期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
Decision Tree Based Key Management for Secure Group Communication 被引量:2
1
作者 P.Parthasarathi S.Shankar 《Computer Systems Science & Engineering》 SCIE EI 2022年第8期561-575,共15页
Group communication is widely used by most of the emerging network applications like telecommunication,video conferencing,simulation applications,distributed and other interactive systems.Secured group communication p... Group communication is widely used by most of the emerging network applications like telecommunication,video conferencing,simulation applications,distributed and other interactive systems.Secured group communication plays a vital role in case of providing the integrity,authenticity,confidentiality,and availability of the message delivered among the group members with respect to communicate securely between the inter group or else within the group.In secure group communications,the time cost associated with the key updating in the proceedings of the member join and departure is an important aspect of the quality of service,particularly in the large groups with highly active membership.Hence,the paper is aimed to achieve better cost and time efficiency through an improved DC multicast routing protocol which is used to expose the path between the nodes participating in the group communication.During this process,each node constructs an adaptive Ptolemy decision tree for the purpose of generating the contributory key.Each of the node is comprised of three keys which will be exchanged between the nodes for considering the group key for the purpose of secure and cost-efficient group communication.The rekeying process is performed when a member leaves or adds into the group.The performance metrics of novel approach is measured depending on the important factors such as computational and communicational cost,rekeying process and formation of the group.It is concluded from the study that the technique has reduced the computational and communicational cost of the secure group communication when compared to the other existing methods. 展开更多
关键词 Key generation adaptive Ptolemy decision tree cost reduction secure group communication
在线阅读 下载PDF
Context-Based Mobile User Interface 被引量:1
2
作者 Mao Zheng Sihan Cheng Qian Xu 《Journal of Computer and Communications》 2016年第9期1-9,共9页
Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing systems. Each context-aware application has its own set of behaviors to react to context modifications. Hence, every s... Context awareness is increasingly gaining applicability in interactive ubiquitous mobile computing systems. Each context-aware application has its own set of behaviors to react to context modifications. Hence, every software engineer needs to clearly understand the goal of the development and to categorize the context in the application. We incorporate context-based modifications into the appearance or the behavior of the interface, either at the design time or at the run time. In this paper, we present application behavior adaption to the context modification via a context-based user interface in a mobile application. We are interested in a context-based user interface in a mobile device that is automatically adapted based on the context information. We use the adaption tree, named in our methodology, to represent the adaption of mobile device user interface to various context information. The context includes the user’s domain information and dynamic environment changes. Each path in the adaption tree, from the root to the leaf, presents an adaption rule. An e-commerce application is chosen to illustrate our approach. This mobile application was developed based on the adaption tree in the Android platform. The automatic adaption to the context information has enhanced human-computer interactions. 展开更多
关键词 Pervasive Computing Context-Aware Systems Mobile User Interface adaption tree
在线阅读 下载PDF
The complete genome of hydrocarbon-degrading Pseudoalteromonas sp. NJ289 and its phylogenetic relationship 被引量:2
3
作者 LIU Fangming WANG Yibin +4 位作者 QU Changfeng ZHENG Zhou MIAO Jinlai XU Hua XIAO Tian 《Acta Oceanologica Sinica》 SCIE CAS CSCD 2017年第2期88-93,共6页
Genus Pseudoalteromonas belongs to Family Pseudoalteromonadaceae in Gammaproteobacteria. A cold-adapted gram-negative bacterium, hydrocarbon-degrading Pseudoalteromonas sp. NJ289, was isolated from sea-ice of the Anta... Genus Pseudoalteromonas belongs to Family Pseudoalteromonadaceae in Gammaproteobacteria. A cold-adapted gram-negative bacterium, hydrocarbon-degrading Pseudoalteromonas sp. NJ289, was isolated from sea-ice of the Antarctica region, and sequenced the whole genome through the next generation sequencing platform. The assembly yielded three contigs representing two chromosomes and one plasmid with the sizes of 3.2 Mb, 636 kb and 1.8 kb, respectively. The G+C contents of genome were 40.83% and included 3 589 ORFs. Functional annotation indicated some potential roles in enzymatic activity and environmental adaptability. This study may help for understanding the population diverse, evolutionary ecology and the microbial interaction. 展开更多
