-
101
Approximate algorithm for median query based on WSN
Published 2011-01-01“…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
Get full text
Article -
102
CP-ABE based data access control for cloud storage
Published 2011-01-01“…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
Get full text
Article -
103
Re-introducing the Cambridge Group Family Reconstitutions
Published 2020-09-01“…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
Get full text
Article -
104
Research on the programming language for proxy re-encryption
Published 2018-06-01“…The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed,which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe the algorithm conveniently and quickly by PLPRE,and obtain the programming code for computer.Firstly,the grammar of PLPRE was presented,including the definitions of the keyword and programming logic,then the ACC-PRE algorithm was described by PLPRE as an example.Secondly,the PLPRE parser was realized by ANTLR.Finally,the comparisons between the PLPRE and the related work were made.By using the PLPRE,user does not need to pay attentions to data structure or memory allocation.It is suitable for the cryptography experts who is not familiar with the programming.Thus,PLPRE will decrease the deviation between the design and implement for PRE.…”
Get full text
Article -
105
Anomaly detection in backbone networks using Filter-ary-Sketch
Published 2011-01-01“…For the special requirements of anomaly detection in backbone networks,an anomaly detection method was proposed based in the summary data structure: Filter-ary-Sketch.It recorded the network traffic information in Fil-ter-are-Sketch online and detected anomalies based on multi-dimensional entropy at every circle.If an anomaly was detected,the anomaly point located according to data stream recorded in Filter-ary-Sketch.Finally,malicious traffic blocked using the source IPs recorded in Bloom filter.The method was effective in detecting a variety of network at-tacks;especially it could block the malicious traffic.Evaluated by the experiment,the method can detect anomaly in the backbone network with small computing and memory resource and block the IP flows that are responsible for the anomaly.…”
Get full text
Article -
106
Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV
Published 2014-10-01“…A novel routing algorithm,LRPI (low-overhead routing with piggybacked immunity information) was proposed.LRPI contains the following four new mechanisms:piggybacking the immune information with SV(summary vectors),fast generation of the immune information through a cross-layer method,an improved exchange mechanism of SV,and adaptive compression of SV.Based on the above new mechanism,LRPI not only avoids using special data structure but also can achieve the same immune function more quickly.Theoretical analysis and simulation results show that LRPI outperforms the classical epidemic routing algorithm and a few of its improvements in terms of control overhead,the number of saved packets,and average end-to-end delay.…”
Get full text
Article -
107
Re-introducing the Cambridge Group Family Reconstitutions
Published 2020-09-01“…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
Get full text
Article -
108
High-performance and high-concurrency encryption scheme for Hadoop platform
Published 2019-12-01“…,single encryption algorithm,complicated key management,low encryption performance) and they cannot protect data stored in Hadoop effectively,a high-performance encryption and key management scheme for Hadoop was proposed.Firstly,a three-level key management system was extended with the domestic commercial cipher algorithm.Then,a new data structure for encryption zone key to reduce time consumption was designed.Finally,the computing process of data stream in parallel was scheduled.The experimental results show that compared with the existing Hadoop schemes,the proposed scheme can improve the efficiency of key management,and can speed up file encryption.…”
Get full text
Article -
109
THE IMPACT OF NORMALIZATION PROCEDURES ON THE CLASSIFICATION OF BUILDING MATERIALS COMPANIES LISTED ON THE WARSAW STOCK EXCHANGE
Published 2017-12-01“…The conducted study shows that the use of different normalization formulas of variables can cause the change of the results of the companies classification, which does not result neither from the data structure change nor the effectiveness modification of their operations.…”
Get full text
Article -
110
The Scanian Economic-Demographic Database (SEDD)
Published 2020-11-01“…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
Get full text
Article -
111
Re-introducing the Cambridge Group Family Reconstitutions
Published 2020-09-01“…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
Get full text
Article -
112
Re-introducing the Cambridge Group Family Reconstitutions
Published 2020-09-01“…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
Get full text
Article -
113
Re-introducing the Cambridge Group Family Reconstitutions
Published 2020-09-01“…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
Get full text
Article -
114
Outlier detection algorithm based on fast density peak clustering outlier factor
Published 2022-10-01“…For the problem that peak density clustering algorithm requires human set parameters and high time complexity, an outlier detection algorithm based on fast density peak clustering outlier factor was proposed.Firstly, k nearest neighbors algorithm was used to replace the density peak of density estimate, which adopted the KD-Tree index data structure calculation of k close neighbors of data objects, and then the way of the product of density and distance was adopted to automatic selection of clustering centers.In addition, the centripetal relative distance and fast density peak clustering outliers were defined to describe the degree of outliers of data objects.Experiments on artificial data sets and real data sets were carried out to verify the algorithm, and compared with some classical and novel algorithms.The validity and time efficiency of the proposed algorithm are verified.…”
Get full text
Article -
115
The Scanian Economic-Demographic Database (SEDD)
Published 2020-11-01“…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
Get full text
Article -
116
Research on the Digital Design of Gear Transmission Scheme
Published 2021-11-01“…The knowledge unit database of the gear transmission scheme is established and transformed into the corresponding data structure. The solution of hybrid combination schemes of knowledge units is implemented by considering the series-parallel combination of knowledge units. …”
Get full text
Article -
117
The Scanian Economic-Demographic Database (SEDD)
Published 2020-11-01“…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
Get full text
Article -
118
Security Management Technology of Multilayer Satellite Internet Based on Blockchain
Published 2022-03-01“…Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite internet and ground network, the channel opening and node exposure of satellite internet will pose a security threat to network access and resource management.Aiming at the security problem of satellite internet, a multilayer satellite internet security management architecture based on blockchain was proposed.As a distributed ledger technology, blockchain uses chain data structure to verify and store data, and adopts encryption methods to maintain that data blocks cannot be tampered.Blockchain can realize network security access, trusted resource management, and provide information security protection for satellite internet.This paper improved the security of satellite internet by integrating blockchain technology with satellite internet.…”
Get full text
Article -
119
Research and implementation on acquisition scheme of telecom big data based on Hadoop
Published 2017-01-01“…ETL is a very important step in the implementation process of data warehouse.A good ETL flow is important,which can effectively process the telecom big data and improve the acquisition efficiency of the operation platform.Firstly,the main data content of the big data platform was expounded.Secondly,in order to improve the efficiency of massive data collection,Hadoop and Oracle mashup solution was suggested.Subsequently,a dynamic triggered ETL scheduling flow and algorithm was proposed.Compared with timer start ETL scheduling method,it could effectively shorten waiting time and avoid the phenomenon of resources to seize and congestion.Finally,according to the running log of Hadoop platform and Oracle database,the relationship between acquisition efficiency and data quantity was analyzed comparatively.Furthermore,practice result shows that the hybrid data structure of the big data platform complement each other and can effectively enhance the timeliness of data collection and access better application effect.…”
Get full text
Article -
120
FAULT DIAGNOSIS BASED ON MIXED LABEL INFORMATION LOCALITY PRESERVING PROJECTIONS DIMENSION REDUCTION
Published 2019-01-01“…The similarity matrix is used to preserve the local structure of the same-label samples before and after dimension reduction, whereas the divergence matrix is used to enlarge the distance between the different-label samples after dimension reduction. As a result, data structure is retained effectively, better low dimension structure can be obtained, and higher fault diagnosis accuracy can achieved. …”
Get full text
Article