quite well on TDT4 corpus. The Min Norm CDet of the method in testing is 0.2274 lower than that of the baseline.
In this paper, an efficient approach for extracting semantic object using artificial bee colonyalgorithm (ABCA) has been proposed. First, we reduce speckle noise in the image. Then fitness function of ABC algorithm is...
详细信息
暂无评论