关键词 Pseudoalteromonas low temperature environmental adaptability sequencing phylogenetic tree
在线阅读 下载PDF
SSH匿名网络网站指纹攻击方法
4
作者 赖琦 《电脑知识与技术》 2020年第15期36-38,共3页
该研究针对SSH匿名网络难以追踪的问题,提出了网站指纹攻击方法,就网站的时间行为对攻击的影响亟待解决。本文针对该问题提出一种基于自适应决策的SSH匿名网络网站指纹攻击方法。该方法首先收集上行流量作为指纹特征,再使用Adaptive Hoe... 该研究针对SSH匿名网络难以追踪的问题,提出了网站指纹攻击方法,就网站的时间行为对攻击的影响亟待解决。本文针对该问题提出一种基于自适应决策的SSH匿名网络网站指纹攻击方法。该方法首先收集上行流量作为指纹特征,再使用Adaptive Hoeffding Tree和Adaptive Hoeffding Option Tree算法生成指纹特征库,来实现指纹库的不断更新,以应变动态网站的时间行为对指纹库的影响,最后选取100常用网站作为攻击目标进行实验。实验结果显示,在训练集与测试集时间差为0时准确率达到93.43%,且随着时间差增加,准确率下降缓慢,表明该方法能有效的进行攻击,并且能减小时间行为的影响。 展开更多
关键词 SSH Adaptive Hoeffding tree Adaptive Hoeffding Option tree 网站指纹攻击 上行流量
在线阅读 下载PDF
The Ghost Cell Method and its Applications for Inviscid Compressible Flow on Adaptive Tree Cartesian Grids 被引量:1
5
作者 Jianming Liu Ning Zhao Ou Hu 《Advances in Applied Mathematics and Mechanics》 SCIE 2009年第5期664-682,共19页
In this paper,an immersed boundary algorithm is developed by combining the ghost cell method with adaptive tree Cartesian grid method.Furthermore,the proposed method is successfully used to evaluate various inviscid c... In this paper,an immersed boundary algorithm is developed by combining the ghost cell method with adaptive tree Cartesian grid method.Furthermore,the proposed method is successfully used to evaluate various inviscid compressible flow with immersed boundary.The extension to three dimensional cases is also achieved.Numerical examples demonstrate the proposed method is effective. 展开更多
关键词 Ghost cell method Cartesian grid adaptive tree method inviscid compressible flow
在线阅读 下载PDF
VLSI implementation of MIMO detection for 802.11n using a novel adaptive tree search algorithm
6
作者 尧横 鉴海防 +1 位作者 周立国 石寅 《Journal of Semiconductors》 EI CAS CSCD 2013年第10期107-113,共7页
A 4×4 64-QAM multiple-input multiple-output (MIMO) detector is presented for the application of an IEEE 802.1 In wireless local area network. The detector is the implementation of a novel adaptive tree search ... A 4×4 64-QAM multiple-input multiple-output (MIMO) detector is presented for the application of an IEEE 802.1 In wireless local area network. The detector is the implementation of a novel adaptive tree search (ATS) algorithm, and multiple ATS cores need to be instantiated to achieve the wideband requirement in the 802.11 n standard. Both the ATS algorithm and the architectural considerations are explained. The latency of the detector is 0.75 μs, and the detector has a gate count of 848 k with a total of 19 parallel ATS cores. Each ATS core runs at 67 MHz. Measurement results show that compared with the floating-point ATS algorithm, the fixed-point imple- mentation achieves a loss of 0.9 dB at a BER of 10^-3. 展开更多
关键词 multiple-input multiple-output adaptive tree search sphere decoder fixed complexity sphere decoder 802.11n
原文传递
RLART: An Adaptive Radix Tree Based on Deep Reinforcement Learning
7
作者 Mengkun Zhang Lingli Li Xin Zheng 《国际计算机前沿大会会议论文集》 2024年第2期328-344,共17页
Adaptive Radix Tree(ART)is an efficient data structure for key-based lookup and insertion operations.It finds extensive applications in various domains,including database management systems,network routing,operating s... Adaptive Radix Tree(ART)is an efficient data structure for key-based lookup and insertion operations.It finds extensive applications in various domains,including database management systems,network routing,operating systems,and storage systems.Compared to traditional prefix trees,its aim is to provide enhanced space and time efficiency.By utilizing appropriate node types and efficient search strategies,it optimizes the time and space complexities of search and insertion operations.During the construction of ART,frequent memory allocations and deallocations result in suboptimal performance,introducing additional memory overhead.Traditional methods struggle to address these drawbacks.To mitigate this issue,we draw inspiration from Deep Reinforcement Learning(DRL)and develop aDRLbased model to determine howto select node types for creating new nodes,rather than relying on currently employed manual heuristics.Importantly,the ART constructed using DRL-based methods doesn’t necessitate replacing the existing index and query processing algorithms deployed in the current database infrastructure.Experimental results on both real and synthetic datasets containing 200 million objects clearly indicate the superiority of our DRL-based index construction approach over conventional methods for building ART in terms of performance. 展开更多
关键词 Deep Reinforcement Learning INDEX Adaptive Radix tree Markov Decision Process
原文传递
False Data Injection Detection in Power System Based on LOSSA-AdaBoostDT
8
作者 Lei Xi Xilong Tian +1 位作者 Miao He Chen Cheng 《Protection and Control of Modern Power Systems》 2025年第3期55-64,共10页
