We propose crosstalk-aware spectrum allocation with crosstalk-prohibited frequency slot to suppress the crosstalk occurring in the multi-core fiber environment with lower processing complexity and demonstrate the effe...
详细信息
Mining frequent closed itemsets (FCIs) is important in mining non-redundant (minimal) association rules. Therefore, many algorithms have been developed for mining FCIs with reduced mining time and memory usage. For mi...
详细信息
To estimate the measurement model parameters of a three-dimensional (3D) laser scanner, a spatial sphere-based calibration method by combining invasive weed optimization (IWO) and Levenberg-Marquardt (LM) algorithm is...
详细信息
To estimate the measurement model parameters of a three-dimensional (3D) laser scanner, a spatial sphere-based calibration method by combining invasive weed optimization (IWO) and Levenberg-Marquardt (LM) algorithm is proposed in this paper. A nonlinear objective function of the 3D laser scanner calibration is established according to the distance constraint between each laser scanning point on a spherical calibration object and the center of the calibration sphere. To reduce the influence of measurement outliers, the Pseudo-Huber loss is also employed in the objective function. After that, a hybrid optimization algorithm combining IWO and LM is adopted to optimize the objective function, where the optimal model parameters of 3D laser scanner are sought. Thus, the model parameters calibration of the 3D laser scanner is realized. Experimental results demonstrate the high calibration accuracy and good consistency of model parameters of the proposed method. And the influences of the measurement noise and outliers can also be effectively suppressed.
We propose a novel framework for the differentially private ERM, input perturbation. Existing differentially private ERM implicitly assumed that the data contributors submit their private data to a database expecting ...
详细信息
Hypertext Transfer Protocol (HTTP) is a standard data exchange protocol over the web. Currently, HTTP is still widely used to handle communication between client and server. However the related researches show that da...
Hypertext Transfer Protocol (HTTP) is a standard data exchange protocol over the web. Currently, HTTP is still widely used to handle communication between client and server. However the related researches show that data exchange via HTTP is still vulnerable because the data sent is in the form of plaintext. To overcome the problem, the available solutions are using Hypertext Transfer Protocol Secure (HTTPS) and Secure Hypertext Transfer Protocol (SHTTP). However, some results of related researches show HTTPS and SHTTP still have some weaknesses. Based on these problems, this study proposes a method of securing HTTP using Client-side Encryption. In this research, the encryption algorithm used is Advanced Encryption Standard (AES) dynamic key. Encryption method was performed by encrypting the data on the side of the web browser before it was sent, then the decryption process was done on the web server side. The testings of this research were performed in case of login authentication. The results show the proposed method has successfully secured data exchange on HTTP.
作者:
Kaveh BakhtiyariNils BeckmannJürgen ZieglerInteractive Systems
Department of Computer and Cognitive Science Faculty of Engineering University of Duisburg-Essen 47057 Duisburg Germany Department of Electrical
Electronics and System Engineering Universiti Kebangsaan Malaysia (The National University of Malaysia) Bangi 43600 Selangor Darul Ehsan Malaysia Electronic Components and Circuits
Department of Electrical Engineering and Information Technology Faculty of Engineering University of Duisburg-Essen 47057 Duisburg Germany
Heart rate variability (HRV) is known to be correlated with emotional arousal, cognitive depletion, and health status. Despite the accurate HRV detection by various body-attached sensors, a contactless method is desir...
详细信息
Heart rate variability (HRV) is known to be correlated with emotional arousal, cognitive depletion, and health status. Despite the accurate HRV detection by various body-attached sensors, a contactless method is desirable for the HCI purposes. In this research, we propose a non-invasive contactless HRV measurement by Microsoft Kinect 2 sensor with Respiratory Sinus Arrhythmia (RSA) correction. The Infrared and RGB cameras are used to measure the heart rate signal, and its 3D Depth sensor is employed to capture the human respiratory signal to correct the initially calculated HRV with RSA. The correlation analysis among the calculated HRVs by different methods and devices showed a significant improvement in reliable HRV measurements. This study enlightens the researchers and developers to choose a proper method for HRV calculations based on their required accuracy and application.
