In this paper, we consider skyline queries in a mobile and distributed environment, where data objects are distributed in some sites (database servers) which are interconnected through a high-speed wired network, an...
详细信息
In this paper, we consider skyline queries in a mobile and distributed environment, where data objects are distributed in some sites (database servers) which are interconnected through a high-speed wired network, and queries are issued by mobile units (laptop, cell phone, etc.) which access the data objects of database servers by wireless channels. The inherent properties of mobile computing environment such as mobility, limited wireless bandwidth, frequent disconnection, make skyline queries more complicated. We show how to efficiently perform distributed skyline queries in a mobile environment and propose a skyline query processing approach, called efficient distributed skyline based on mobile computing (EDS-MC). In EDS-MC, a distributed skyline query is decomposed into five processing phases and each phase is elaborately designed in order to reduce the network communication, network delay and query response time. We conduct extensive experiments in a simulated mobile database system, and the experimental results demonstrate the superiority of EDS-MC over other skyline query processing techniques on mobile computing.
Edge and detail preserving is a very important requirement in blind medical denoising since the details can help doctors diagnosis diseases. Bilateral flter (BF) is a famous filter in preserving details while smoothin...
详细信息
Ultrasound images are effected by serious noises. In this paper, we propose an adaptive method by determining a variable neighborhood of each pixel in ultrasound image denoising. The real neighbors of a pixel can be c...
详细信息
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In...
详细信息
Certificateless cryptography eliminates the key escrow problem in identity-based cryptography. Hierarchical cryptography exploits a practical security model to mirror the organizational hierarchy in the real world. In this paper, to incorporate the advantages of both types of cryptosystems, we instantiate hierarchical certificate less cryptography by formalizing the notion of hierarchical certificate less signatures. Furthermore, we propose an HCLS scheme which, under the hardness of the computational Diffie-Hellman (CDH) problem, is proven to be existentially unforgeable against adaptive chosen-message attacks in the random oracle model. As to efficiency, our scheme has constant complexity, regardless of the depth of the hierarchy. Hence, the proposal is secure and scalable for practical applications.
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains t...
详细信息
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains the sink node,all the source nodes,and some other non-source *** goal of constructing such a data aggregation tree is to minimize the number of non-source nodes to be included in the tree so as to save *** prove that the data aggregation tree problem is NP-hard and then propose an approximation algorithm with a performance ratio of four and a greedy *** also give a distributed version of the approximation *** simulations are performed to study the performance of the proposed *** results show that the proposed algorithms can find a tree of a good approximation to the optimal tree and has a high degree of scalability.
We present a scheme to realize a large cross-phase-modulation between two slow optical pulses by using the atomic configurations of coupled double dark resonances. In this scheme slow group velocities for these optica...
详细信息
We present a scheme to realize a large cross-phase-modulation between two slow optical pulses by using the atomic configurations of coupled double dark resonances. In this scheme slow group velocities for these optical pulses can be automatically equalized in terms of the inherent symmetric atomic configuration, and the various absorptions can be overcome by using three-photon hyper-Raman amplification. Additionally, the switching between cross-type nonlinear amplification and absorption could be realized by just changing the sign of the difference between two pump detunings. This is useful for the implementations of all-optical switches. The linearity and cross nonlinearity in the Doppler-broadened medium with different laser propagating configurations have also been investigated.
Hypertension,among diabetes,obesity and others,is one of the common human diseases that is genetically expressed as complex traits to which genetic,environmental,and demographic factors contribute *** the underlying g...
详细信息
Hypertension,among diabetes,obesity and others,is one of the common human diseases that is genetically expressed as complex traits to which genetic,environmental,and demographic factors contribute *** the underlying genes and examining their interactions, a crucial step in understanding the molecular pathogenesis of complex diseases,is both a statistical and a computational challenge,stressing the need for novel strategies to move this process *** this paper we propose a new method to study the association of multiple gene interactions for complex *** method is carried out by two ***,we sequentially select additionally associated SNP loci combinations by minimizing the p-value of a test based on an information measure,measure of information ***,this approach is called MID ***,the significance of the selected associated loci combinations is assessed by an x *** MID method is model-free and nonparametric,it is easy to compute and *** capability of the MID method is confirmed by applying it to investigate the multiple gene interactions on risk of hypertension in northern Han Chinese,where thirty-three SNP loci with three-genotype in eleven candidate genes are *** results are consistent with those of Gu et al(2006).Additionally,we get some other new *** indicates that our idea is indeed feasible and useful in practice.
Online learning, where feature spaces can change over time, offers a flexible learning paradigm that has attracted considerable attention. However, it still faces three significant challenges. First, the heterogeneity...
详细信息
Online learning, where feature spaces can change over time, offers a flexible learning paradigm that has attracted considerable attention. However, it still faces three significant challenges. First, the heterogeneity of real-world data streams with mixed feature types presents challenges for traditional parametric modeling. Second, data stream distributions can shift over time, causing an abrupt and substantial decline in model performance. Additionally, the time and cost constraints make it infeasible to label every data instance in a supervised setting. To overcome these challenges, we propose a new algorithm Online Learning from Mix-typed, Drifted, and Incomplete Streaming Features (OL-MDISF), which aims to relax restrictions on both feature types, data distribution, and supervision information. Our approach involves utilizing copula models to create a comprehensive latent space, employing an adaptive sliding window for detecting drift points to ensure model stability, and establishing label proximity information based on geometric structural relationships. To demonstrate the model’s efficiency and effectiveness, we provide theoretical analysis and comprehensive experimental results.
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile,...
详细信息
As an advanced carrier of on-board sensors, connected autonomous vehicle (CAV) can be viewed as an aggregation of self-adaptive systems with monitor-analyze-plan-execute (MAPE) for vehicle-related services. Meanwhile, machine learning (ML) has been applied to enhance analysis and plan functions of MAPE so that self-adaptive systems have optimal adaption to changing conditions. However, most of ML-based approaches don’t utilize CAVs’ connectivity to collaboratively generate an optimal learner for MAPE, because of sensor data threatened by gradient leakage attack (GLA). In this article, we first design an intelligent architecture for MAPE-based self-adaptive systems on Web 3.0-based CAVs, in which a collaborative machine learner supports the capabilities of managing systems. Then, we observe by practical experiments that importance sampling of sparse vector technique (SVT) approaches cannot defend GLA well. Next, we propose a fine-grained SVT approach to secure the learner in MAPE-based self-adaptive systems, that uses layer and gradient sampling to select uniform and important gradients. At last, extensive experiments show that our private learner spends a slight utility cost for MAPE (e.g., \(0.77\%\) decrease in accuracy) defending GLA and outperforms the typical SVT approaches in terms of defense (increased by \(10\%\sim 14\%\) attack success rate) and utility (decreased by \(1.29\%\) accuracy loss).
暂无评论