Suggested Topics within your search.
Suggested Topics within your search.
-
14721
Hadoop cloud platform user dynamic access control model
Published 2017-09-01“…In order to solve the problem that Hadoop cloud platform could not dynamically control user access request,a Hadoop cloud dynamic access control model based on user behavior assessment (DACUBA) was proposed.The model first collected the user instruction sequence in real time and the user behavior contour was obtained by parallel command sequence learning (PCSL).Then the global K model was established by using the forward profile,the subsequent sequence was classified and the classification results were evaluated.The evaluation results were combined with the improved Hadoop access control mechanism to make the cloud platform users’ access rights change dynamically with their own behaviors.Experimental results demonstrate that the model algorithm is effective and the dynamic access control mechanism is feasible.…”
Get full text
Article -
14722
Attribute-based revocable collaborative access control scheme
Published 2021-05-01“…To solve the dynamic update of access rights in attribute-based collaborative access control, a novel scheme was proposed with the revocation of attribute, user and collaborative policy.A formal definition and a security model were presented, the group-based attribute group were changed to reflect the update of rights, and further, an efficient re-encryption algorithm was used to realize the immediate revocation of attributes and users.The translation value was used to achieve the revocation of collaborative policy by update corresponding ciphertext.The security analysis shows the scheme can guarantee data confidentiality, forward/backward security, and resist collusion attack under chosen plaintext attack.Compared with the related works, the proposal achieved more complete and efficient revocation scheme.…”
Get full text
Article -
14723
Breaking novel and lightweight digital <sub>s</sub> ignature scheme
Published 2013-07-01“…In order to design a scheme for small computing devices with limited computing capacity, Wang et al. proposed a novel lightweight digital signature scheme based on the hash authentication technology. A polynomial time algorithm, which found an equivalent signing secret key from the public key, was presented or this novel lightweight digital signature scheme. …”
Get full text
Article -
14724
Adaptive-clustered image-block hierarchical DCT hybrid digital-analog wireless transmission method
Published 2024-01-01“…In order to achieve high quality image transmission, a novel hybrid digital-analog (HDA) wireless transmission method was proposed.Firstly, the image residual layer was constructed by subtracting the downsampled and upsampled images from the original image respectively.Secondly, an adaptive-clustered block-level discrete cosine transform (DCT) algorithm was proposed to efficiently remove the correlation between image pixels in the residual layer.Finally, an image block level-based unequal power allocation strategy for further boosting the quality of received images was proposed.Extensive experiments results demonstrate that the proposed method is significantly superior to existing successful hybrid digital analog image wireless transmission methods in both qualitative evaluation and quantitative measurement.…”
Get full text
Article -
14725
Message forwarding based on periodically evolving social characteristics in opportunistic mobile networks
Published 2015-03-01“…Moreover, a social-aware routing algorithm, PerEvo, was then designed based on them. …”
Get full text
Article -
14726
Optimization of the Forcing Term for the Solution of Two-Point Boundary Value Problems
Published 2013-01-01“…We provide an application of this algorithm to the planar restricted three body problem in order to study the planning of low-thrust transfer orbits.…”
Get full text
Article -
14727
Parametric Variant Design of Reducer based on Case Based Reasoning
Published 2016-01-01“…A reducer 3D design system is developed by taking Solid Works as a development platform and VB as the development tool,combining the key technology of three dimensional modeling method that combine the feature modeling and parametric design,the nearest neighbor algorithm for computing similarity,and the parametric variant design based on layout sketch.The automatic retrieval,design calculation,model- driven and plot for the reducer is realized,it provides an effective way for the fast intelligent design of the reducer.…”
Get full text
Article -
14728
A novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features
Published 2018-10-01“…Aiming at the problem that the biometric feature-based fuzzy vault is vulnerable to correlation attack and the loss of key and biometric template,and the authentication performance of fuzzy vault based on single biometric feature is unreliable,a novel fuzzy vault scheme based on the feature level fusion of fingerprint and face features was proposed.This scheme carried out irreversible transformation of fingerprint features and face features,and based on the Diffie-Hellman algorithm,the transformed fingerprints and face features were fused into a template at the feature level.Finally,the fusion template was used to construct the fuzzy vault.By updating the random matrix,the vault could be revoked,which could effectively resist the correlation attacks and achieve reliable authentication.Experimental results show that the proposed scheme improves the reliability of the system and the security of multiple biometric templates.…”
Get full text
Article -
14729
Compressive sensing based channel estimation for NC-OFDM systems in cognitive radio context
Published 2011-11-01“…A new channel estimation based on compressive sensing(CS)in non-contiguous orthogonal frequency division multiplexing(NC-OFDM)system was proposed.As for NC-OFDM systems in cognitive radio context,the infrastructure of CS-based channel estimation,the design of pilot patterns and the algorithm of channel estimation were explored.Especially,a criterion of optimizing pilot pattern in the CS-based channel estimation was proposed by minimizing the mutual coherence of the measurement matrix in CS theory.Simulations show that,under many patterns of deactivated subcarriers,CS-based channel estimation obtains much better performance than existing NC-OFDM channel estimation methods in terms of the mean square error of the channel estimate as well as the bit error rate of the system.…”
Get full text
Article -
14730
Physics-guided actor-critic reinforcement learning for swimming in turbulence
Published 2025-01-01“…Our scheme, coined the actor-physicist, is an adaptation of the actor-critic algorithm in which the neural network parameterized critic is replaced with an analytically derived physical heuristic function, the physicist. …”
Get full text
Article -
14731
AONT-and-NTRU-based rekeying scheme for encrypted deduplication
