This paper discusses the simulated computation methods of remote sensing information model, and tries to put forward a more availab.e solution. It presents our research works on the description and simulation methods ...
详细信息
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificia...
详细信息
ISBN:
(纸本)9781538684986;9781538684979
The form of books is constantly developing with the upgrading of carrying media, and the emergence of electronic books has greatly shaken the traditional paper books. In recent years, with the combination of artificial intelligence, virtual reality, high-speed network and digital reading, the concept of "VR" has been applied to more and more industries. The introduction of VReading multi-sensory reading platform will bring new ideas to digital reading industry.
With regard to the community mining in weighted signed networks and weighted social networks containing only positive links, the AGMA algorithm has some imperfections in the second clustering of vertices. So some impr...
详细信息
The characteristics of the MicroBlog data are analyzed firstly. Then WeiBo graph is constructed through tweets forwarded path and user influence ranking calculation method which according to the classic PageRank is gi...
详细信息
In this letter, new methods of constructing quaternary sequence pairs are presented based on binary sequence pairs with two-level autocorrelation, almost perfect binary sequence pairs and cyclic shift sequences. The q...
详细信息
In this paper, two new methods of constructing ternary sequence pairs based on cyclotomy are presented. The ternary sequence pairs with three-level correlation are constructed based on cyclotomic numbers of order 4. A...
详细信息
The main purpose of studying the software structure is considered to understand and recognize the structure easily by also taking into account the quality of software. In this paper, we define and analyze the node imp...
详细信息
A software execution trace can be viewed as a series of events. An event may correspond to the execution of a basic block, the invocation of a class or a method. These traces imply important unique characteristics of ...
详细信息
It is well known that the drawbacks of lab.l propagation algorithm are high randomness, weak robustness and easy to form monster community. Many improved methods are proposed constantly in order to avoid these problem...
详细信息
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication alg...
详细信息
In the environment of the Internet of Things for heat meter, insecurity of the object name service (ONS) is likely to lead to the leakage of user privacy. In order to solve this problem, an identity authentication algorithm is proposed. First, the certificate authority may generate parameters of elliptic curve and its own public key and private key, and announce the parameters and its own public key, so that the registered users can inquire and use them. Second, the client registers at the certificate authority. The certificate authority will generate the public key of the client and the evidence of the client's private key which is signed by private key of the certificate authority. If the generated evidence of private key passes verification of the client, the client will generate its own private key. When a client sends a query request to an ONS server, the ONS server will authenticate identity of the client. If the client gets through the authentication, the ONS server will respond to the query request. The experimental result shows that this algorithm has high security and can avoid the ONS server providing query service for illegitimate client, so as to ensure the security of user privacy.
暂无评论