With the further development of the cloud computing, the security of the cloud computing is becoming increasingly prominent. Based on analyzing the development status of cloud computing, this article will focus on stu...
详细信息
ISBN:
(纸本)9781510830981
With the further development of the cloud computing, the security of the cloud computing is becoming increasingly prominent. Based on analyzing the development status of cloud computing, this article will focus on studying the security of cloud computing in data, and discuss the data security problems in the process of data life cycle in cloud environment. Then the paper will put forward the corresponding measures and data encryption technology, in order to protect the data security of cloud computing.
To improve the performance of K-means clustering algorithm, this paper presents a new hybrid approach of Enhanced artificial bee colony algorithm and Kmeans(EABCK). In EABCK, the original artificial bee colony algorit...
详细信息
To improve the performance of K-means clustering algorithm, this paper presents a new hybrid approach of Enhanced artificial bee colony algorithm and Kmeans(EABCK). In EABCK, the original artificial bee colony algorithm(called ABC) is enhanced by a new mutation operation and guided by the global best solution(called EABC). Then, the best solution is updated by Kmeans in each iteration for data clustering. In the experiments, a set of benchmark functions was used to evaluate the performance of EABC with other comparative ABC variants. To evaluate the performance of EABCK on data clustering, eleven benchmark datasets were utilized. The experimental results show that EABC and EABCK outperform other comparative ABC variants and data clustering algorithms, respectively.
Service composition is an important means for integrating the individual web services to create new value added systems that can satisfy complex requirements. Such applications are subject to unexpected failure owing ...
详细信息
Gait recognition is a rising biometric technology which aims to distinguish people purely through the analysis of the way they walk, while the problem is that the dimensionality of the gait data is too high, so it is ...
详细信息
ISBN:
(纸本)9781509006212
Gait recognition is a rising biometric technology which aims to distinguish people purely through the analysis of the way they walk, while the problem is that the dimensionality of the gait data is too high, so it is necessary to carry on dimensionality reduction task. Up to date, in the area of computer vision and pattern recognition, various dimensionality reduction algorithms have been employed for gait data, including the conventional vector representation based methods principal components analysis (PCA) and, locality preserving projection (LPP), and the recently proposed multi-linear subspace learning based approaches such as multilinear principal component analysis (MPCA). In this paper, inspired by the advantages of the tensor representation and manifold learning, we propose a novel sparse tensor discriminative locality alignment for human gait feature representation and dimensionality reduction algorithm, and sub-sequently apply the refined feature for gait recognition by a lazy classifier of the KNN. The proposed method adopts sparse multi-way projection based on the high-order version of discriminative locality alignment, by which the class separability is enhanced and the potential model overfitting is simultaneously avoided. Extensive experiments on the University of South Florida (USF) HumanID Gait Database show that the proposed method achieves better recognition rate compared with some existing classical dimensionality reduction algorithms.
Privacy is a critical issue in many WSN applications because wireless sensor networks (WSNs) are vulnerable to malicious attacks due to their characteristics. Existing hop by hop and shuffling based privacy preserving...
详细信息
The Common information Model (CIM) has been heavily used in electric power grids for data exchange among a number of auxiliary systems such as communication systems, monitoring systems, and marketing systems. With a r...
详细信息
In this paper, a hierarchical image matting model is proposed to extract blood vessels from fundus images. More specifically, a hierarchical strategy utilizing the continuity and extendibility of retinal blood vessels...
详细信息
It is recognized that both sources of and solutions to the big data challenges are human collective *** are an abstract representation of the quantity of realistic entities and perceived *** data play an indispensable...
详细信息
It is recognized that both sources of and solutions to the big data challenges are human collective *** are an abstract representation of the quantity of realistic entities and perceived *** data play an indispensable role not only in a wide range of engineering applications,but also in the cognitive mechanisms of both humans and cognitive robots such as sensation,quantification,qualification,estimation,memory,and *** keynote lecture presents online big data analytic theories by machine learning as well as knowledge extraction by cognitive ***,information,knowledge,and intelligence are the four hierarchical layers of cognitive objects in the brain and cognitive systems from the bottom *** is discovered by the author that,although the cognitive unit of data is bit,that of knowledge is bir,i.e.,a binary relation.A resent finding towards big data science is that big data systems in nature are a recursive ndimensional typed hyperstructure(RNDTHS).This topological property of big data reveals that the mathematical foundation of big data science is underpinned by big data algebra(BDA),which is a denotational mathematical structure for efficiently dealing with the inherited complexities and unprecedented challenges in big data *** leads to a coherent theory for big data modeling,analyses,mining,information elicitation,knowledge extraction,and intelligent generation for cognitive *** experiments demonstrate that cognitive robots may autonomously transform big data in vast linguistic databases(corpuses) into sophistic knowledge bases by cognitive machine learning.
Social networks enable users to freely communicate with each other and share their recent news, ongoing activities or views about different topics. As a result, they can be seen as a potentially viable source of infor...
详细信息
Social networks enable users to freely communicate with each other and share their recent news, ongoing activities or views about different topics. As a result, they can be seen as a potentially viable source of information to understand the current emerging topics/events. The ability to model emerging topics is a substantial step to monitor and summarize the information originating from social sources. Applying traditional methods for event detection which are often proposed for processing large, formal and structured documents, are less effective, due to the short length, noisiness and informality of the social posts. Recent event detection techniques address these challenges by exploiting the opportunities behind abundant information available in social networks. This article provides an overview of the state of the art in event detection from social networks.
As the development and use of Open-Ended Learning Environments (OELEs) continues to increase, supporting students' learning in these environments with Intelligent Tutoring is rapidly becoming an important area of ...
详细信息
ISBN:
(纸本)9789869401210
As the development and use of Open-Ended Learning Environments (OELEs) continues to increase, supporting students' learning in these environments with Intelligent Tutoring is rapidly becoming an important area of research. Many existing learning environments guide students in step-by-step processes to reach their learning goal;consequently, data preprocessing is well defined. In OELEs, in contrast, students may achieve task goals through multiple pathways, and there exist multiple ways to assess performance. We present a simulation OELE designed to teach students decision-making in a complex problem solving task. To provide Intelligent Tutoring Support, we are required to track performance along several dimensions. We present our approach to extract data for performance assessments that can be leveraged to provide Intelligent Tutoring Support. We generalize our approach and present guidelines applicable for similar OELEs. Copyright 2016 Asia-Pacific Society for computers in Education. All rights reserved.
暂无评论