期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Research of stochastic weight strategy for extended particle swarm optimizer
1
作者 XU Jun-jie YUE Xin XIN Zhan-hong 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2008年第2期122-124,134,共4页
To improve the performance of extended particle swarm optimizer, a novel means of stochastic weight deployment is proposed for the iterative equation of velocity updation. In this scheme, one of the weights is specifi... To improve the performance of extended particle swarm optimizer, a novel means of stochastic weight deployment is proposed for the iterative equation of velocity updation. In this scheme, one of the weights is specified to a random number within the range of [0, 1] and the other two remain constant configurations. The simulations show that this weight strategy outperforms the previous deterministic approach with respect to success rate and convergence speed. The experiments also reveal that if the weight for global best neighbor is specified to a stochastic number, extended particle swarm optimizer achieves high and robust performance on the given multi-modal function. 展开更多
关键词 particle swarm optimization evolutionary computation stochastic weight function optimization
原文传递
Analysis of Classical Encryption Techniques in Cloud Computing 被引量:1
2
作者 Muhammad Yasir Shabir Asif Iqbal +1 位作者 Zahid Mahmood Ata Ullah Ghafoor 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2016年第1期102-113,共12页
Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pa... Cloud computing has become a significant computing model in the IT industry. In this emerging model,computing resources such as software, hardware, networking, and storage can be accessed anywhere in the world on a pay-per-use basis. However, storing sensitive data on un-trusted servers is a challenging issue for this model. To guarantee confidentiality and proper access control of outsourced sensitive data, classical encryption techniques are used. However, such access control schemes are not feasible in cloud computing because of their lack of flexibility, scalability, and fine-grained access control. Instead, Attribute-Based Encryption(ABE) techniques are used in the cloud. This paper extensively surveys all ABE schemes and creates a comparison table for the key criteria for these schemes in cloud applications. 展开更多
关键词 cloud computing access control fine-grained access weighted attribute
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部