With the rapid development of computertechnology, web services has been widely used. In these applications, the uncertain data is in the form of streams. In view of this kind of situation, present a new generalized d...
详细信息
To solve the two problems that users are independent of each other, it does not form indirect trust relationship between user and cloud service providers, and the traditional method of quantitative measures user's...
详细信息
ISBN:
(纸本)9789811100086
To solve the two problems that users are independent of each other, it does not form indirect trust relationship between user and cloud service providers, and the traditional method of quantitative measures user's granularity so small. This paper introduces model of assessment of trustworthy user based on fuzzy theory. This model divides the range of trustworthy area based on fuzzy theory in mathematical thought in moderate granularity, and introduces the impact factor that is the neighboring access interval, solves the problem of establishing between user and service providers that is indirect trust. Finally, this paper mines the important influence factors through the simulated experiment, proves this model can measure trustworthy user in directly.
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key en...
详细信息
Signcryption is a public key cryptographic method that achieves unforgeability and confidentiality simultaneously with significantly smaller overhead than that required by "digital signature followed by public key encryption". It does this by signing and *** a message in a single step. An aggregate signcryption scheme allows individual signcryption ciphertexts intended for the same recipi- ent to be aggregated into a single (shorter) combined ciphertext without losing any of the security guarantees. We present an aggregate signcryption scheme in the identity-based setting using multilinear maps, and provide a proof of security in the standard model. To the best of our knowledge, our new scheme is the first aggregate signcryption scheme that is secure in the standard model.
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problem...
详细信息
In the global information era,people acquire more and more information from the Internet,but the quality of the search results is degraded strongly because of the presence of web *** spam is one of the serious problems for search engines,and many methods have been proposed for spam *** exploit the content features of non-spam in contrast to those of *** content features for non-spam pages always possess lots of statistical regularities; but those for spam pages possess very few statistical regularities,because spam pages are made randomly in order to increase the page *** this paper,we summarize the regularities distributions of content features for non-spam pages,and propose the calculating probability formulae of the entropy and independent n-grams ***,we put forward the calculation formulae of multi features *** them,the notable content features may be used as auxiliary information for spam detection.
Imbalanced data classification is a challenging problem in data mining. It happens in many real-world applications and has attracted growing attentions from researchers. This issue occurs when the number of one class ...
详细信息
With the further development of the cloud computing, the security of the cloud computing is becoming increasingly prominent. Based on analyzing the development status of cloud computing, this article will focus on stu...
详细信息
ISBN:
(纸本)9781510830981
With the further development of the cloud computing, the security of the cloud computing is becoming increasingly prominent. Based on analyzing the development status of cloud computing, this article will focus on studying the security of cloud computing in data, and discuss the data security problems in the process of data life cycle in cloud environment. Then the paper will put forward the corresponding measures and data encryption technology, in order to protect the data security of cloud computing.
This paper is aimed to study the clustering method for Chinese medicine(CM) medical cases. The traditional K-means clustering algorithm had shortcomings such as dependence of results on the selection of initial valu...
详细信息
This paper is aimed to study the clustering method for Chinese medicine(CM) medical cases. The traditional K-means clustering algorithm had shortcomings such as dependence of results on the selection of initial value, trapping in local optimum when processing prescriptions form CM medical cases. Therefore, a new clustering method based on the collaboration of firefly algorithm and simulated annealing algorithm was proposed. This algorithm dynamically determined the iteration of firefly algorithm and simulates sampling of annealing algorithm by fitness changes, and increased the diversity of swarm through expansion of the scope of the sudden jump, thereby effectively avoiding premature problem. The results from confirmatory experiments for CM medical cases suggested that, comparing with traditional K-means clustering algorithms, this method was greatly improved in the individual diversity and the obtained clustering results, the computing results from this method had a certain reference value for cluster analysis on CM prescriptions.
Aiming at the shortcomings of clustering performance of many traditional text clustering methods, a clustering algorithm based on maximum entropy principle is proposed. The algorithm uses the cosine similarity measure...
Aiming at the shortcomings of clustering performance of many traditional text clustering methods, a clustering algorithm based on maximum entropy principle is proposed. The algorithm uses the cosine similarity measure cited in the traditional text clustering algorithm SP-Kmeans, and then introduces the maximal entropy theory to construct the maximal entropy objective function suitable for text clustering. The maximum entropy principle is introduced into the spherical K-mean text clustering Algorithm. The experimental results show that compared with DA-VMFS and SP-Kmeans algorithms, in addressing the large number of text clustering problem. The performance of CAMEP clustering algorithm is greatly improved, and has a good overall performance.
Sparse representation for classification (SRC) has achieved a big success for face recognition. It utilizes a sparsely linear combination of the training samples to construct a test sample, and classifies the test sam...
详细信息
Fed-batch culture is often used in industry, and dissolved oxygen (DO) concentration control is important in fermentation process control. DO control is often applied by using feedback (FB) control strategy. But, feed...
详细信息
暂无评论