Ontology is an explicit specification of a conceptualization. With the development of semantic Web, there are more and more ontologies. How to achieve the reusing and sharing of knowledge between ontologies has become...
详细信息
Along with the rapid growth of the number of the available web services over the internet, the quality of services (Qos) becomes an imperative concern for service consumers and providers. How to differentiate their qu...
详细信息
Aiming at the defect that the current time dependent road network model cannot fully reflect the information of the road attribute, and considering that the road weights of traffic congestion factors should be based o...
详细信息
ISBN:
(纸本)9781479983544
Aiming at the defect that the current time dependent road network model cannot fully reflect the information of the road attribute, and considering that the road weights of traffic congestion factors should be based on the characterization of travel time and the impedance function model of average speed relations, we put forward the improved road network model which is based on the edge cost analysis; Then we propose the ant colony optimization algorithm of a new hierarchical restricted search area and the corresponding dynamic switching strategy for traffic jams, when the search level can be dynamically adjusted by the road capacity of traffic congestion, we can achieve the purpose of improving the quality of route planning and avoiding the congested road. Our simulation experiment uses the scheme of random allocation speed value by speed fitting function, and provides the multi-population ant colony algorithm based on layered restricted searching area is significantly better than others.
We begin with overviews of the existing defects of the current Kerberos protocol and the shortage of the current improvement, and then we focus on the new method of the dynamic password and public key. On the basis of...
详细信息
ISBN:
(纸本)9781479951529
We begin with overviews of the existing defects of the current Kerberos protocol and the shortage of the current improvement, and then we focus on the new method of the dynamic password and public key. On the basis of the original Kerberos protocol, firstly, we propose the usage of the Diffie-Hellman algorithm, and put the password in the token, then take the key which has added the dynamic factor as the sharing key between Client and AS, this improvement can fundamentally solve the password guessing attack. Secondly, we use the method of the ElGamal algorithm. For one thing, it will generate a new public key in each authentication, and put the new public key as the secret key of the information transmission between client and resource server, this method basically guarantees security of the information transmission; For another we use the random number, which is associated with the public key, to take the place of the time-stamp to prevent replay attack, it puts the random number and our key together to increase the ability of preventing replay attack. Finally, we analyze the example of the improvement which has been carried out. And the results show that the improved Kerberos protocol can ensure the security of the information and password.
To stimulate consumers' purchase willingness, producers must determine the reasonable selling prices and warranty length for their product. Based on the diffusion mode, a dynamic Stacklberg game of price and warra...
详细信息
To stimulate consumers' purchase willingness, producers must determine the reasonable selling prices and warranty length for their product. Based on the diffusion mode, a dynamic Stacklberg game of price and warranty was researched in this paper. Through this model, we got some conclusion about the supplier and retailer's optimal strategy.
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm ...
详细信息
ISBN:
(纸本)9780955529337
In order to improve the efficiency of service discovery in the pervasive environment, this paper presents a new strategy of service discovery based on p2p network model. Reference the ring topology of chord algorithm and tbe algorithm used by DDT, tbe traditional single finger-table witch be maintained by each node in the ring will be changed into double finger-table: the Neigbbor-Finger-Table and Long-distance Finger-Table. The structure of the Neighbor-Finger-Table is the same as the traditional single finger-table's. The Long-distance Finger-Table can construct small-world network. Some similar algorithm uses random method to select remote access node, the new strategy is different from that, tbrough tbe calculation of the local node, it can ensure the scope of service can cover tbe entire network. The simulation shows the algorithm can effectively reduce the path length of service discovery, improve the service success rate, and control the path length of magnitude.
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on ...
详细信息
ISBN:
(纸本)9780955529337
In pervasive computing paradigm, the image data obtained by a variety of multimedia, information equipment. In order to make use of these information reasonably and efficiently, a new method for image fusion based on fuzzy neural network has presented in this paper. It can fuse massive data from the multi-sensor image. Here, fuzzy neural network is a paraDel information processing model, there are more adaptive and self-organization, and can accomplish the complexity of real-time computing and mass data retrieval, it demonstrate its unique superiority of image understanding, pattern recognition and the handling of incomplete information. The fuzzy neural network system developed by us can be used in multi- sensor image fusion. Based on our experiments, it has been proved that the fusion is fast, effective, and can meet the real-time requirements of pervasive computing.
From the viewpoint of network, large-scale computer software systems can be regarded as complex networks composed of interacting units at different levels of granularity (such as functions, classes, packages, source f...
详细信息
作者:
刘凤连孙梦尧蔡文娜Key Laboratory of Computer Vision and System
Ministry of Education of ChinaTianjin Key Laboratory of Intelligence Computing and Novel Software TechnologySchool of Computer and Communication EngineeringTianjin University of TechnologyTianjin 300384China
This paper presents an image denoising method based on bilateral filtering and non-local means. The non-local region texture or structure of the image has the characteristics of repetition, which can be used to effect...
详细信息
This paper presents an image denoising method based on bilateral filtering and non-local means. The non-local region texture or structure of the image has the characteristics of repetition, which can be used to effectively preserve the edge and detail of the image. And compared with classical methods, bilateral filtering method has a better performance in denosing for the reason that the weight includes the geometric closeness factor and the intensity similarity factor. We combine the geometric closeness factor with the weight of non-local means, and construct a new weight. Experimental results show that the modified algorithm can achieve better performance. And it can protect the image detail and structure information better.
This work analysis composition and structure of lung adenocarcinoma cells and normal cells based on confocal Raman spectroscopy. Firstly, confocal Raman spectra of 242 lung adenocarcinoma cells and 231 normal cells ar...
详细信息
暂无评论