To improve the effectiveness of control and remediation of failure access terminals in trusted network, a novel remediation scheme is proposed in this paper. Based on the introduction of a definition of stability of a...
详细信息
Efficient scheduling algorithms play an essential part in heterogeneous computing systems (HeCS) to achieve high performance. So we proposed a new efficient dynamic multi-strategies scheduling algorithm (DMS). The bas...
详细信息
The tradition standby mechanism can't carry out the dynamic Disaster Recovery of database between distributed isomeric storage systems, accordingly, research the method of allopatric isomeric backup based on grid ...
详细信息
In this paper, we propose an Inverse Depth Line (IDL) model of LiDAR data for traversable region segmentation. This model first organizes the disordered point cloud with a 2D structure array to store and index the poi...
详细信息
Based on the analysis of color histogram for image retrieval, a new descriptor, bit-plane distribution feature(BPDF), is proposed in this paper. The image is firstly divided into eight bit-planes. Meantime, the Gray c...
详细信息
According to the significant impact on the accuracy rate of detection of current immune algorithms brought by incorrect classification of signal, it proposes network malicious code dendritic cell immune algorithm base...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, the...
详细信息
In (k,m) -DOT1n scheme, the sender's privacy can not be guaranteed,even if the protocol itself is security,if we can not ensure that a receiver gets information from at most k *** Naor and Pinkas's scheme, they give two solutions that are applicable for the case k >m/2,in Nikov et al.'s scheme, they avoid this problem by means of implementing a m-out-of-m access *** this paper,we put forward a settlement for arbitrary k, in which the receiver only can choose k servers to interactive and solve the problem getting the desired security.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem,and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself,and it can defend positive attack of dealer and participants.
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with ...
详细信息
Long non-coding RNAs(lncRNAs)play an important role in many life activities such as epigenetic material regulation,cell cycle regulation,dosage compensation and cell differentiation regulation,and are associated with many human *** are many limitations in identifying and annotating lncRNAs using traditional biological experimental *** the development of high-throughput sequencing technology,it is of great practical significance to identify the lncRNAs from massive RNA sequence data using machine learning *** on the Bagging method and Decision Tree algorithm in ensemble learning,this paper proposes a method of lncRNAs gene sequence identification called *** identification results of this classification method are compared with the identification results of several models including Byes,Support Vector Machine,Logical Regression,Decision Tree and Random *** experimental results show that the lncRNAs identification method named BDLR proposed in this paper has an accuracy of 86.61%in the human test set and 90.34%in the mouse for lncRNAs,which is more than the identification results of the other ***,the proposed method offers a reference for researchers to identify lncRNAs using the ensemble learning.
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-se...
详细信息
YCH scheme is a multi-secret sharing scheme based on two-variable one-way function and Shamir's threshold secret sharing scheme,but the scheme does not have the property of *** paper presents a verifiable multi-secret sharing scheme based on YCH scheme,RSA cryptosystem, and Schnorr *** dose not need a secure channel and each participant chooses his secret shadow by himself, and it can defend positive attack of dealer and participants.
暂无评论