The attack of false data injection can con-taminate the measurements acquired from the supervi-sory control and data acquisition(SCADA)system,which can seriously endanger the safety and stability of power system opera... The attack of false data injection can con-taminate the measurements acquired from the supervi-sory control and data acquisition(SCADA)system,which can seriously endanger the safety and stability of power system operations.The conventional machine learning attack detection methods use a single strong classifier and are difficult to solve the problem of overfitting,making them lack of generalization ability.On the other hand,most existing dimension reduction approaches based on feature extraction can change the original physical meanings of measurements.Here,a novel method is proposed based on feature selection and ensemble learn-ing to solve the above problems.Squirrel search algo-rithm combines Latin hypercube sampling and opposi-tion-based learning to form an improved algorithm with strong global search ability for feature selection.This avoids the problem of feature extraction changing the original physical meanings of measurements.Besides,the classifier based on adaptive boosting decision tree en-semble learning algorithm with stronger generalization ability is used to distinguish the false data injection.Sim-ulation results using the IEEE 14-bus and IEEE 57-bus test systems verify the proposed method with higher per-formance of detection compared with other widely adopted methods. 展开更多
关键词 False data injection squirrel search al-gorithm adaptive boosting decision tree SCADA
在线阅读 下载PDF
SE-Chain:A Scalable Storage and Efficient Retrieval Model for Blockchain 被引量:5
9
作者 Da-Yu Jia Jun-Chang Xin +2 位作者 Zhi-Qiong Wang Han Lei Guo-Ren Wang 《Journal of Computer Science & Technology》 SCIE EI CSCD 2021年第3期693-706,共14页
Massive data is written to blockchain systems for the destination of keeping safe. However, existing blockchain protocols still demand that each full node has to contain the entire chain. Most nodes quit because they ... Massive data is written to blockchain systems for the destination of keeping safe. However, existing blockchain protocols still demand that each full node has to contain the entire chain. Most nodes quit because they are unable to grow their storage space with the size of data. As the number of nodes decreases, the security of blockchains would significantly reduce. We present SE-Chain, a novel scale-out blockchain model that improves storage scalability under the premise of ensuring safety and achieves efficient retrieval. The SE-Chain consists of three parts:the data layer, the processing layer and the storage layer. In the data layer, each transaction is stored in the AB-M tree (Adaptive Balanced Merkle tree), which adaptively combines the advantages of balanced binary tree (quick retrieval) and Merkle tree (quick verification). In the processing layer, the full nodes store the part of the complete chain selected by the duplicate ratio regulation algorithm. Meanwhile, the node reliability verification method is used for increasing the stability of full nodes and reducing the risk of imperfect data recovering caused by the reduction of duplicate number in the storage layer. The experimental results on real datasets show that the query time of SE-Chain based on the AB-M tree is reduced by 17% when 16 nodes exist. Overall, SE-Chain improves the storage scalability extremely and implements efficient querying of transactions. 展开更多
关键词 SE-Chain AB-M(adaptive balanced Merkle)tree efficient retrieval scale-out blockchain
原文传递
IPFS-DKRM: An Efficient Keyword Retrieval Model of IPFS Based on ART
10
作者 Jing Li Jiahao Meng 《国际计算机前沿大会会议论文集》 2024年第3期123-135,共13页
The content-based addressing method of Interplanetary File System(IPFS)leads to the lack of the function of retrieving relevant data through key information.To solve this problem,this paper proposes an efficient IPFS ... The content-based addressing method of Interplanetary File System(IPFS)leads to the lack of the function of retrieving relevant data through key information.To solve this problem,this paper proposes an efficient IPFS keyword retrieval model–IPFS-DKRM(IPFS-Distributed keyword retrieval model).This model combines the global index with Adaptive Radix Tree,and optimizes the storage mode of IPFS network and node-local data index:The model adopts the global index method and uses ART to store the key information of global index locally and stores the complete index information in IPFS to reduce the time of data retrieval and update;The nodes of network through the Publish-Subscribe Pattern synchronization index,and the use of Conflict-free Replication Data Type(CRDT)to maintain the final consistency of the global index of each node,to ensure that all nodes in the local to provide efficient retrieval services.In the simulation experiment,the index of open source data set Crosswikis was constructed,and the performance was analyzed based on the results of Siva data.The experimental results showed that compared with the Siva model,the response retrieval time of IPFS-DKRM was reduced by 75%,and the space occupied by node local storage index was reduced by 70%.It proves that the model only needs to occupy a small amount of space to store the global index information in the system to provide efficient retrieval function for IPFS,so that IPFS canmeet more application scenarios in the future. 展开更多
关键词 Interplanetary File System Keyword Retrieval Adaptive Radix tree Global Index Decentralized storage
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部