Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data...Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data mining have been developed, but only a few of them make use of intelligent agents. This paper provides the reason for applying Multi-Agent Technology in Distributed Data Mining and presents a Distributed Data Mining System based on Multi-Agent Technology that deals with heterogeneity in such environment. Based on the advantages of both the CS model and agent-based model, the system is being able to address the specific concern of increasing scalability and enhancing performance.展开更多
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.展开更多
Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is ...Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation.展开更多
RIO(RED with IN and OUT) is the primary queue management mechanism proposed for assured forwarding in the DiffServ (Differentiated Service) framework. Although RIO can generally provide bandwidth guarantees, its queui...RIO(RED with IN and OUT) is the primary queue management mechanism proposed for assured forwarding in the DiffServ (Differentiated Service) framework. Although RIO can generally provide bandwidth guarantees, its queuing delay is sensitive to the traffic load. This paper presents a qualitative explanation for its origin. As a solution, an Adaptive RIO for Delay (ARIO-D) is proposed to provide guaranteed delay for multimedia traffic. Simulation results show that by trading loss for delay, ARIO-D can effectively improve the robustness of RIO under different and dynamic traffic, and provide stable and differentiated performance of queuing delay without any degradation in performance of throughput.展开更多
Evolutionary computation (EC) has received significant attention in China during the last two decades. In this paper, we present an overview of the current state of this rapidly growing field in China. Chinese resea...Evolutionary computation (EC) has received significant attention in China during the last two decades. In this paper, we present an overview of the current state of this rapidly growing field in China. Chinese research in theoretical foundations of EC, EC-based optimization, EC-based data mining, and EC-based real-world applications are summarized.展开更多
The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilit...The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilitate sharing and collaborating of network resources between applications. Trust management is an elementary component for iVCE. The uncertain and dynamic characteristics of iVCE necessitate the requirement for the trust management to be subjective, historical evidence based and context dependent. This paper presents a Bayesian analysis-based trust model, which aims to secure the active agents for selecting appropriate trusted services in iVCE. Simulations are made to analyze the properties of the trust model which show that the subjective prior information influences trust evaluation a lot and the model stimulates positive interactions.展开更多
With the rapid development of computer networking technology, the whole world has become a "global village." At the same time, the insistent combination of Networking technology and financial services made the tradi...With the rapid development of computer networking technology, the whole world has become a "global village." At the same time, the insistent combination of Networking technology and financial services made the traditional financial concept undergo profound changes. Financial Network is the general trend. Financial innovation has come to an Internet-based and service- oriented way of innovative rapid development stage. As the improvements of the degree of financial services network, how to effectively guard against financial risks under control network environment is an important issue we face.展开更多
For a domestic personal robot, personalized services are as important as predesigned tasks, because the robot needs to adjust the home state based on the operator's habits. An operator's habits are composed of...For a domestic personal robot, personalized services are as important as predesigned tasks, because the robot needs to adjust the home state based on the operator's habits. An operator's habits are composed of cues, behaviors, and rewards. This article introduces behavioral footprints to describe the operator's behaviors in a house, and applies the inverse reinforcement learning technique to extract the operator's habits, represented by a reward function. We implemented the proposed approach with a mobile robot on indoor temperature adjustment, and compared this approach with a baseline method that recorded all the cues and behaviors of the operator. The result shows that the proposed approach allows the robot to reveal the operator's habits accurately and adjust the environment state accordingly.展开更多
With the rapid development of the information technology and the computer network, the electronic commerce has become the economic hotspot and the development trend in today's society, and the influence of the electr...With the rapid development of the information technology and the computer network, the electronic commerce has become the economic hotspot and the development trend in today's society, and the influence of the electronic commerce on the national economy is growing. It is not only the important driving force of the economic growth, but also is a force influencing the development of the retail business and the changes of the structures of the economy.展开更多
With the rapid development of computer technology and network technology, the service model of university library gradually goes to the intelligent, personalized directionfrom the traditional single reference, but the...With the rapid development of computer technology and network technology, the service model of university library gradually goes to the intelligent, personalized directionfrom the traditional single reference, but there are many shortcomings. It cannot fully satisfy the increasing needs for the division Health research and information, it must actively build the University Library subject Knowledge service Model of a science. This paper introduces the subject of service concepts of library knowledge, proposes effective method to build service model of university library knowledge, and strengthens academic knowledge service countermeasures to promote the development of knowledge- disciplinary university library services.展开更多
The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasin...The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasing share of overall sale avenue, and online shopping is expected to continue growing for foreseeable future. As such, it is vital to identify the performance of shopping online and investigate the effects that shopping online has on e-commerce.The methods used in this study are consulting some authentic materials and looking into some cases in point. It is found that shopping online has so many disadvantages, such as credit crisis, the insecurity of e-bank, express problem, a series of relevant law problems, limited payment options and so on.Because of these limitations, shopping online has interfered with e-commerce. Overall, shopping online is more or less a bar to e-commerce.展开更多
文摘Distributed Data Mining is expected to discover preciously unknown, implicit and valuable information from massive data set inherently distributed over a network. In recent years several approaches to distributed data mining have been developed, but only a few of them make use of intelligent agents. This paper provides the reason for applying Multi-Agent Technology in Distributed Data Mining and presents a Distributed Data Mining System based on Multi-Agent Technology that deals with heterogeneity in such environment. Based on the advantages of both the CS model and agent-based model, the system is being able to address the specific concern of increasing scalability and enhancing performance.
