Advanced Search
Displaying 11-20 on page 2 of 7648. Per Page  
  • A Distributed Covert Channel of the Packet Ordering Enhancement Model Based on Data Compression
  • Abstract Covert channel of the packet ordering is a hot research topic. Encryption technology is not enough to protect the security of both sides of communication. Covert channel needs to hide the transmission data and protect content of communication. The traditional methods are usually to use proxy technology such as tor anonymous tracking technology to achieve hiding from the communicator. However, because the establishment of proxy communication needs to consume traffic, the communication capacity will be reduced, and in recent years, the tor technology often has vulnerabilities that led to the leakage of secret information. In this paper, the covert channel…
  • More
  •   Views:127       Downloads:94        Download PDF
  • A Recommendation Approach Based on Bayesian Networks for Clone Refactor
  • Abstract Reusing code fragments by copying and pasting them with or without minor adaptation is a common activity in software development. As a result, software systems often contain sections of code that are very similar, called code clones. Code clones are beneficial in reducing software development costs and development risks. However, recent studies have indicated some negative impacts as a result. In order to effectively manage and utilize the clones, we design an approach for recommending refactoring clones based on a Bayesian network. Firstly, clone codes are detected from the source code. Secondly, the clones that need to be refactored are…
  • More
  •   Views:93       Downloads:74        Download PDF
  • Image Super-Resolution Based on Generative Adversarial Networks: A Brief Review
  • Abstract Single image super resolution (SISR) is an important research content in the field of computer vision and image processing. With the rapid development of deep neural networks, different image super-resolution models have emerged. Compared to some traditional SISR methods, deep learning-based methods can complete the superresolution tasks through a single image. In addition, compared with the SISR methods using traditional convolutional neural networks, SISR based on generative adversarial networks (GAN) has achieved the most advanced visual performance. In this review, we first explore the challenges faced by SISR and introduce some common datasets and evaluation metrics. Then, we review the…
  • More
  •   Views:103       Downloads:77        Download PDF
  • A Recommendation Method for Highly Sparse Dataset Based on Teaching Recommendation Factorization Machines
  • Abstract There is no reasonable scientific basis for selecting the excellent teachers of the school’s courses. To solve the practical problem, we firstly give a series of normalization models for defining the key attributes of teachers’ professional foundation, course difficulty coefficient, and comprehensive evaluation of teaching. Then, we define a partial weight function to calculate the key attributes, and obtain the partial recommendation values. Next, we construct a highly sparse Teaching Recommendation Factorization Machines (TRFMs) model, which takes the 5-tuples relation including teacher, course, teachers’ professional foundation, course difficulty, teaching evaluation as the feature vector, and take partial recommendation value as…
  • More
  •   Views:86       Downloads:61        Download PDF
  • Research on Vehicle Routing Problem with Soft Time Windows Based on Hybrid Tabu Search and Scatter Search Algorithm
  • Abstract With the expansion of the application scope of social computing problems, many path problems in real life have evolved from pure path optimization problems to social computing problems that take into account various social attributes, cultures, and the emotional needs of customers. The actual soft time window vehicle routing problem, speeding up the response of customer needs, improving distribution efficiency, and reducing operating costs is the focus of current social computing problems. Therefore, designing fast and effective algorithms to solve this problem has certain theoretical and practical significance. In this paper, considering the time delay problem of customer demand, the…
  • More
  •   Views:106       Downloads:66        Download PDF
  • A Haze Feature Extraction and Pollution Level Identification Pre-Warning Algorithm
  • Abstract The prediction of particles less than 2.5 micrometers in diameter (PM2.5) in fog and haze has been paid more and more attention, but the prediction accuracy of the results is not ideal. Haze prediction algorithms based on traditional numerical and statistical prediction have poor effects on nonlinear data prediction of haze. In order to improve the effects of prediction, this paper proposes a haze feature extraction and pollution level identification pre-warning algorithm based on feature selection and integrated learning. Minimum Redundancy Maximum Relevance method is used to extract low-level features of haze, and deep confidence network is utilized to extract…
  • More
  •   Views:105       Downloads:61        Download PDF
  • Privacy-Preserving Decision Protocols Based on Quantum Oblivious Key Distribution
  • Abstract Oblivious key transfer (OKT) is a fundamental problem in the field of secure multi-party computation. It makes the provider send a secret key sequence to the user obliviously, i.e., the user may only get almost one bit key in the sequence which is unknown to the provider. Recently, a number of works have sought to establish the corresponding quantum oblivious key transfer model and rename it as quantum oblivious key distribution (QOKD) from the well-known expression of quantum key distribution (QKD). In this paper, a new QOKD model is firstly proposed for the provider and user with limited quantum capabilities,…
  • More
  •   Views:84       Downloads:58        Download PDF
  • Improving Chinese Word Representation with Conceptual Semantics
  • Abstract The meaning of a word includes a conceptual meaning and a distributive meaning. Word embedding based on distribution suffers from insufficient conceptual semantic representation caused by data sparsity, especially for low-frequency words. In knowledge bases, manually annotated semantic knowledge is stable and the essential attributes of words are accurately denoted. In this paper, we propose a Conceptual Semantics Enhanced Word Representation (CEWR) model, computing the synset embedding and hypernym embedding of Chinese words based on the Tongyici Cilin thesaurus, and aggregating it with distributed word representation to have both distributed information and the conceptual meaning encoded in the representation of…
  • More
  •   Views:84       Downloads:60        Download PDF
  • An Efficient Bar Code Image Recognition Algorithm for Sorting System
  • Abstract In the sorting system of the production line, the object movement, fixed angle of view, light intensity and other reasons lead to obscure blurred images. It results in bar code recognition rate being low and real time being poor. Aiming at the above problems, a progressive bar code compressed recognition algorithm is proposed. First, assuming that the source image is not tilted, use the direct recognition method to quickly identify the compressed source image. Failure indicates that the compression ratio is improper or the image is skewed. Then, the source image is enhanced to identify the source image directly. Finally,…
  • More
  •   Views:83       Downloads:59        Download PDF
  • Chinese Spirits Identification Model Based on Mid-Infrared Spectrum
  • Abstract Applying computer technology to the field of food safety, and how to identify liquor quickly and accurately, is of vital importance and has become a research focus. In this paper, sparse principal component analysis (SPCA) was applied to seek sparse factors of the mid-infrared (MIR) spectra of five famous vintage year Chinese spirits. The results showed while meeting the maximum explained variance, 23 sparse principal components (PCs) were selected as features in a support vector machine (SVM) model, which obtained a 97% classification accuracy. By comparison principal component analysis (PCA) selected 10 PCs as features but only achieved an 83%…
  • More
  •   Views:73       Downloads:57        Download PDF
Displaying 11-20 on page 2 of 7648. Per Page