Investigating the stability of information spreading over SNS helps to understand the principles inherent in the spreading behavior. This paper explores the mechanisms of information spreading including stifling mecha...
详细信息
A single-channel color image encryption method is proposed based on iterative phase retrieve process in quaternion Fourier transform ***,three components of the plain color image is confused respectively by using cat ...
详细信息
ISBN:
(纸本)9781628415650
A single-channel color image encryption method is proposed based on iterative phase retrieve process in quaternion Fourier transform ***,three components of the plain color image is confused respectively by using cat ***,the confused components are combined into a pure quaternion image,which is encoded to the phase only function by using an iterative phase retrieve ***,the phase only function is encrypted into the gray scale ciphertext with stationary white noise distribution based on the chaotic diffusion,which has camouflage property to some *** corresponding plain color image can be recovered from the ciphertext only with correct keys in the decryption *** results verify the feasibility and effectiveness of the proposed method.
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
Clustering is an important research field in data mining. Based on dynamical synchronization model, an efficient synchronization clustering algorithm ESYN is proposed. Firstly, based on local structure information of ...
详细信息
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings t...
详细信息
ISBN:
(纸本)9781479974351
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings that standard PSO traps into local optima easily and improve the convergence speed of algorithm, the concept of GA and Multi-thread technology are introduced. The experiment results show that the proposed parallel hybrid PSO algorithm(PHPSO) is relatively steady with faster convergent rate. Especially for multi-nodes, the efficiency is improved obviously. So the proposed PHPSO is well suited for large parking lot.
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the int...
详细信息
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the interactions between adjacent nodes, which do not fully take the interactions and relationship between local region users into consideration as well as the details of interaction process. In this paper, we find that there exists influence transfer effect in the process of user interactions, and present a regional user interaction model to analyze and understand interactions between users in a local region by influence transfer effect. Based on real data from Sina Weibo, we validate the effectiveness of our model by the experiments of user type classification, influential user identification and zombie user identification in online social networks. The experimental results show that our model present better performance than the PageRank based method and machine learning method.
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authorit...
详细信息
Previous adaptively secure multi-authority attribute-based encryption (ABE) schemes suffered from superfluous computation overhead on composite order groups. To tackle this problem, an adaptively secure multi-authority ciphertext-policy ABE (MA-CP-ABE) scheme on prime order groups was proposed when a dual pairing vector space approach was employed. The proposed scheme supports any monotone access structure, and is proven adaptively secure from the decisional linear assumption in the standard model. Performance analysis indicates that our scheme is more efficient while achieving the adaptive security.
This paper designs the mathematical model of fiber line power, optimization of wireless sensor network node and multi distributed IP, and uses C language to program the model, finally get a new energy-saving mechanism...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, ...
详细信息
A novel hierarchical access control scheme for perceptual layer of the IoT is presented based on resources hierarchies, which could conform to the secure and efficient access requirement of multi-user. In the scheme, every hierarchical node is composed of perceptual nodes which provide resources with the same levels of security. More hierarchical nodes can be modeled as a set of partially ordered classes. With this mode, a deterministic key derivation algorithm is designed, which makes every user and perceptual node possesses a single key material to get some keys, and obtains the resources at the presented class and all descendant classes in the hierarchy. Furthermore, a mechanism of Merkle tree is introduced to guarantee secure and efficient multi-user key material derivation by independent of each hash link. Compared with previous proposals, the scheme is more suitable for multi-user to access resources of perceptual layer in IoT.
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper ...
详细信息
ISBN:
(纸本)9781479932801
In order to reduce the complexity of traditional multithreaded parallel programming, this paper explores a new task-based parallel programming using the Microsoft .NET Task Parallel Library (TPL). Firstly, this paper proposes a custom data partitioning optimization method to achieve an efficient data parallelism, and applies it to the matrix multiplication. The result of the application supports the custom data partitioning optimization method. Then we develop a task parallel application: Image Blender, and this application explains the efficiency and pitfall aspects associated with task parallelism. Finally, the paper analyzes the performance of our applications. Experiments results show that TPL can dramatically alleviate programmer burden and boost the performance of programs with its task-based parallel programming mechanism.
暂无评论