For the insufficient of existing algorithms of redundant-reader elimination, the paper proposes a data-cleaning algorithm based on communication information among readers. This algorithm is no longer dependent on the ...
详细信息
Text document is the most widely used medium on the ***, there are some emerging problems that cannot be neglected, such as plagiarism, reproduction of information content, illicit redistribution, and copyright disput...
详细信息
Text document is the most widely used medium on the ***, there are some emerging problems that cannot be neglected, such as plagiarism, reproduction of information content, illicit redistribution, and copyright disputes *** plagiarists have become more and more "clever",they could rewrite the contents by using synonym substitution, syntactic variation and other *** traditional copy detection methods that use precise matching or similar string matching algorithms cannot apply to the circumstance of semantics-based copy *** meet the challenge of supporting semantics-based copy detection, for the first time this paper proposes a semantics-based copy detection method supporting similarity *** scores between the suspicious text and each text from corpus are calculated using our proposed similarity calculation *** last,top-k texts from corpus, which have high similarity scores with the suspicious text, are ranked and listed in descending order of the *** on the real-world dataset further show that our proposed solution is very efficient and effective in supporting semantics-based copy detection.
Short text is a popular text form, which is widely used in real-time network news, short commentary, micro-blog and many other fields. With the development of the application such as QQ, mobile phone text messages and...
详细信息
Feature selection algorithm plays a crucial role in intrusion detection, data mining and pattern recognition. According to some evaluation criteria, it gets optimal feature subset by deleting unrelated and redundant f...
详细信息
As cloud computing goes increasingly mature, searchable encryption schemes have been widely applied to the real world. Those not only provide high efficiency but also protect users' privacy well. However, the exis...
详细信息
The Transmission Control Protocol (TCP) is expected for use as a very secure host-to-host protocol linking hosts in packet-switched computer transmission networks, and in interconnected frameworks of such networks. Co...
详细信息
The Transmission Control Protocol (TCP) is expected for use as a very secure host-to-host protocol linking hosts in packet-switched computer transmission networks, and in interconnected frameworks of such networks. computer communication systems are playing an increasingly important role in the military, government, and civilian environments. TCP gives a reliable data transfer service by receiving an acknowledgement from the target while transferring any segment from the source TCP is applied for both mass data transfer and interactive data applications. TCP is the primary transportation protocol in use inside maximum IP networks and helps the transfer of upper 90 percent of whole traffic across the public Internet now. Granted this principal role for TCP, the execution of this protocol forms a vital part of the entire picture of service performance for IP networks. So we improved TCP performance by reducing the number of acknowledgement (ACK) for each sending packet from the source to the destination machine, and it can help a router performance.
Swarm intelligent optimisation algorithms have been researched widely in recent years. Artificial Bee Colony (ABC) algorithm is a kind of swarm intelligent algorithm with briefness and efficiency for global optimisati...
详细信息
In this paper, the quaternion discrete Cosine transform (QDCT) is applied to the color image encryption technology, and partial encryption technique of color image based on QDCT is proposed. Obtained the QDCT spectrum...
详细信息
With the rapid development of the Internet, the application of data mining in the Internet is becoming more and more extensive. However, the data source’s complex feature redundancy leads that data mining process bec...
详细信息
暂无评论