Aiming at the low utilization rate of attribute information and the lack of mining of the correlation among attributes of the existing cross-social network user identity matching algorithms, we proposed an algorithm f...
Aiming at the low utilization rate of attribute information and the lack of mining of the correlation among attributes of the existing cross-social network user identity matching algorithms, we proposed an algorithm for user identity matching across social networks utilizing fuzzy measure and Choquet integrals. Firstly, according to the characteristics of different attributes, we determineddifferent similarity calculation strategies; Secondly, we utilized particle swarm optimization method to calculate the fuzzy density of each attribute; Then Choquet integral was utilized to calculate the similarity of two accounts; Finally, the similarity was compared with the preset matching threshold and the final matching result was obtained. The experimental results in multiple sets of data showed that the average F1 value of the proposed algorithm reaching 84.5%. The performance is not only better than traditional machine learning methods, but also better than several baseline algorithms. It can be more accurate to identify the same user's accounts in multiple social networks according to the attribute information.
In recent years, SdN(Software defined Network) as a new network architecture has become the hot research point. Meanwhile,the well-known Open Flow-based SdN got a lot of attention. But it can't provide a flexible ...
详细信息
In recent years, SdN(Software defined Network) as a new network architecture has become the hot research point. Meanwhile,the well-known Open Flow-based SdN got a lot of attention. But it can't provide a flexible and effective network resource description *** an open programmable technology, For CES(Forwarding and Control Element Separation)has also been concerned. However, For CES is confined within a single network node and cannot be applied to the entire network. This paper proposes a new architecture — ForS A(ForC ESbased SdN architecture). The architecture is added a configuration layer based on the traditional SdN architecture, which solves the problem that the northbound interface is not clear between the application layer and the control layer in the SdN architecture. ForS A also implements the compatibility within various forwarding devices in the forwarding layer.
In cyberspace,unknown zero-day attacks can bring safety *** defense methods based on signatures are *** on the Cyberspace Mimic defense(CMd)architecture,the paper proposes a framework to detect the attacks andrespond...
详细信息
In cyberspace,unknown zero-day attacks can bring safety *** defense methods based on signatures are *** on the Cyberspace Mimic defense(CMd)architecture,the paper proposes a framework to detect the attacks andrespond to *** are assigned to all online redundant heterogeneous functionally equivalent *** independent outputs are compared and the outputs in the majority will be the final *** abnormal outputs can be detected and so can the *** damaged executive modules with abnormal outputs will be replaced with new ones from the diverse executive module *** analyzing the abnormal outputs,the correspondence between inputs and abnormal outputs can be built and inputs leading to recurrent abnormal outputs will be written into the zero-day attack relateddatabase and theirreuses cannot work any longer,as the suspicious malicious inputs can be detected and *** responses include IP blacklisting and patching,*** framework also uses honeypot like executive module to confuse the *** proposed method can prevent the recurrent attack based on the same exploit.
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middl...
详细信息
To address the issues that middleboxes as a fundamental part of today's networks are facing, Network Function Virtualization(NFV)has been recently proposed, which in essence asserts to migrate hardware-based middleboxes into software-based virtualized function *** to the demands of virtual services placement in NFV network environment, this paper models the service amount placement problem involving with the resources allocation as a cooperative game and proposes the placement policy by Nash Bargaining Solution(NBS). Specifically,we first introduce the system overview and apply the rigorous cooperative game-theoretic guide to build the mathematical model, which can give consideration to both the responding efficiency of service requirements and the allocation *** a distributed algorithm corresponding to NBS is designed to achieve predictable network performance for virtual instances ***, with simulations under various scenarios,the results show that our placement approach can achieve high utilization of network through the analysis of evaluation metrics namely the satisfaction degree and fairness index. With the suitable demand amount of services, the average values of two metrics can reach above 90%. And by tuning the base placement, our solution can enable operators to flexibly balance the tradeoff between satisfaction and fairness of resourcessharing in service platforms.
In this paper, we present a meander-line monopole antenna for Unmanned Aerial Vehicle (UVA). In order to improve the resonant characteristic and expand the bandwidth, a couple of coupled patches have been added. It al...
详细信息
Image segmentation can be used in non-destructive testing, tracking andrecognition. Level set method for image segmentation has poor performance on efficiency. In this paper, we propose to use max-flow algorithm to o...
详细信息
As the technology scales down, the single-event transient(SET) has become a great concern for the reliability of integrated circuits(ICs). A novel time redundant flip-flop structure is proposed to detect and correct t...
详细信息
ISBN:
(纸本)9781467397209
As the technology scales down, the single-event transient(SET) has become a great concern for the reliability of integrated circuits(ICs). A novel time redundant flip-flop structure is proposed to detect and correct the SET pulse. The most advantage of this structure is that it has very little setup and hold time overhead and the architecture need not be modified to recover the system. HSPICE simulation is adopted verify the validation of this structure. Finally, we give the use of this flip-flop in the pipeline based architecture.
To predict the radiation emission of the FPGA, the radiation emission model for the chip is proposed with ICEM and the simulation result is also presented in this paper. The linear near-field surface scan system (LNFS...
详细信息
To predict the radiation emission of the FPGA, the radiation emission model for the chip is proposed with ICEM and the simulation result is also presented in this paper. The linear near-field surface scan system (LNFS) following electromagnetic compatibility standard is applied to measure the emission. It is illustrated that the simulation results agree with the measurements, so the value of the model for practical application is verified.
In order to effectively identify and extract the red signal from the leakage signal in the computer's power line, a method based on particle swarm optimization (PSO) is proposed to optimize the multi classificatio...
详细信息
In order to effectively identify and extract the red signal from the leakage signal in the computer's power line, a method based on particle swarm optimization (PSO) is proposed to optimize the multi classification support vector machine (SVM). Firstly, the conductive leakage signal is filtered. Then the SVM penalty parameter and kernel parameter are optimized by PSO, the conduction leakage signal is trained and classified. Finally, the classification performance of the un-optimized SVM is compared with PSO-SVM. The result shows that this method has higher classification rate than the grid search method. The classification andrecognition rate reaches 87.23%.
The purpose of this paper is to find a more effective way to reconstruct the structure of a *** this paper,the principle of ISAr and In ISAr signal formation and imaging are analyzed by the perspective of analyzing th...
详细信息
The purpose of this paper is to find a more effective way to reconstruct the structure of a *** this paper,the principle of ISAr and In ISAr signal formation and imaging are analyzed by the perspective of analyzing the target linear frequency modulation echo signal and combining with ISAr imaging *** proposed a method of In ISAr scattering point extraction technology based on CLEAN algorithm and threshold *** compare it to the method of image matching *** simulation results show that the In ISArreconstruction technique based on scattering point extraction method is a more effective one,with higherdetection probability and has an ability to suppress the influence of noise and sidelobe effect,under the condition of noise.
暂无评论