This paper investigates gaze estimation solutions for interacting children with Autism Spectrum Disorders (ASD). Previous research shows that satisfactory accuracy of gaze estimation can be achieved in constrained set...
详细信息
This paper presents a fast and robust level set method for image segmentation. To enhance the robustness against noise, we embed a Markov random field (MRF) energy function to the conventional level set energy functio...
详细信息
This paper proposes a multi-objective with dynamic topology particle swarm optimization (PSO) algorithm for solving multi-objective problems, named DTPSO. One of the main drawbacks of classical multi-objective particl...
详细信息
This paper analyzed some problems in the current information security experiment teaching, and then proposed a teaching method taking students as the main body, the teacher as the auxiliary heuristic, in order to cult...
详细信息
This paper analyzed some problems in the current information security experiment teaching, and then proposed a teaching method taking students as the main body, the teacher as the auxiliary heuristic, in order to cultivate students' autonomous learning ability and enhance the students' skills of finding, thinking and solving problems. The course of information security experiment in our country is unique among colleges and universities. According to our university's information security major characteristics, we proposed the comprehensive information security major experiment content, and made comprehensive experimental network as an example, introducing the experimental content in detail. It will play a key role in training the ability of excellent talents.
With the deepening of educational reform and the changing of talent training model, the past teaching methods of information security courses have been exposed many drawbacks. This paper focuses on the information sec...
详细信息
With the deepening of educational reform and the changing of talent training model, the past teaching methods of information security courses have been exposed many drawbacks. This paper focuses on the information security training program of the talent, studies the teaching mode for the current information security of the brand professional courses, proposes a "core + assist" teaching mode, teaching mode of the actual combat drills and the combination of production study and research can solve the main problems of the current information security professional training, Meanwhile we should improve the teaching methods, incorporate the three methods, which is the reasonable choice of the teaching content, the constantly update of teaching software, and guides the student to study the open- source projects, and put this three means into the teaching process of the information security of the brand professional courses, so it can stimulate students' interest in learning, and reach the goal of putting knowledge into action.
With the rapid development of Internet and constant improvement of informationization degree, all kinds of security problems become increasingly prominent. Especially Computer system security is faced with serious cha...
详细信息
With the rapid development of Internet and constant improvement of informationization degree, all kinds of security problems become increasingly prominent. Especially Computer system security is faced with serious challenges. In such case, whether the course of Computer system security taught in colleges and universities can be advanced with the times plays an important role in dealing with the challenge. Based on the current situation of Computer system security course, this thesis analyzed and studied how to realize the innovative reform of Computer system security course.
According to the characteristics of computer virus course, the paper explores some methods and the experience of teaching this course from a practical perspective. Based on the file virus analysis and the detailed cur...
详细信息
According to the characteristics of computer virus course, the paper explores some methods and the experience of teaching this course from a practical perspective. Based on the file virus analysis and the detailed curriculum instructional design, it focuses on the topics such as how to combine the theory with the teaching practice, how to stimulate the students' study enthusiasm and how to enhance their colligate abilities.
In this paper, a new method is proposed to evaluate the performance of concurrent systems. A concurrent system consisting of multiple processes that communicate via message passing mechanisms is modeled by a Petri net...
详细信息
Cloud is an emerging computing *** has drawn extensive attention from both academia and *** its security issues have been considered as a critical obstacle in its rapid *** data owners store their data as plaintext in...
详细信息
Cloud is an emerging computing *** has drawn extensive attention from both academia and *** its security issues have been considered as a critical obstacle in its rapid *** data owners store their data as plaintext in cloud,they lose the security of their cloud data due to the arbitrary accessibility,specially accessed by the un-trusted *** order to protect the confidentiality of data owners’cloud data,a promising idea is to encrypt data by data owners before storing them in ***,the straightforward employment of the traditional encryption algorithms can not solve the problem well,since it is hard for data owners to manage their private keys,if they want to securely share their cloud data with others in a fine-grained *** this paper,we propose a fine-grained and heterogeneous proxy re-encryption(FHPRE)system to protect the confidentiality of data owners’cloud *** applying the FH-PRE system in cloud,data owners’cloud data can be securely stored in cloud and shared in a fine-grained ***,the heterogeneity support makes our FH-PRE system more efficient than the previous ***,it provides the secure data sharing between two heterogeneous cloud systems,which are equipped with different cryptographic primitives.
暂无评论