With the continuous improvement of roads in China, the number of vehicles, complexity of traffic and personalized needs of vehicle owners are also increasing gradually, which makes the routing planning particularly im...
With the continuous improvement of roads in China, the number of vehicles, complexity of traffic and personalized needs of vehicle owners are also increasing gradually, which makes the routing planning particularly important. As a result, it is more and more important to develop appropriate routing planning algorithms to meet the needs of vehicles. However, most of the existing algorithms only solve the problem for a certain condition, rather than meeting the multiple conditions. In view of the above-mentioned problems, this paper describes the multi-condition vehicle routing planning algorithm and the current development status quo in detail by referring to the materials, analyzes the process of each algorithm and points out its advantages and disadvantages. Finally, the future trend of the vehicle routing planning algorithm under multiple conditions is predicted.
Ancient documents are inheritance that must be preserved. The documents contain historical, scientific, social, religious information, etc. Converting ancient documents into digital image formats is one of ways to pre...
Ancient documents are inheritance that must be preserved. The documents contain historical, scientific, social, religious information, etc. Converting ancient documents into digital image formats is one of ways to preserve the inheritance and can be stored into a computer. However, images of ancientdocuments have many blemishes caused by age, moisture, flood, etc. Therefore, special techniques are needed for those images to be restored and can improve the legibility of the ancient documents' images. In this study, the image restoration process uses separation of background and foreground/text on histogram equalization such as research conducted by Fitri Arnia in 2008. Through histogram equalizationimages can be seen the distribution of pixels from the intensity of black color '0' to white '1'. The distribution of pixels on histogram equalization describes the curves of foreground/text and curves of background. Among the histogram curves, the determination of thresholdvalues can be done so as to clarify the foreground/text and background areas on images of ancient documents. The lowest point between the two curves is the lowest pixel (local minima) which is used as the threshold value. However, the selection of such threshold values in some cases is very difficult to determine because there are still many fluctuations in the curve at the lowest curve. Therefore, this study proposesa histogram smoothing method in the ancient documents' images to minimize curvature fluctuations and to determine more accurate threshold values. In this research, average filtering method is used for smoothing the histogram image. This filter successfully refines the histogram and makes the image of the restoration or binary image display the value of the ancient document image readability increases.
Traces of user activities recorded in online social networks such as the creation, viewing and forwarding/sharing of information over time open new possibilities to quantitatively and systematically understand the inf...
详细信息
Traces of user activities recorded in online social networks such as the creation, viewing and forwarding/sharing of information over time open new possibilities to quantitatively and systematically understand the information diffusion process on social networks. From an online social network like WeChat, we could collect a large number of information cascade trees, each of which tells the spreading trajectory of a message/information such as which user creates the information and which users view or forward the information shared by which neighbours. In this work, we propose two heterogeneous non-linear models, one for the topologies of the information cascade trees and the other for the stochastic process of information diffusion on a social network. Both models are validated by the WeChat data in reproducing and explaining key features of cascade trees. Specifically, we firstly apply the Random Recursive Tree (RRT) to model the cascade tree topologies, capturing key features, i.e. the average path length and degree variance of a cascade tree in relation to the number of nodes (size) of the tree. The RRT model with a single parameter θ describes the growth mechanism of a tree, where a node in the existing tree has a probability dθi of being connected to a newly added node that depends on the degree di of the existing node. The identified parameter θ quantifies the relative depth or broadness of the cascade trees, indicating that information propagates via a star-like broadcasting or viral-like hop by hop spreading. The RRT model explains the appearance of hubs, thus a possibly smaller average path length as the cascade size increases, as observed in WeChat. We further propose the stochastic Susceptible View Forward Removed (SVFR) model to depict the dynamic user behaviors including creating, viewing, forwarding and ignoring a message on a given social network. Beside the average path length and degree variance of the cascade trees in relation to their sizes, the S
暂无评论