On Android platform, direction sensor is used to induce the direction change of the device. With the change of the device direction, the spatial position of 3D image also changes. However, users usually expect that th...
详细信息
In a two-tiered wireless sensor network, storage nodes act as an intermediate tier between sensors and the sink for storing data and processing queries. This architecture has been widely adopted because of the benefit...
详细信息
In a two-tiered wireless sensor network, storage nodes act as an intermediate tier between sensors and the sink for storing data and processing queries. This architecture has been widely adopted because of the benefits of power and storage saving for sensors as well as the efficiency of query processing. On the other hand, the importance of storage nodes also makes them attractive targets for compromise. A compromised storage node may leak sensitive information and breach data privacy. In this paper, we propose a privacy-preserving protocol specializing for top-k queries that prevents attackers from gaining sensitive information from sensor collected data. To preserve privacy, an orderpreserving encryption is employed to encrypt sensor data such that a storage node can correctly process top-k queries over encrypted data without knowing their actual values. Detailed theoretical and quantitative results confirm the high efficacy and efficiency of the proposed scheme.
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor net...
详细信息
In-network data aggregation has been adopted widely to reduce communication overhead and improve efficiency in wireless sensor networks. On the other hand, security is another basic requirement for wireless sensor network, and providing privacy without disrupting in-network data aggregation is a challenging problem. Although there have been extensive studies on privacy-preserving data aggregation for additive and multiplicative aggregation functions, nonlinear aggregation functions, such as maximum and minimum, have not been well addressed. In this paper, we present a privacy-preserving aggregation method specialized for MAX/MIN aggregation functions. To preserve privacy, encryption and the prefix membership verification scheme are employed, allowing an intermediate aggregator to correctly compare data without access to plaintext data, thus protect data privacy. Extensive simulations are conducted to evaluate the proposed schemes. The results show that our scheme provides privacy protection for both raw and aggregated data items, while achieving high efficiency in terms of energy consumption and time delay.
With the increasing popularity of cloud computing technology, a great many applications are submitted to the cloud platforms for execution. Faced with the low utilization efficiencies and high cost of resources, users...
详细信息
With the increasing popularity of cloud computing technology, a great many applications are submitted to the cloud platforms for execution. Faced with the low utilization efficiencies and high cost of resources, users need cloud services with "lowest pay and highest efficiency". In this paper, we define a new scheduling model for Partly Dependent Tasks (PDTs) which merge workflow tasks and independent tasks together. Moreover, the scheduling model also takes the time requirements of QoS (Quality of Service) constrains and cost reduction into consideration. In order to meet these requirements, an improved ant colony optimization algorithm also put forward to schedule the PDTs (PIACO). Furthermore, we experiment with a set of PDTs by varying many related parameters such as the iterations, colony size and different deadline settings. Finally, the proposed algorithm PIACO proves to be efficient and suitable for the cloud PDTs scheduling.
Face recognition research in recent years has made great progress, yet many issues still remain to be addressed. Illumination changes are one of the key issues. In order to eliminate the effect of varying illumination...
详细信息
Face recognition research in recent years has made great progress, yet many issues still remain to be addressed. Illumination changes are one of the key issues. In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on nonsubsampled Contourlet transform is proposed. Firstly, we perform illumination normalization on images under varying illumination, which can reduce the effect of varying illumination to some extent. Secondly, the logarithmic transformation and the nonsubsampled Contourlet transform is used to decompose the images into its low frequency and high frequency directional subband components. Thirdly, adaptive NormalShrink is applied to each directional subband to eliminate noise, and the histogram equalization is applied to the low frequency components aimed at weakening the illumination affects further. Lastly, the illumination invariant is obtained by inverse nonsubsampled Contourlet transform using the modified low frequency components and high frequency directional subband components. Experimental results on the Yale face database B and CMU PIE database show that the proposed method can effectively eliminate the effect of varying illumination on face recognition and the obtained illumination invariant is robust.
With the development of the cloud environment, the multi-copyright protection of the works should be further developing. The multi-watermarking is becoming a possible solution. In this paper, firstly, one novel hybrid...
