Currently, industrial and scientific community are concerned about Service-Oriented Computing(SOC), whose keytechnology is Web services. Web service is a new distributed computing model. It has a broad prospect in ap...
详细信息
Currently, industrial and scientific community are concerned about Service-Oriented Computing(SOC), whose keytechnology is Web services. Web service is a new distributed computing model. It has a broad prospect in application because of its loose coupling, platform irrelevance, language neutral, reusability and openness characteristics. However, the existing problems of Web service restrict the development of Service-Oriented Computing. The significance of research on Web service access control security model is profound. This paper puts trust mechanism as independent attributes to be used in Service-Oriented Computing security model to solve the above problems, and to be suited for Web services in characteristic of dynamic and fine-grained.
This paper proposes a novel approach to facial expression recognition based on label propagation techniques and the neighborhood preserving embedding. It considers both the global and local structure of the training d...
详细信息
The Time Synchronized Mesh Protocol (TSMP) uses time synchronization, graph-routing and pre-scheduling of pair-wise communication while cycling through all available pre-divided channels to manage the whole network. W...
详细信息
The Time Synchronized Mesh Protocol (TSMP) uses time synchronization, graph-routing and pre-scheduling of pair-wise communication while cycling through all available pre-divided channels to manage the whole network. With the collision-free network we study the energy-hole problem and discuss how to fix or improve this problem with mathematical analyses. When knowing where the reason lies, we propose an algorithm which can enable the nodes to choose their transmission range and next hop relay in order to adjust energy consumption of nodes in different position of the network. With this ability nodes that have less energy can reduce their work, so do the nodes in the region nearer the sink, thus the lifetime of the network can be prolonged. At last we evaluate this algorithm by means of the NS2 stimulation tools, and the simulation result shows that we finally get a network with relatively longer lifetime.
In order to support generating crowd animation roles automatically based on a 3D animation prototype, an evolutionary modeling approach was proposed. The approach could generate a great deal of 3D animation modelings ...
详细信息
In order to support generating crowd animation roles automatically based on a 3D animation prototype, an evolutionary modeling approach was proposed. The approach could generate a great deal of 3D animation modelings which were alike in appearance but different in characteristics by deforming the 3D animation prototype. An interactive and adaptive genetic algorithm AIAGA was introduced in this approach. In AIAGA, ACIS rule expressions were expressed by three binary trees, which were used to scale 3D entities unevenly in the x-axis, y-axis and z-axis direction separately. New rule expressions, which were used to generate new modelings by evolving, were generated by selection, adaptive crossover and mutation on binary trees. Experiments in the prototype system developed in this paper show that the proposed approach can effectively support generating a series of 3D animation modelings for crowd animation.
For large amount of computation in elliptic curve cryptography, we combined with Message Linkage Recovery Based on Elliptic Curve and proposed a new signcryption scheme with message link recovery by signcryption equat...
详细信息
For large amount of computation in elliptic curve cryptography, we combined with Message Linkage Recovery Based on Elliptic Curve and proposed a new signcryption scheme with message link recovery by signcryption equation as the breakthrough point. The signcryption equation of the new scheme was s=k-r-kA mod n and the corresponding verification was X=(s+r)G+PA, which correctness has been verified. The results of analyzed the efficiency of operation and the security of the improved scheme show that, it meets the safety requirements of digital signature scheme, at the same time, it reduces an operation of number multiplication in the process of signature and lowers the number of points multiplication. After, the new scheme was applied to the electronic evidence protection, which has the function of message recovery.
Task assignment problem is one of the important research topics in a multi-agent system. It is desired to assign each task to a suited agent with a minimum total cost. For the advantages of memory, multi-character, lo...
详细信息
Task assignment problem is one of the important research topics in a multi-agent system. It is desired to assign each task to a suited agent with a minimum total cost. For the advantages of memory, multi-character, local search and the solution improvement mechanism in artificial bee colony (ABC) algorithm, a task assignment approach based on ABC in a multi-agent cooperative design system is proposed in this paper. Experimental results demonstrate that the optimal solutions obtained by the ABC algorithm are better than genetic algorithm and particle swarm optimization on solving some task assignment problems.
With the development of Internet, e-learning becomes a new modern teaching mode. Educational evaluation is an important part of network teaching system and an important means to improve the teaching quality. PSK-means...
With the development of Internet, e-learning becomes a new modern teaching mode. Educational evaluation is an important part of network teaching system and an important means to improve the teaching quality. PSK-means algorithm is used in teaching quality evaluation system of computer experiments. Teachers and students are classified and analyzed according to their evaluation scores. Based on the evaluation results, network teaching and learning of computer experiments will be improved by teachers and students.
Association rules mining algorithm based on Rough Set theory is put forward using the idea of Rough Set theory, which applies the improved Apriori algorithm in association rules mining on the basis of Decision Table. ...
详细信息
Association rules mining algorithm based on Rough Set theory is put forward using the idea of Rough Set theory, which applies the improved Apriori algorithm in association rules mining on the basis of Decision Table. The advantage of this method lies in three aspects, including the elimination of redundancy attributes, reducing the number of attributes, while scanning Decision Table just once can produce decision attribute sets. Application example analysis shows that this is an effective and fast data mining method.
The design of an electronic voting system has been a hot research topic in the area of information security. Based on ID-based ring signature, blind signature, multi-verification technology and existed typical electro...
详细信息
In Mobile Ad hoc network (Manet), to solve the problems of the message receiver privacy exposure and signcryption (decryption) unfairness in existing signcryption schemes, a new ID- based multi-receiver signcryption s...
详细信息
暂无评论