Most previous works on combinational equivalence checking use BDDs and other Boolean level representations to formulate and solve the problem, and therefore, not utilizing the word-level information inherently present...
详细信息
作者:
Wei DuZhongbo CaoYan WangEnrico BlanzieriChen ZhangYanchun LiangCollege of Mathematics
Jilin University Changchun 130012 China Department of Information and Communication Technology University of Trento Povo 38050 Italy College of Computer Science and Technology
Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China College of Computer Science and Technology Key Laboratory of Symbol Computation and Knowledge Engineering of the Ministry of Education Jilin University Changchun 130012 China
Deep web could automatically produce web pages according to the query criteria of users. The report found most query result page store data information using table form. knowledge management, information retrieval, We...
详细信息
Deep web could automatically produce web pages according to the query criteria of users. The report found most query result page store data information using table form. knowledge management, information retrieval, Web mining, abstract extraction and so on were benefited from automatically understanding of table forms. The study web forms on the web information extraction and integration have important significance. This paper proposed a domain-specific ontology based strategy for integration tables, and this method could independent the structure of table. Experimental results confirm that this method could effectively improve the accuracy of integration.
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time...
详细信息
Analyzing two improved YCH schemes and a multi-secret sharing scheme based on homogeneous linear recursion, we propose and implement a new verifiable multi-secret sharing model based on Shamir secret sharing. The time complexity of this model in the phase of secrets recovery is O(k×t2), which is superior to other two improved YCH models (O(t3) (t>k) O(k3) (t≤k), O(k×(n+k)2)), and the time of secrets synthesis in the actual simulation is less than that of the other three models. Further, we compare the advantages and disadvantages of the four models on the time complexity, verifiability and open values. When n>k, the open values the new model needs are fewer than those of the other two improved YCH models. The experimental results show that the new model is better than the other three models on the time of secrets recovery.
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TC...
详细信息
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TCM has many security features, including integrity measure, integrity report and trusted storage, which can make a vehicular electronic system achieve a trusted boot process and encrypt data and information for storage protection, thereby improving the privacy and security of vehicular platform information. Referring to the TNC(trusted network connect)architecture, we design a kind of vehicular terminal access model compatible with the TNC to authenticate and authorize the trusted vehicular platform with TCM to access Internet of vehicles. The vehicular terminal access model proposed will improve the credibility and security of the Internet of vehicles.
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering met...
详细信息
Nowadays, e-mail is one of the most inexpensive and expeditious means of communication. However, a principal problem of any internet user is the increasing number of spam, and therefore an efficient spam filtering method is imperative. Feature selection is one of the most important factors, which can influence the classification accuracy rate. To improve the performance of spam prediction, this paper proposes a new fuzzy adaptive multi-population parallel genetic algorithm (FAMGA) for feature selection. To maintain the diversity of population, a few studies of multi-swarm strategy are reported, whereas the dynamic parameter setting has not been considered further. The proposed method is based on multiple subpopulations and each subpopulation runs in independent memory space. For the purpose of controlling the subpopulations adaptively, we put forward two regulation strategies, namely population adjustment and subpopulation adjustment. In subpopulation adjustment, a controller is designed to adjust the crossover rate for each subpopulation, and in population adjustment, a controller is designed to adjust the size of each subpopulation. Three publicly available benchmark corpora for spam filtering, the PU1, Ling-Spam and Spam Assassin, are used in our experiments. The results of experiments show that the proposed method improves the performance of spam filtering, and is significantly better than other feature selection methods. Thus, it is proved that the multi-population regulation strategy can find the optimal feature subset, and prevent premature convergence of the population.
Image retrieval has been an active research topic due to its great importance in the field of image management, digital library and web searching. However, the performances of the existing approaches, including text-b...
详细信息
A new method for simulating the folding pathway of RNA secondary structure using the modified ant colony algorithmis *** a given RNA sequence,the set of all possible stems is obtained and the energy of each stem iscal...
详细信息
A new method for simulating the folding pathway of RNA secondary structure using the modified ant colony algorithmis *** a given RNA sequence,the set of all possible stems is obtained and the energy of each stem iscalculated and stored at the initial ***,a more realistic formula is used to compute the energy ofmulti-branch loop in the following *** a folding pathway is simulated,including such processes as constructionof the heuristic information,the rule of initializing the pheromone,the mechanism of choosing the initial andnext stem and the strategy of updating the pheromone between two different *** by testing RNA sequences withknown secondary structures from the public databases,we analyze the experimental data to select appropriate values *** measure indexes show that our procedure is more consistent with phylogenetically proven structures thansoftware RNAstructure sometimes and more effective than the standard Genetic Algorithm.
To represent and reason with interval-value information of applications in description logic, based on interval-fuzzy set the classical des cription logic ALCN is extended to the fuzzy description logic IFALCN. Its...
详细信息
For the low accuracy and imprecise of contour detection evaluation algorithm for a natural image with Ground Truth, we proposed a neighborhood matching algorithm, which had been combined with the original algorithm, a...
详细信息
For the low accuracy and imprecise of contour detection evaluation algorithm for a natural image with Ground Truth, we proposed a neighborhood matching algorithm, which had been combined with the original algorithm, and then modified the accuracy of the formula, at last we got the contour detection evaluation algorithm of this paper. Through assessing the contour detection images processed by Canny operator, compared with the original algorithm, The algorithm improved the accuracy value of assessment of contour detection.
暂无评论