详细信息
With the development of the cloud environment, the multi-copyright protection of the works should be further developing. The multi-watermarking is becoming a possible solution. In this paper, firstly, one novel hybrid multi-watermarking rule is proposed, and is used to embed the watermark into DWT domain. Secondly, corresponding to the hybrid embedding rule, the novel optimum hybrid additive multi-watermarking decoder is proposed, which is based on the minimum Bayesian risk criterion, and simultaneously the performance of the hybrid decoder is theoretically analyzed. The DWT coefficients are modeled as the generalized Gaussian distribution. Finally, the theoretical and empirical experimental results prove the theoretical analysis validity.
The protein folding problem, i.e., the prediction of the tertiary structures of protein molecules from their amino acid sequences is one of the most important problems in computational biology. This problem has been w...
详细信息
The protein folding problem, i.e., the prediction of the tertiary structures of protein molecules from their amino acid sequences is one of the most important problems in computational biology. This problem has been widely studied under the HP model in which each amino acid is classified, based on its hydro phobicity, as a hydrophobic (H) residue or a hydrophilic (or polar, P) one. The protein folding problem in the HP model is in fact to find conformations with the lowest energies for some benchmark amino acid sequences. A genetic algorithm (GA) is used to find the lowest energy conformation in this paper. Each time for a newly produced offspring individual, which is originated from the selection, crossover and mutation operator of two parent individuals, we adopt the new acceptance criteria based on the annealing strategy to let it pass into the next generation, and propose a so-called annealing genetic algorithm (aGA) to predict efficiently the protein folding conformations in the three-dimensional (3D) HP model. Eleven benchmarks are tested to verify the effectiveness of the proposed approach and the computational results show that aGA explores the conformation surfaces more efficiently than other methods, and finds new lower energies in several cases, which means that aGA is an efficient tool for the protein folding simulations.
This paper studies the problem of packing equal circles into a larger equilateral triangular container, which is concerned with how to pack these circles into the container without overlapping. Its aim is to minimize ...
详细信息
This paper studies the problem of packing equal circles into a larger equilateral triangular container, which is concerned with how to pack these circles into the container without overlapping. Its aim is to minimize the edge length of the container as much as possible. By incorporating some heuristic configuration update strategies, a local search strategy based on the gradient method and the dichotomous search (DS) strategy into the simulated annealing (SA) algorithm, a new heuristic algorithm, the heuristic simulated annealing algorithm based on dichotomous search (HSADS), is put forward for solving this problem. In HSADS, the heuristic configuration update strategies are used to produce new configurations, and the gradient method is used to search for lower-energy minima near newly generated configurations, and the dichotomous search strategy is used to gain the minimal edge length of the equilateral triangular container. By testing six equal circles instances from the literature, the proposed algorithm improves the best known results of them so far. The experimental results show that HSADS is an effective algorithm for the problem of packing equal circles into a larger equilateral triangular container.
The K-Nearest Neighbor (KNN) is one of the most widely used classification algorithms. For large dataset, the computational demands for classifying patterns using KNN can be expensive. A way to solve this problem is t...
详细信息
When applied to precipitation forecasting, the mean generating function - optimal subset regression (MGF-OSR) model is limited by its low accuracy and high error, while the back propagation (BP) neural network model h...
详细信息
When applied to precipitation forecasting, the mean generating function - optimal subset regression (MGF-OSR) model is limited by its low accuracy and high error, while the back propagation (BP) neural network model has difficulty in learning for matrix selection. This paper proposes a new MGF-OSR-BP model, which uses a MGF to extend original data, an OSR to select the best series as the BP neural network input node and learning matrix, and the resultant data for training. The training procedure determines the number of hidden layers and uses an optimal number of hidden layers for model training. This paper uses the MGF-OSR-BP model to analyze precipitation data from Hangzhou, China, for 53 years, from 1956 to 2008. The 1956-2006 precipitation data are used as the training sample, and the 2007-2008 data are used as the test set data to verify the practicality of the forecast system. A fitting verification is performed using the forecasted data against field measurement data, and the results show that the forecast accuracy is better than that of the MGF-OSR model or the MGF stepwise multiple regression model.
暂无评论