As a kind of feature selection algorithm applied widely in intrusion forensics, information gain could solve the problem of high-dimension and magnanimous, but it neglects correlation between features, which could lea...
详细信息
In order to generate a variety of innovative 3D animation modelings automatically, an improved cellular genetic algorithm was proposed in this paper. ACIS rule expressions were used to scale the existing 3D animation ...
详细信息
In order to generate a variety of innovative 3D animation modelings automatically, an improved cellular genetic algorithm was proposed in this paper. ACIS rule expressions were used to scale the existing 3D animation modelings unevenly in the x-axis, y-axis and z-axis direction separately in this algorithm, and tree coding was adopted for the generation and evolution of ACIS rule expressions. Due to the difficulty that there was no uniform evaluation criteria determining the creative design, human-computer interaction was adopted which used expert knowledge to determine the fitness function value of individuals. An innovation system of 3D animation modelings is developed, and the experiments in the system show that the improved cellular genetic algorithm can generate a series of 3D animation creative modelings.
Due to the openness and dynamic of Service Computing, more and more bad behaviors of malicious entities exist, and the traditional trust model can not adapt to the distributed, open and dynamic network environment, wh...
详细信息
Due to the openness and dynamic of Service Computing, more and more bad behaviors of malicious entities exist, and the traditional trust model can not adapt to the distributed, open and dynamic network environment, which severely endangers Service Computing networkThis paper proposed a trust model of Service Computing based on recommendation, which includes the corresponding algorithms of its trustworthiness and integrated trust, and the punishment mechanism for vicious recommendation, drawing on the experience of the research of trust management concept and Beth trust modelSimulation results show that this model can assess the entities' trust values more effectively, and the transaction success ratio surpasses the traditional trust management model.
In order to improve the semantic description of items in SVM, and overcome the defect that semantic units are independent of each other, this paper proposed a feature granulation description method based on phrases. T...
详细信息
In order to improve the semantic description of items in SVM, and overcome the defect that semantic units are independent of each other, this paper proposed a feature granulation description method based on phrases. This method refered to text representation and organization among feature items, identified base phrases through syntactic cues, and built the relation tree which contained feature items and head verb, then replaced words in BOW with base phrases. Experimental results indicates that the new approach improves the performance of the classifier, increases the relationship between terms, overcomes the defect of mutual independence between feature items, and keeps favourable effect even if the number of feature items is small.
Authorization mechanism is introduced to prevent the on-line original signer problem in this scheme. The semi-trusted third party's secret value in the proxy signature strengthens the unforgeability. The proxy sig...
详细信息
Authorization mechanism is introduced to prevent the on-line original signer problem in this scheme. The semi-trusted third party's secret value in the proxy signature strengthens the unforgeability. The proxy signer's common signature is added into the proxy signature which ensures the undeniability. And the time stamp makes it possible to revoke the proxy signer's power. What's more, the scheme needs shorter time to generate proxy signature since it is based on Schnorr signature.
Focusing on the Internet information system faces more security risk problems in Cloud Computing Environment, this paper sums up 8 kinds of threats to security principles, and lists the corresponding factors. Combing ...
详细信息
Focusing on the Internet information system faces more security risk problems in Cloud Computing Environment, this paper sums up 8 kinds of threats to security principles, and lists the corresponding factors. Combing with collaborative and virtualization of cloud computing technology and so on, adopting the theory of AHP and introducing the correlation coefficient to analyze the multiple objective decision, the paper proposes a new information security risk assessment model based on AHP in cloud computing environment. Finally getting the security risk assessment strategies of the information system in the cloud computing environment by this model.
This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web ServicesXACML is characterized by the strong ability of expansion and the favorab...
详细信息
This article described the Web Services security protocols, and the policy description language XACML was analyzed in detail in the Web ServicesXACML is characterized by the strong ability of expansion and the favorable inter-operation in the access control of the Web Services, which are concluded from the comparison in both SOA strategic architecturesA collection of XACML policy combination algorithms and decision algorithms were discussed in the policy-based service-oriented computing, then the policy control and access control mechanism were also illustrated, and the corresponding decision model was described, at last the development of XACML was prospected.
Learned from the mechanism of competition and predation among populations in the field of biology, this paper creates a novel hybrid model based on competition and predation. To improve the convergence speed, we propo...
详细信息
In order to generate novel 3D animation modellings automatically, an interactive genetic algorithm HAIGA based on C/S mode was proposed. In HAIGA, HSF synergy technology and ACIS rule were brought in. The ACIS rule ex...
详细信息
In order to generate novel 3D animation modellings automatically, an interactive genetic algorithm HAIGA based on C/S mode was proposed. In HAIGA, HSF synergy technology and ACIS rule were brought in. The ACIS rule expression was expressed by three binary trees, which were used to scale 3D entities unevenly in the x-axis, y-axis and z-axis direction separately. New rule expressions, which were used to generate new modellings by evolving automatically based on the existing 3D animation modellings , were generated by selection, crossover, mutation on binary trees. A prototype system in which 3D animation modellings could evolve automatically was developed. Experiments in the system show that the proposed method can support cooperative design effectively to generate a series of novel 3D animation modellings.
This paper presents a multi-agent cooperative system for crowd animation. It analyses related work about crowd animation first. Then, a multi-agent crowd animation system architecture is introduced, which offers a pro...
详细信息
This paper presents a multi-agent cooperative system for crowd animation. It analyses related work about crowd animation first. Then, a multi-agent crowd animation system architecture is introduced, which offers a promising framework for dynamically creating and managing agent communities in widely distributed environments. Next, a role modeling approach based on dynamic self-adaptive genetic algorithm and NURBS (Non Uniform Relational B Splines) technology is presented. Following, a group of fishes modelling example is illustrated for showing the modeling process in the system. Finally, the current work is summarised and an outlook for the future work is given.
暂无评论