There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the *** propose a pyramid scheme model which has the principal characters of many pyramid schemes that have app...
详细信息
There are various types of pyramid schemes that have inflicted or are inflicting losses on many people in the *** propose a pyramid scheme model which has the principal characters of many pyramid schemes that have appeared in recent years: promising high returns, rewarding the participants for recruiting the next generation of participants, and the organizer takes all of the money away when they find that the money from the new participants is not enough to pay the previous participants interest and *** assume that the pyramid scheme is carried out in the tree network, Erd?s–Réney(ER) random network, Strogatz–Watts(SW) small-world network, or Barabasi–Albert(BA) scale-free *** then give the analytical results of the generations that the pyramid scheme can last in these *** also use our model to analyze a pyramid scheme in the real world and we find that the connections between participants in the pyramid scheme may constitute a SW small-world network.
Compared with traditional magnetic disks, Flash memory has many advantages and has been used as external storage media for a wide spectrum of electronic devices (such as PDA, MP3, Digital Camera and Mobile Phone) in r...
详细信息
Video has become popular in our daily life for both professional and consumer applications. Both low level video processing and high level semantic video analysis are critically computational tasks in application doma...
详细信息
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains t...
详细信息
This paper considers the problem of constructing data aggregation trees in wireless sensor networks (WSNs)for a group of sensor nodes to send collected information to a single sink *** data aggregation tree contains the sink node,all the source nodes,and some other non-source *** goal of constructing such a data aggregation tree is to minimize the number of non-source nodes to be included in the tree so as to save *** prove that the data aggregation tree problem is NP-hard and then propose an approximation algorithm with a performance ratio of four and a greedy *** also give a distributed version of the approximation *** simulations are performed to study the performance of the proposed *** results show that the proposed algorithms can find a tree of a good approximation to the optimal tree and has a high degree of scalability.
Online support groups offer a new way to users to communicate with others regarding certain health issues. Taking autism-related support groups on Facebook as an example, we examine whether the expressed emotions diff...
详细信息
Online support groups offer a new way to users to communicate with others regarding certain health issues. Taking autism-related support groups on Facebook as an example, we examine whether the expressed emotions differ between female and male users in online health-related support groups and whether such gender disparity varied based on the topics of the groups. Experimental results reveal a significant gender difference of expressed emotions in the groups. We find that female users tended to express more positive emotions in the group discussions than the male group members did. In addition, users appeared to express different sentiments within the groups focused on various topics. Male users tend to convey more negative emotions in the group that related to treatment, while female users were more positive when posted in the research-related group than male users were. This study is beneficial for tracking and moderating the emotional environment in online support groups. 84 Annual Meeting of the Association for Information Science & Technology | Oct. 29 – Nov. 3, 2021 | Salt Lake City, UT. Author(s) retain copyright, but ASIS&T receives an exclusive publication license.
The developable surface is an important surface in computer aided design, geometric modeling and industrial manufactory. It is often given in the standard parametric form, but it can also be in the implicit form which...
详细信息
The developable surface is an important surface in computer aided design, geometric modeling and industrial manufactory. It is often given in the standard parametric form, but it can also be in the implicit form which is commonly used in algebraic geometry. Not all algebraic developable surfaces have rational parametrizations. In this paper, the authors focus on the rational developable surfaces. For a given algebraic surface, the authors first determine whether it is developable by geometric inspection, and then give a rational proper parametrization in the affrmative case. For a rational parametric surface, the authors also determine the developability and give a proper reparametrization for the developable surface.
In the field of robust audio watermarking,how to seek a good trade-off between robustness and imperceptibility is challenging. The existing studies use the same embedding parameter for each part of the audio signal, w...
详细信息
In the field of robust audio watermarking,how to seek a good trade-off between robustness and imperceptibility is challenging. The existing studies use the same embedding parameter for each part of the audio signal, which ignores that different parts may have different requirements for embedding parameters. In this work, the constraints on imperceptibility are first ***, we present a segment multi-objective optimization model of the scaling parameter under the constrained Signal-to-noise ratio(SNR) in Spread spectrum(SS)audio watermarking. Additionally, we adopt the Nondominated sorting genetic algorithm Ⅱ(NSGA-Ⅱ) to solve the proposed model. Finally, we compare our algorithm(called SS-SNR-NSGA-Ⅱ) with the existing methods. The experimental results show that the proposed SS-SNRNSGA-Ⅱ not only provides flexible choices for different application demands but also achieves more and better trade-offs between imperceptibility and robustness.
Complex spatial data is the fundamental content of Smart Earth. Spatial datamining plays an important role in Smart Earth. In this paper, it is proposed that "Smart earth equals to Digital Earth plus the Interne...
详细信息
We propose a novel and efficient technique to extract individual fingerprints from a slap-image and identify them into their corresponding indices i.e. index, middle, ring or little finger of left/right hand. We pose ...
详细信息
The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in unt...
详细信息
The emergence of smart contracts has increased the attention of industry and academia to blockchain technology,which is tamper-proofing,decentralized,autonomous,and enables decentralized applications to operate in untrustworthy ***,these features of this technology are also easily exploited by unscrupulous individuals,a typical example of which is the Ponzi scheme in *** negative effect of unscrupulous individuals writing Ponzi scheme-type smart contracts in Ethereum and then using these contracts to scam large amounts of money has been *** solve this problem,we propose a detection model for detecting Ponzi schemes in smart contracts using *** this model,our innovation is shown in two aspects:We first propose to use two bytes as one characteristic,which can quickly transform the bytecode into a high-dimensional matrix,and this matrix contains all the implied characteristics in the ***,We innovatively transformed the Ponzi schemes detection into an anomaly detection ***,an anomaly detection algorithm is used to identify Ponzi schemes in smart *** results show that the proposed detection model can greatly improve the accuracy of the detection of the Ponzi scheme ***,the F1-score of this model can reach 0.88,which is far better than those of other traditional detection models.
暂无评论