Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensor networks, which is largely determined the various service-quality improvement of wireless sensor netwo...
详细信息
Strategy of sensor nodes deployment is directly related to the cost and performance for underwater wireless sensor networks, which is largely determined the various service-quality improvement of wireless sensor networks. In order to improve the coverage of the target area, this paper presents a distributed algorithm of coverage control. Assume that nodes initially deployed on the surface of the water and can only move in vertical direction in 3-D space, the algorithm is first to control the nodes in-depth and relocate the nodes at different depths, then the nodes continue to adjust their depths until there is no augment for improving their coverage, and to achieve efficient coverage of the three-dimensional sensor networks ultimately. Experimental results show that compared with traditional random deployment method, the proposed coverage control algorithm can improve coverage of network effectively.
Recently Vadim Lyubashevsky etc. built LWE problem on ring and proposed a public cryptosystem based on R-LWE, which, to a certain extent, solved the defect of large public key of this kind, but it didn't offer par...
详细信息
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is studied. The weakness of the algorithm for detecting financial fraud via Benford correlat...
详细信息
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user req...
详细信息
In agent-based automated negotiation research area,a key problem is how to make software agent more adaptable to represent user preferences or suggestions,so that agent can take further proposals that reflect user requirements to implement ecommerce activities like automated *** difficulty lies in the uncertainty of user preferences that include uncertain description and contents,non-linear and dynamic *** this paper,fuzzy language was used to describe the uncertainty and combine with multiple classified artificial neural networks(ANNs) for self-adaptive learning of user *** refinement learning results of various negotiation contracts' satisfaction degrees in the extent of fuzzy classification can be *** to unclassified computation,the experimental results illustrate that the learning ability and effectiveness of agents have been improved.
Based on wavelet coefficient dependency, a novel general image steganalysis technique for spatial domain steganography is proposed. First, the mutual information is exploited to analyze the change on the scale and ori...
详细信息
Based on wavelet coefficient dependency, a novel general image steganalysis technique for spatial domain steganography is proposed. First, the mutual information is exploited to analyze the change on the scale and orientation dependency between wavelet coefficients, which is caused by the embedding of a message, and the Markov model is applied to model the dependency between wavelet cofficients so as to extract intrascale and interscale transition probability matrices which are used as feature vectors. Then, a weighted feature fusion method is used to fuse these feature vectors and the fisher linear discriminant (FLD) is designed to classify them. The experiments on least significant bit (LSB), LSB matching and stochastic modulation (SM) steganography show that the method can detect stego images reliably and the detection accuracy of this method exceeds that of its closest competitors obviously under the same computer complexity.
Content filtering through keyword matching is widely adopted in network censoring, and proven to be successful. However, a technique to bypass this kind of censorship by decomposing Chinese characters appears recently...
详细信息
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail...
详细信息
Feature selection is an effective data preprocessing step to reduce the dimension of feature space and save storage space. Binary particle swarm optimization (BPSO) has been applied successfully to solve feature selec...
详细信息
ISBN:
(纸本)9780982443859
Feature selection is an effective data preprocessing step to reduce the dimension of feature space and save storage space. Binary particle swarm optimization (BPSO) has been applied successfully to solve feature selection problem. But it was easy to fall into local optimal point. M2BPSO was an improved BPSO algorithm. The particles of M2BPSO were updated by using various evolutionary strategies according to the performance of them, in addition, the mutation was used to overcome premature. In this paper, we adopted M2BPSO to solve feature selection problem. To test the validity of the algorithm, we compared it with various versions of BPSO methods. Experimental results showed that M2BPSO could effectively solve the feature selection problem.
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to h...
详细信息
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to heal themselves in the sense of recovering from malicious attacks and rectifying of system faults. The goal of self-healing systems is to provide survivable systems that require high dependability, robustness, adaptability, and availability. Such systems maintain one or more models, whether external or internal, at run time as a basis for identifying problems and resolving them. This article describes an architectural description language, called ADML, which is being developed as a new formal language and/or conceptual model for representing evolving software architectures. The ADML embraces dynamic change as a fundamental consideration, supports a broad class of adaptive changes at the architectural level, and offers a uniform way to represent and reason about both static and dynamic aspects of self-healing systems. Because the ADML is based on the Dynamic Description Logic DDL(SHON (D)), which can represent both dynamic semantics and static semantics under a unified logical framework, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL(SHON (D)), and dynamic description logic algorithms and implementations can be used to provide reasoning services for ADML. In this article, we present the syntax of ADML, explain its underlying semantics using the Dynamic Description Logic DDL(SHON (D)), and exemplify our approach by applying it to the domain of load balancing a wireless remote-access system;the preliminary results certify the potential of the approach.
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
暂无评论