基金The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
文摘The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.
文摘Traffic monitoring is of major importance for enforcing traffic management policies.To accomplish this task,the detection of vehicle can be achieved by exploiting image analysis techniques.In this paper,a solution is presented to obtain various traffic parameters through vehicular video detection system(VVDS).VVDS exploits the algorithm based on virtual loops to detect moving vehicle in real time.This algorithm uses the background differencing method,and vehicles can be detected through luminance difference of pixels between background image and current image.Furthermore a novel technology named as spatio-temporal image sequences analysis is applied to background differencing to improve detection accuracy.Then a hardware implementation of a digital signal processing (DSP) based board is described in detail and the board can simultaneously process four-channel video from different cameras. The benefit of usage of DSP is that images of a roadway can be processed at frame rate due to DSP′s high performance.In the end,VVDS is tested on real-world scenes and experiment results show that the system is both fast and robust to the surveillance of transportation.
基金Supported by the National Natural Science Foundation of China(No.60202005) theFoundation for University Key Teacher by the Ministry of Education in P.R.Chinaalso supported in part by the Australian Research Council (No.LX0240468).
文摘RIO(RED with IN and OUT) is the primary queue management mechanism proposed for assured forwarding in the DiffServ (Differentiated Service) framework. Although RIO can generally provide bandwidth guarantees, its queuing delay is sensitive to the traffic load. This paper presents a qualitative explanation for its origin. As a solution, an Adaptive RIO for Delay (ARIO-D) is proposed to provide guaranteed delay for multimedia traffic. Simulation results show that by trading loss for delay, ARIO-D can effectively improve the robustness of RIO under different and dynamic traffic, and provide stable and differentiated performance of queuing delay without any degradation in performance of throughput.
文摘Evolutionary computation (EC) has received significant attention in China during the last two decades. In this paper, we present an overview of the current state of this rapidly growing field in China. Chinese research in theoretical foundations of EC, EC-based optimization, EC-based data mining, and EC-based real-world applications are summarized.
基金The National Basic Research 973 Program of China (No2005CB321804)
文摘The initiative of internet-based virtual computing environment (iVCE) aims to provide the end users and applications with a harmonions, trustworthy and transparent integrated computing environment which will facilitate sharing and collaborating of network resources between applications. Trust management is an elementary component for iVCE. The uncertain and dynamic characteristics of iVCE necessitate the requirement for the trust management to be subjective, historical evidence based and context dependent. This paper presents a Bayesian analysis-based trust model, which aims to secure the active agents for selecting appropriate trusted services in iVCE. Simulations are made to analyze the properties of the trust model which show that the subjective prior information influences trust evaluation a lot and the model stimulates positive interactions.
文摘With the rapid development of computer networking technology, the whole world has become a "global village." At the same time, the insistent combination of Networking technology and financial services made the traditional financial concept undergo profound changes. Financial Network is the general trend. Financial innovation has come to an Internet-based and service- oriented way of innovative rapid development stage. As the improvements of the degree of financial services network, how to effectively guard against financial risks under control network environment is an important issue we face.
基金supported in part by Hong Kong RGC GRC (CUHK14205914 and CUHK415512)
文摘For a domestic personal robot, personalized services are as important as predesigned tasks, because the robot needs to adjust the home state based on the operator's habits. An operator's habits are composed of cues, behaviors, and rewards. This article introduces behavioral footprints to describe the operator's behaviors in a house, and applies the inverse reinforcement learning technique to extract the operator's habits, represented by a reward function. We implemented the proposed approach with a mobile robot on indoor temperature adjustment, and compared this approach with a baseline method that recorded all the cues and behaviors of the operator. The result shows that the proposed approach allows the robot to reveal the operator's habits accurately and adjust the environment state accordingly.
文摘With the rapid development of the information technology and the computer network, the electronic commerce has become the economic hotspot and the development trend in today's society, and the influence of the electronic commerce on the national economy is growing. It is not only the important driving force of the economic growth, but also is a force influencing the development of the retail business and the changes of the structures of the economy.
文摘With the rapid development of computer technology and network technology, the service model of university library gradually goes to the intelligent, personalized directionfrom the traditional single reference, but there are many shortcomings. It cannot fully satisfy the increasing needs for the division Health research and information, it must actively build the University Library subject Knowledge service Model of a science. This paper introduces the subject of service concepts of library knowledge, proposes effective method to build service model of university library knowledge, and strengthens academic knowledge service countermeasures to promote the development of knowledge- disciplinary university library services.
文摘The rapid growth oflnternet technology development has made Chinese consumers search for products over the Internet and purchase products or services from Web-retailers. E-commerce is growing to represent an increasing share of overall sale avenue, and online shopping is expected to continue growing for foreseeable future. As such, it is vital to identify the performance of shopping online and investigate the effects that shopping online has on e-commerce.The methods used in this study are consulting some authentic materials and looking into some cases in point. It is found that shopping online has so many disadvantages, such as credit crisis, the insecurity of e-bank, express problem, a series of relevant law problems, limited payment options and so on.Because of these limitations, shopping online has interfered with e-commerce. Overall, shopping online is more or less a bar to e-commerce.