The operation of splicing on words was introduced by Tom Head while proposing a theoretical model of DNA recombination. Subsequent investigations on splicing on linear and circular strings of symbols have resulted in ...
详细信息
In order to detect and count pedestrians in different kinds of scenes, this paper put forward a method of solving the problem on video sequences captured from a fixed camera. After preprocessing operations on the orig...
详细信息
Mobile cloud computing has emerged as one of the most promising technologies, which can greatly enlarge the application range of mobile devices by moving data storage and processing to powerful and centralized computi...
详细信息
ISBN:
(纸本)9789897581632
Mobile cloud computing has emerged as one of the most promising technologies, which can greatly enlarge the application range of mobile devices by moving data storage and processing to powerful and centralized computing platforms located in clouds. However, how to keep data security and data privacy is an important and challenging issue when users outsource their sensitive data to mobile cloud for sharing. In this paper, we present a novel lightweight and fine-grained data access control scheme based on attribute-based encryption for mobile cloud computing. The analysis shows that the proposed scheme can meet the security requirement of mobile cloud computing, and provide flexible and expressive data access control policy. Furthermore, it has less computation cost compared with other schemes.
The 3-D Robust Detail Preserving Anisotropic Diffusion (3-D RDPAD) is an anisotropic diffusion which has many advantages on 3-D ultrasound image processing, especially in 3-D cattle follicle ultrasound Images. The 3-D...
详细信息
Sparse representation has been applied to background detecting by finding the best candidate with minimal reconstruction error using target templates. However most sparse representation based methods only consider the...
详细信息
In order to overcome the blindness of the evaluation on contexts in the classical Dendritic Cell Algorithm (DCA), how weight matrixes influence detection results is analyzed, and two kinds of DCA which can adjust fals...
详细信息
In this paper, an anisotropic diffusion filtering algorithm is proposed by modifying the diffusion coefficient and the instantaneous coefficient of variation (ICOV). This algorithm can reduce the speckle in the ultras...
详细信息
Clustering algorithm is often used to analyze the communication data for network intrusion detection system. However, network communication data are mixed, e.g., numerical and categorical data. So, at first, this pape...
详细信息
ISBN:
(纸本)9781509040940
Clustering algorithm is often used to analyze the communication data for network intrusion detection system. However, network communication data are mixed, e.g., numerical and categorical data. So, at first, this paper put forward a method for representing the cluster center (prototype) of mixed-type data. Then respectively in combination with the continuity characteristic of the numerical attributes and the semantic feature of the categorical attributes, the dissimilarity measurement formula was improved by use of the Gauss kernel function, on the base of which, defined the objective function. After that this paper further put forward an Improved Mixed-type Data based Kernel Clustering Algorithm (IKCA-MD), which showed a stable clustering result because the initial cluster centers are obtained by Maximum Density and Distance method (MDD). Finally the feasibility and effectiveness of the method for the network intrusion detection were verified by experiments.
At present, a larger number of researchers analyzed Micro-blog orientation and they concentrated their energy on emotional words, adverb and negative words without considering the impact of other emotional factors, su...
详细信息
In this paper, a novel supervised multiple manifolds learning method is presented for dimensionality reduction, which is titled locally linear representation manifold margin (LLRMM). In the proposed LLRMM, both an int...
详细信息
暂无评论