With the advent of the information age, the data volumes of various industries are in explosive growth, which increasingly highlights the importance of data. When a disaster occurs, how to recover the data completely ...
详细信息
Data generated by various fields are increasing exponentially and thus results in challenges for data performances in both scales of diversity and complexity. The problem how to solve the bottlenecks of low-bandwidth ...
详细信息
Data generated by various fields are increasing exponentially and thus results in challenges for data performances in both scales of diversity and complexity. The problem how to solve the bottlenecks of low-bandwidth networks has been of fatal significance for all kinds of network status. We present a new approach on improved optimization for data disaster recovery system (DDRS) over low-bandwidth networks that not only aims to improve the defects and deficiencies of mainstream DDRS but also helps ensure the reliable network resources for operators to conduct multi-services. A novel bandwidth self-adaptive approach (BSAA) for data packing replication was essentially established to make contribution to the integral performance improvement. A Hidden Markov Model (HMM) for predicting network status was also built to ensure system availability and stability. Experiments showed that the DDRS over low-bandwidth networks named InfoDr can effectively optimize the workload with better performance and better application self-adaptability for multi-services.
This paper deals with the finite-time stability and stabilization for continuous-time linear stochastic time-varying systems. Several necessary and sufficient conditions and a sufficient condition for finite-time stab...
详细信息
This paper deals with the finite-time stability and stabilization for continuous-time linear stochastic time-varying systems. Several necessary and sufficient conditions and a sufficient condition for finite-time stability are derived. Moreover,a sufficient condition for the existence of state feedback controller is given. Such results involve the feasibility problems of differential linear matrix inequalities with terminal constraint.
In this paper, a novel real-coded genetic algorithm is presented to generate offspring towards a promising polygon field with k+1 vertex, which represents a set of promising points in the entire population at a partic...
详细信息
In this paper, a novel real-coded genetic algorithm is presented to generate offspring towards a promising polygon field with k+1 vertex, which represents a set of promising points in the entire population at a particular generation. A set of 19 test problems available in the global parameter optimization literature is used to test the performance of the proposed real-coded genetic algorithms. Several performance comparisons with five significant real-coded genetic algorithms, three state-of-the-art differential evolution algorithms and three others significant evolutionary computing techniques are performed. The comparative study shows the proposed approach is statistically significantly better than or at least comparable to twelve significant evolutionary computing techniques over a test suite of 19 benchmark functions.
Emotions convey information. We present an emotion understanding system to excavate information from emotions. The system infers mental states, personalities and cooperativeness of agents, related actions, and related...
详细信息
ISBN:
(纸本)9781479954599
Emotions convey information. We present an emotion understanding system to excavate information from emotions. The system infers mental states, personalities and cooperativeness of agents, related actions, and related events from agents' emotions by the rule-like meta-knowledge about emotions. Our system can be used for agents to make decisions, process knowledge, and interact with users.
Faced by soaring power cost, large footprint of carbon emission and unpredictable power outage, more and more modern Cloud Service Providers (CSPs) begin to mitigate these challenges by equipping their Datacenter Powe...
详细信息
Mesh Networks (WMNs) is a promising network access technology. As WMNs' applications become more and more popular, the number of users grows quickly and the quality of service needs to be improved. When we try to ...
详细信息
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the p...
详细信息
With the rapid emerging of novelty Web services and cloud services, privacy information and documents of users become increasingly easy to be exposed in the Internet. To tackle the issue of lifecycle security of the privacy information and documents in the Internet, in this paper, we propose the idea of combining the three security methods of multilevel security, identity-based encryption (IBE), and distributed hash table (DHT) network. And we further propose an IBE-based secure self-destruction (ISS) scheme to protect the confidentiality and privacy of the Internet content by self-destruction after a predefined time. In our proposed ISS security scheme, the Internet content is first partitioned into many segments with diverse security levels, and each segment is encrypted with a symmetric key to obtain primitive ciphertext. By applying the methods of association and extraction, the primitive ciphertext is turned to associated ciphertext, which is then divided into extracted ciphertext and encapsulated ciphertext. The latter is encapsulated into the Internet content self-destructing object (CDO), which is stored into the storage services provider. Furthermore, to protect the privacy security when the CDO expired, the symmetric key is encrypted using the IBE algorithm based on the identity of the authorized user. The combination of this key's ciphertext and the extracted ciphertext, by means of Lagrange polynomial processing, generates mixture ciphertext shares. Then those shares are distributed into nodes within the DHT network and will be automatically discarded over the deadline when the primitive ciphertext and the symmtric key are unrecoverable. Consequently, the ISS scheme achieves the aim of secure self-destruction. Comprehensive analysis shows that the ISS scheme is able to satisfy all the design demands and is more secure than existing schemes. The ISS scheme can resist against not only the traditional cryptanalysis and brute-force attack, but also the Sybil
While tracing objects or analyzing human activities with RFID data sets, the quality of RFID data is a crucial aspect. The raw RFID data streams, however, tend to be noisy, including missed readings and unreliable rea...
详细信息
To improve the accuracy of paper metadata extraction, a paper metadata extraction approach based on meta-learning is presented. Firstly, we propose a construction method of base-classifiers, which combines the Support...
详细信息
暂无评论