The image data are obtained by a variety of multimedia, information equipment, which include amount of information, extensive coverage, and redundancy in ubiquitous computing paradigm. In order to make use of these in...
详细信息
Botnet is one of the major security threats to Internet. In this paper, botnet communication and attack patterns were introduced, and the discovery method of botnet based on abnormal behavior was studied. For the curr...
详细信息
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the serious problems in the spike sorting of mul...
详细信息
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ...
详细信息
ISBN:
(纸本)9780955529337
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm and tbe algorithm used by DDT, tbe traditional single finger-table witch be maintained by each node in the ring will be changed into double finger-table: the Neigbbor-Finger-Table and Long-distance Finger-Table. The structure of the Neighbor-Finger-Table is the same as the traditional single finger-table's. The Long-distance Finger-Table can construct small-world network. Some similar algorithm uses random method to select remote access node, the new strategy is different from that, tbrough tbe calculation of the local node, it can ensure the scope of service can cover tbe entire network. The simulation shows the algorithm can effectively reduce the path length of service discovery, improve the service success rate, and control the path length of magnitude.
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ...
详细信息
ISBN:
(纸本)9780955529337
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on fuzzy neural network has presented in this paper. It can fuse massive data from the multi-sensor image. Here, fuzzy neural network is a paraDel information processing model, there are more adaptive and self-organization, and can accomplish the complexity of real-time computing and mass data retrieval, it demonstrate its unique superiority of image understanding, pattern recognition and the handling of incomplete information. The fuzzy neural network system developed by us can be used in multi- sensor image fusion. Based on our experiments, it has been proved that the fusion is fast, effective, and can meet the real-time requirements of pervasive computing.
End-hopping is a technique proposed in the study of active defense in network security. In this paper, some supplements and modifications are made to the conception of "End-hopping" based on the previous res...
详细信息
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ...
详细信息
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on fuzzy neural network has presented in this paper. It can fuse massive data from the multi-sensor image. Here, fuzzy neural network is a parallel information processing model, there are more adaptive and self-organization, and can accomplish the complexity of real-time computing and mass data retrieval, it demonstrate its unique superiority of image understanding, pattern recognition and the handling of incomplete information. The fuzzy neural network system developed by us can be used in multi-sensor image fusion. Based on our experiments, it has been proved that the fusion is fast, effective, and can meet the real-time requirements of pervasive computing.
Association rules mining is a popular and well researched method in data mining research field , its purpose is to mine interesting relations between attributes in transaction database. Classic Apriori algorithm is on...
详细信息
Association rules mining is a popular and well researched method in data mining research field , its purpose is to mine interesting relations between attributes in transaction database. Classic Apriori algorithm is one of the most influential association rules in mining boolean frequent itemsets algorithms, However, it has some disadvantages such as inefficient in generating candidate itemsets and frequently scanning database, it is not suitable for mining multiple dimensional data model which rise in recent years. A “second cut” method is proposed, which is on the basis of the Apriori algorithm. The algorithm applies to multidimensional mining association rules, and to some extent improved the efficiency of the algorithm. Referring to the manufacturing resource planning system (MRP) features of the retail points, the article sets up the sales association analysis data model based on the above algorithm. It proves that it can increase the sales dramatically by applying this methodology to the real business environment.
In order to support mobile service of long-distance monitoring and controlling UPS based on Web, a kind of design and implementation solution of embedded UPS (EUPS) system is brought forward in this paper. The design ...
详细信息
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a...
详细信息
暂无评论