Searchable encryption is a cryptographic primitive used to search an encrypted data in cloud storage. Recently, Cui et al. and Lu et al. proposed two variants of secure searchable encryption schemes, respectively. How...
详细信息
MGMT promoter methylation and IDH1 mutation in high-grade gliomas (HGG) have proven to be the two important molecular indicators associated with better prognosis. Traditionally, the statuses of MGMT and IDH1 are obtai...
详细信息
Public key encryption with keyword search (PEKS) provides an efficient way to search encrypted files. Recently, Rhee et al. contributed their knowledge to propose several literatures in this research area. In this pap...
详细信息
In the IEEE 802.16e/m standard, three power saving classes (PSCs) are defined to save the energy of a mobile sub- scriber station (MSS). However, how to set the parameters of PSCs to maximize the power saving and ...
详细信息
In the IEEE 802.16e/m standard, three power saving classes (PSCs) are defined to save the energy of a mobile sub- scriber station (MSS). However, how to set the parameters of PSCs to maximize the power saving and guarantee the quality of service is not specified in the standard. Thus, many algorithms were proposed to set the PSCs in IEEE 802.16 networks. However, most of the proposed algorithms consider only the power saving for a single MSS. In the algorithms designed for multiple MSSs, the sleep state, which is set for activation of state transition overhead power, is not considered. The PSC setting for real-time connections in multiple MSSs with consideration of the state transition overhead is studied. The problem is non-deterministic polynomial time hard (NP-hard), and a suboptimal algorithm for the problem is proposed. Simulation results demonstrate that the energy saving of the proposed algorithm is higher than that of state-of-the-art algorithms and approaches the optimum limit.
Automata theory is an important branch of theoretical computer science. ω-automaton is an important part of automata theory. The judgment standard for the equivalence of two automata is the equivalence of their accep...
详细信息
Although online examination for e-learning is widely realized *** the production of question bank is *** paper proposes an assessment authoring tool to assist teachers in creating reusable test question *** items conf...
详细信息
Although online examination for e-learning is widely realized *** the production of question bank is *** paper proposes an assessment authoring tool to assist teachers in creating reusable test question *** items conforms to the IMS Question and Test Interoperability(QTI) specification and are easy to share,reuse,exchange,and access across distributed learning management systems(LMS).System design and implementation were presented in this paper for sharing and contributing development experiences to related works.
Although online examination for e-learning is widely realized nowadays. However the production of question bank is time-consuming. This paper proposes an assessment authoring tool to assist teachers in creating reusab...
详细信息
Although online examination for e-learning is widely realized nowadays. However the production of question bank is time-consuming. This paper proposes an assessment authoring tool to assist teachers in creating reusable test question items. The items conforms to the IMS Question and Test Interoperability(QTI) specification and are easy to share,reuse,exchange,and access across distributed learning management systems(LMS). System design and implementation were presented in this paper for sharing and contributing development experiences to related works.
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image int...
详细信息
For robust face recognition tasks, we particularly focus on the ubiquitous scenarios where both training and testing images are corrupted due to occlusions. Previous low-rank based methods stacked each error image into a vector and then used L 1 or L 2 norm to measure the error matrix. However, in the stacking step, the structure information of the error image can be lost. Depart from the previous methods, in this paper, we propose a novel method by exploiting the low-rankness of both the data representation and each occlusion-induced error image simultaneously, by which the global structure of data together with the error images can be well captured. In order to learn more discriminative low-rank representations, we formulate our objective such that the learned representations are optimal for classification with the available supervised information and close to an ideal-code regularization term. With strong structure information preserving and discrimination capabilities, the learned robust and discriminative low-rank representation (RDLRR) works very well on face recognition problems, especially with face images corrupted by continuous occlusions. Together with a simple linear classifier, the proposed approach is shown to outperform several other state-of-the-art face recognition methods on databases with a variety of face variations.
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of Wi...
详细信息
It will incur high expense by sharing large-scale files (such as video) with others through commercial 4G networks. When the users are located at the same area, the traffic cost could be saved via the technology of WiFi direct. In this paper, a network-coding-based video transmission scheme is proposed for such scenario. In the scheme, when a source user needs to transmit a video to others, it equally splits the original file into multiple segments. When a neighbour connects to it and requests a segment, the user will linearly generate a new segment with all the segments it buffers, and then send the re-encoded segment to other neighbours. After the neighbours receive all or part of the segments, they could become a new source and send data to their own neighbours through the technology of WiFi direct. The results show that compared with the traditional scheme, the transmission scheme based on network coding could be used to complete transmission at a higher rate.
暂无评论