This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm...
详细信息
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of space-time. Most researchers are only concerned about the learner's cognitive and construct a great amou...
详细信息
E-learning provides an unprecedented flexibility and convenience for learners via breaking the limitation of space-time. Most researchers are only concerned about the learner's cognitive and construct a great amount of substantive digital learning resources, however they neglect of the learners' affect in current e-learning systems. In this paper, we focus primarily on the negative affect of learners, and propose an emotion compensation mechanism associated with trust and personality traits in traditional recommender technology. First, we analyze the difference between emotion compensation and traditional recommender. Next, the score of trust is calculated with historical behavior, otherwise depend on similarity of personality traits without historical experience. We use trustworthiness to replace similarity as prediction weight in trust filtering process. At last we do experiments with data collected in previous system named emotion-chatting. Compared with results of experiments between traditional recommender and trust-personality recommender, the average of accuracy is improved 4 points in percentage.
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe...
详细信息
Based on the research and analysis of interactive text properties, the word frequency statistics and synonyms merger are imported to obtain the keywords of interactive text. The Sentence similarity is used to describe the degree of coupling between sentences. Then a novel topic partition algorithm based on average sentence similarity is proposed. The experimental results show the effectiveness of the algorithm. Along with the mining of the deep correlations among texts, the algorithm precision and accuracy will be improved.
Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, we show that Hsiang and Shih's scheme is still vulnerable to off-line pas...
详细信息
Recently, Hsiang and Shih proposed a secure dynamic ID based remote user authentication scheme for multi-server environment. In this paper, we show that Hsiang and Shih's scheme is still vulnerable to off-line password guessing attacks, impersonation attacks and server spoofing attacks. And it cannot resist against extracting secret data by intercepting the authentication message. Chen, Huang and Chou proposed an improvement on Hsiang and Shih's scheme. However, we demonstrate that Chen, Huang and Chou's improved scheme suffers from impersonation attacks, password guessing attacks and server spoofing attacks. In addition, Chen et al.'s scheme cannot provide perfect forward security.
Since each user needs to have different passwords with different remote servers in the multi-server environment, it is impossible to apply the authentication methods in a single server environment to the multi-server ...
详细信息
Since each user needs to have different passwords with different remote servers in the multi-server environment, it is impossible to apply the authentication methods in a single server environment to the multi-server environment. Recently, Ren-Chiun Wang, Wen-Shenq Juang, and Chin-Laung Lei proposed an ID based remote user authentication scheme for multi-server environments. However, we demonstrate that their ID based authentication scheme lacks the authenticity of the Registration Center to the server. Moreover, their ID based authentication scheme does not satisfy perfect forward security. In this paper, an improved multi-server password based smart card authentication scheme is proposed. Our scheme can remove their security flaws. Compared with the previous password based smart card authentication schemes for the multi-server environments, our proposed scheme can hold more security advantages.
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm...
详细信息
ISBN:
(纸本)9781612847719
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm of topic elements is proposed. Firstly, noise filtering and Chinese word segmentation on the original corpus are executed. Secondly, the identifying and extracting method in group of mixed turn is used to extract the topic elements, such as time, place and figure. Finally, performance evaluation of identification recall, identification accuracy and extraction accuracy are achieved. The experimental results show the effectiveness of the algorithm.
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to messa...
详细信息
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to message blocks. On the assumptions of EDDH problems, the proposed scheme is secure against chosen-ciphertext attacks and existentially unforgeable against the chosen- message attacks in the random oracle model.
How to solve uncertainty of assessment result is an important issue in E-government. Current qualitative assessment are based on subjective qualitative evaluation and the rigid division of the quantitative data, howev...
详细信息
Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing digitally signed credentials. Prev...
详细信息
In order to overcome the deficiencies of the traditional Artificial Immune Systems (AIS) in the security field of computer information system, an immune danger theory inspired model for networksecurity monitoring is ...
详细信息
暂无评论