We construct a general Verifiable Fully Homomorphic Encryption, using the existed Fully Homomorphic Encryption schemes. The main appeal of the scheme is the verifiability of Evaluate function. Its security and other p...
详细信息
A key technique for protein analysis is the geometric alignment of two-dimensional polyacrylamide gel electrophoresis (2-D PAGE), i.e., 2-D PAGE image registration. In this study, the adaptability in elastic image reg...
详细信息
The K-Nearest Neighbor (KNN) algorithm for text categorization is applied to CET4 essays. In this paper, each essay is represented by the Vector Space Model (VSM). After removing the stop words, we chose the words, ph...
详细信息
Word sense disambiguation is a crucial and difficult problem in natural language processing. The problem of word sense disambiguation can be considered as a typical classification problem. Different information is sel...
详细信息
As a latest immune algorithm, dendritic cell algorithm (DCA) has been successfully applied into the abnormal detection. First, this paper reviewed the research progress of DCA from the following aspects: signal extrac...
详细信息
Compared with the graph structure, the hyper-graph structure can convey more complex and multivariate relationships. In addition, hypergraphs are more capable of portraying and mining higher-order nonlinear correlatio...
详细信息
Peer-to-peer (P2P) systems enable a wide range of important, scalable and reliable services such as file sharing, voice-over-IP (VoIP) and video streaming. And they also generate most traffic in all regions. Excessive...
详细信息
Peer-to-peer (P2P) systems have become increasingly popular for a variety of applications in Internet for their several advantages over traditional client/server architecture. And they also generate most traffic in al...
详细信息
Eruption of solar flares is a complex nonlinear process,and the rays and high-energy particles generated by such an eruption are detrimental to the reliability of space-based or ground-based *** far,there are not reli...
详细信息
Eruption of solar flares is a complex nonlinear process,and the rays and high-energy particles generated by such an eruption are detrimental to the reliability of space-based or ground-based *** far,there are not reliable physical models to accurately account for the flare outburst mechanism,but a lot of data-driven models have been built to study a solar flare and forecast *** the paper,the status of solar-flare forecasting is reviewed,with emphasis on the machine learning methods and data-processing techniques used in the *** first,the essential forecast factors strongly relevant to solar flare outbursts,such as classification information of the sunspots and evolution pattern of the magnetic field,are reviewed and ***,methods of resampling for data preprocessing are introduced to solve the problems of class imbalance in the solar flare ***,typical model structures adopted for flare forecasting are reviewed from the aspects of the single and fusion models,and the forecast performances of the different models are ***,we herein summarize the current research on solar flare forecasting and outline its development trends.
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent *** mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnect...
详细信息
Mobile Industrial Internet of Things(IIoT)applications have achieved the explosive growth in recent *** mobile IIoT has flourished and become the backbone of the industry,laying a solid foundation for the interconnection of all *** variety of application scenarios has brought serious challenges to mobile IIoT networks,which face complex and changeable communication *** data secure transmission is critical for mobile IIoT *** paper investigates the data secure transmission performance prediction of mobile IIoT *** cut down computational complexity,we propose a data secure transmission scheme employing Transmit Antenna Selection(TAS).The novel secrecy performance expressions are first ***,to realize real-time secrecy analysis,we design an improved Convolutional Neural Network(CNN)model,and propose an intelligent data secure transmission performance prediction *** mobile signals,the important features may be removed by the pooling *** will lead to negative effects on the secrecy performance prediction.A novel nine-layer improved CNN model is *** of the input and output layers,it removes the pooling layer and contains six convolution ***,Back-Propagation(BP)and LeNet methods are employed to compare with the proposed *** simulation analysis,good prediction accuracy is achieved by the CNN *** prediction accuracy obtains a 59%increase.
暂无评论