Mobile cloud computing has emerged as one of the most promising technologies, which can greatly enlarge the application range of mobile devices by moving data storage and processing to powerful and centralized computi...
详细信息
ISBN:
(纸本)9789897581632
Mobile cloud computing has emerged as one of the most promising technologies, which can greatly enlarge the application range of mobile devices by moving data storage and processing to powerful and centralized computing platforms located in clouds. However, how to keep data security and data privacy is an important and challenging issue when users outsource their sensitive data to mobile cloud for sharing. In this paper, we present a novel lightweight and fine-grained data access control scheme based on attribute-based encryption for mobile cloud computing. The analysis shows that the proposed scheme can meet the security requirement of mobile cloud computing, and provide flexible and expressive data access control policy. Furthermore, it has less computation cost compared with other schemes.
The 3-D Robust Detail Preserving Anisotropic Diffusion (3-D RDPAD) is an anisotropic diffusion which has many advantages on 3-D ultrasound image processing, especially in 3-D cattle follicle ultrasound Images. The 3-D...
详细信息
Sparse representation has been applied to background detecting by finding the best candidate with minimal reconstruction error using target templates. However most sparse representation based methods only consider the...
详细信息
In order to overcome the blindness of the evaluation on contexts in the classical Dendritic Cell Algorithm (DCA), how weight matrixes influence detection results is analyzed, and two kinds of DCA which can adjust fals...
详细信息
In this paper, an anisotropic diffusion filtering algorithm is proposed by modifying the diffusion coefficient and the instantaneous coefficient of variation (ICOV). This algorithm can reduce the speckle in the ultras...
详细信息
Clustering algorithm is often used to analyze the communication data for network intrusion detection system. However, network communication data are mixed, e.g., numerical and categorical data. So, at first, this pape...
详细信息
ISBN:
(纸本)9781509040940
Clustering algorithm is often used to analyze the communication data for network intrusion detection system. However, network communication data are mixed, e.g., numerical and categorical data. So, at first, this paper put forward a method for representing the cluster center (prototype) of mixed-type data. Then respectively in combination with the continuity characteristic of the numerical attributes and the semantic feature of the categorical attributes, the dissimilarity measurement formula was improved by use of the Gauss kernel function, on the base of which, defined the objective function. After that this paper further put forward an Improved Mixed-type Data based Kernel Clustering Algorithm (IKCA-MD), which showed a stable clustering result because the initial cluster centers are obtained by Maximum Density and Distance method (MDD). Finally the feasibility and effectiveness of the method for the network intrusion detection were verified by experiments.
At present, a larger number of researchers analyzed Micro-blog orientation and they concentrated their energy on emotional words, adverb and negative words without considering the impact of other emotional factors, su...
详细信息
In this paper, a novel supervised multiple manifolds learning method is presented for dimensionality reduction, which is titled locally linear representation manifold margin (LLRMM). In the proposed LLRMM, both an int...
详细信息
Breast cancer is a great threat for women around the world. Mammography is the main approach for early detection and diagnosis. Microcalcification (MC) in mammograms is one of the important early signs of breast cance...
详细信息
Sparse coding algorithms with geometrical constraints have received much attention recently. However, these methods are unsupervised and might lead to less discriminative representations. In this paper, we propose a s...
详细信息
暂无评论