Published 2021-10-01“…Rekeying is a good way to protect against key exposure.Most of the existing encrypted deduplication systems are implemented based on message-locked-encryption, in which multiple users with the identical data share the same encryption key.When a user updates keys, that update must be followed by all other data owners, which will incur large computational and communicational overheads.To solve this problem, an AONT-and-NTRU-based rekeying scheme was proposed, a variant of AONT was designed to solve the synchronization problem of multi-user rekeying, and a proxy re-encryption algorithm based on NTRU was introduced to reduce the communicational overhead for the system and computational overhead for clients during rekeying.The efficiency analysis and experimental results show that the proposed scheme has better encryption and decryption efficiency than existing schemes and the time cost of rekeying is significantly reduced.…”
Get full text
Article -
14732
Research on active defense based on multi-stage cyber deception game
Published 2020-08-01“…In view of the characteristic that attacker depended on the detected information to decide the next actions,the non-cooperative signal game theory was applied to analyze cyber attack and defense.The signal deception mechanism in the process of cyber attack and defense was considered deeply by constructing a multi-stage cyber deception game model,and the dynamic analysis and deduction of the multi-stage cyber attack and defense was realized by considering the attenuation of cyber deception signals.A solution for multi-stage cyber deception game equilibrium was improved based on analysis of cyber attack and defense,and an optimal algorithm for selecting cyber deception defense strategies was designed.The effectiveness of the model is verified by simulations.The rules of multi-stage cyber deception games are summarized based on the results,which can provide effective guidance for the research on cyber active defense.…”
Get full text
Article -
14733
Dynamic P2P trust model based on context factors
Published 2016-08-01“…A multi-dimensional trust model was constructed based on the context factors.The direct trust of the interac-tive entities was estimated by integrating the time-decay factor,the transaction impact factor and the participation fre-quency.The trust similarity algorithm was designed based on the Dice similarity and the feedback credibility was aggre-gated from multiple trust chains.The direct interaction,the evaluation similarity and the trust chain was integrated for calculating the recommendation trust.The peer's trust was evaluated by combing the direct trust and the recommendation trust.A new mechanisam was proposed for the trust's update,incentive or punishment according to the peer's behavior on the interaction.The practical example analysis shows that the proposed model can effectively explain the effect of the transaction contextual factors on the entity trust,and can improve the trust sensitivity to the context transaction factors.…”
Get full text
Article -
14734
Music Emotion Research Based on Reinforcement Learning and Multimodal Information
Published 2022-01-01“…In this paper, a multimodal fusion algorithm for music emotion analysis is proposed, and a dynamic model based on reinforcement learning is constructed to improve the analysis accuracy. …”
Get full text
Article -
14735
Dynamics of substrate resource selection in network virtualization environment——an evolutionary game approach
Published 2012-11-01“…The substrate network path selection problem of virtual network was modeled as an evolutionary game.In the process of evolutionary game,virtual networks adjusted the strategies through the iterated game.The replicator dynamics were leveraged equation to analyze the dynamic variation of strategies selection and demonstrates that this dynamics equation is the admissible dynamic to the evolutionary game.The potential game theory was used to analyze the evolutionary process and demonstrates the evolutionary result will converge to the evolutionary equilibrium.At the evolutionary equilibrium,all the virtual networks could get the best selection strategies.Finally,an evolutionary algorithm based on replicator dynamics was proposed.The experiments simulate the process of virtual network selecting the substrate paths in different initial state and reach the evolutionary equilibrium.Simulation results are coincided with the theoretical analysis results.…”
Get full text
Article -
14736
Non-invasive eye tracking technology based on corneal reflex
Published 2012-12-01“…For the deficiencies that existing eye tracking devices are complex,have too many restrictions on the position,need to wear special equipment.A novel method of eye tracking technology using the five near-infrared light as the source of corneal reflex was put forward.This method did not need any wearing equipment,and could adapt to the natural head movement,the algorithm designed calculates the position of sight in high accuracy.A novel method of pupil edge fitting was put forward:fitted circularly and removed false points to get accurate position of pupil center,improved mapping accuracy.Used the GrayScale of image to initialize eye position quickly and accurately.Using the theory of cross-ratio invariance to make coordinate mapping,finally calculated the attention coordinate accurately.…”
Get full text
Article -
14737
Intelligent adaptive edge systems:exploration and open issues
Published 2021-03-01“…Edge intelligence has emerged as a promising trend of the new generation of Internet of things.Edge computing devices are widely distributed, with various diverse end devices and services, delay sensitive, and serve mobile terminals.Therefore, the edge system needs to provide flexible, diverse, reconfigurable and scalable services.From the application fields of adaptive edge computing, the application requirements of intelligent adaptive edge systems were explored, the existing adaptive edge systems and their basic framework were analyzed and summarized, and the application of artificial intelligence technologies was discussed, such as deep learning and reinforcement learning.Then, how to design a special intelligent algorithm in specific application fields was introduced.Finally, the research status and future challenges in this field were discussed.…”
Get full text
Article -
14738
Economic Development Trend Prediction Model Based on Unsupervised Learning in the Internet of Things Environment
Published 2021-01-01“…In order to explore the economic development trend under the environment of the Internet of Things, this paper improves the chaotic algorithm of the Internet of Things and constructs an economic development trend analysis system based on big data technology. …”
Get full text
Article -
14739
Modified Newtonian Dynamics: A Falsification of Cold Dark Matter
Published 2009-01-01“…MOND may be viewed as an algorithm for calculating the distribution of force in an astronomical object from the observed distribution of baryonic matter. …”
Get full text
Article -
14740
Health Promotion Effects of Sports Training Based on HMM Theory and Big Data
Published 2022-01-01“…Firstly, the characteristic information of human health status after sports training is collected based on big data technology, and the evaluation index and evaluation algorithm of human health status after sports training are constructed. …”
Get full text
Article