Showing 101 - 120 results of 241 for search '"data structure"', query time: 0.10s Refine Results
  1. 101

    Approximate algorithm for median query based on WSN by LIU Cai-ping1, MAO Jian-xu2, LI Ren-fa1, FU Bin1

    Published 2011-01-01
    “…An approximate algorithm for median query(AAMQ) based on WSN was proposed.In AAMQ,each node could estimate the value of the distinct number,and created a subsequence samples which get K percent of the most com-monly used values in its own observed values,and then broadcasted its subsequence to the parents.Finally,these samples were combined to a single sample in the root node which its data structure was far smaller than the size of the whole data set.The approximate value for median query could be introduced from the sample quickly.Experimental results show that the proposed algorithm can greatly reduce the communication,has the advantages of low error range,and is able to significantly prolong system life.…”
    Get full text
    Article
  2. 102

    CP-ABE based data access control for cloud storage by SUN Guo-zi1, DONG Yu1, LI Yun1

    Published 2011-01-01
    “…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
    Get full text
    Article
  3. 103

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  4. 104

    Research on the programming language for proxy re-encryption by Mang SU, Yan YU, Bin WU, Anmin FU

    Published 2018-06-01
    “…The programming language for proxy re-encryption(PLPRE) based on domain specific language(DSL) was proposed,which was similar to the matical description and was adopt to describe the proxy re-encryption directly.The algorithm designer could describe the algorithm conveniently and quickly by PLPRE,and obtain the programming code for computer.Firstly,the grammar of PLPRE was presented,including the definitions of the keyword and programming logic,then the ACC-PRE algorithm was described by PLPRE as an example.Secondly,the PLPRE parser was realized by ANTLR.Finally,the comparisons between the PLPRE and the related work were made.By using the PLPRE,user does not need to pay attentions to data structure or memory allocation.It is suitable for the cryptography experts who is not familiar with the programming.Thus,PLPRE will decrease the deviation between the design and implement for PRE.…”
    Get full text
    Article
  5. 105

    Anomaly detection in backbone networks using Filter-ary-Sketch by ZHENG Li-ming1, ZOU Peng2, HAN Wei-hong1, LI Ai-ping1, JIA Yan1

    Published 2011-01-01
    “…For the special requirements of anomaly detection in backbone networks,an anomaly detection method was proposed based in the summary data structure: Filter-ary-Sketch.It recorded the network traffic information in Fil-ter-are-Sketch online and detected anomalies based on multi-dimensional entropy at every circle.If an anomaly was detected,the anomaly point located according to data stream recorded in Filter-ary-Sketch.Finally,malicious traffic blocked using the source IPs recorded in Bloom filter.The method was effective in detecting a variety of network at-tacks;especially it could block the malicious traffic.Evaluated by the experiment,the method can detect anomaly in the backbone network with small computing and memory resource and block the IP flows that are responsible for the anomaly.…”
    Get full text
    Article
  6. 106

    Low-overhead routing algorithm for opportunistic networks based on immunity information piggybacked by SV by Zhi REN, Cong CHEN, Ya-nan CAO, Chen PENG, Qian-bin CHEN

    Published 2014-10-01
    “…A novel routing algorithm,LRPI (low-overhead routing with piggybacked immunity information) was proposed.LRPI contains the following four new mechanisms:piggybacking the immune information with SV(summary vectors),fast generation of the immune information through a cross-layer method,an improved exchange mechanism of SV,and adaptive compression of SV.Based on the above new mechanism,LRPI not only avoids using special data structure but also can achieve the same immune function more quickly.Theoretical analysis and simulation results show that LRPI outperforms the classical epidemic routing algorithm and a few of its improvements in terms of control overhead,the number of saved packets,and average end-to-end delay.…”
    Get full text
    Article
  7. 107

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  8. 108

    High-performance and high-concurrency encryption scheme for Hadoop platform by Wei JIN, Mingjie YU, Fenghua LI, Zhengkun YANG, Kui GENG

    Published 2019-12-01
    “…,single encryption algorithm,complicated key management,low encryption performance) and they cannot protect data stored in Hadoop effectively,a high-performance encryption and key management scheme for Hadoop was proposed.Firstly,a three-level key management system was extended with the domestic commercial cipher algorithm.Then,a new data structure for encryption zone key to reduce time consumption was designed.Finally,the computing process of data stream in parallel was scheduled.The experimental results show that compared with the existing Hadoop schemes,the proposed scheme can improve the efficiency of key management,and can speed up file encryption.…”
    Get full text
    Article
  9. 109

    THE IMPACT OF NORMALIZATION PROCEDURES ON THE CLASSIFICATION OF BUILDING MATERIALS COMPANIES LISTED ON THE WARSAW STOCK EXCHANGE

    Published 2017-12-01
    “…The conducted study shows that the use of different normalization formulas of variables can cause the change of the results of the companies classification, which does not result neither from the data structure change nor the effectiveness modification of their operations.…”
    Get full text
    Article
  10. 110

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  11. 111

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  12. 112

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  13. 113

    Re-introducing the Cambridge Group Family Reconstitutions by George Alter, Gill Newton, Jim Oeppen

    Published 2020-09-01
    “…To expand their availability the family reconstitutions have been translated into new formats: a relational database, the Intermediate Data Structure (IDS) and an episode file for fertility analysis. …”
    Get full text
    Article
  14. 114

    Outlier detection algorithm based on fast density peak clustering outlier factor by Zhongping ZHANG, Sen LI, Weixiong LIU, Shuxia LIU

    Published 2022-10-01
    “…For the problem that peak density clustering algorithm requires human set parameters and high time complexity, an outlier detection algorithm based on fast density peak clustering outlier factor was proposed.Firstly, k nearest neighbors algorithm was used to replace the density peak of density estimate, which adopted the KD-Tree index data structure calculation of k close neighbors of data objects, and then the way of the product of density and distance was adopted to automatic selection of clustering centers.In addition, the centripetal relative distance and fast density peak clustering outliers were defined to describe the degree of outliers of data objects.Experiments on artificial data sets and real data sets were carried out to verify the algorithm, and compared with some classical and novel algorithms.The validity and time efficiency of the proposed algorithm are verified.…”
    Get full text
    Article
  15. 115

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  16. 116

    Research on the Digital Design of Gear Transmission Scheme by Wei Shan, Lianji Wang, Yali Ma, Guangjian Wang

    Published 2021-11-01
    “…The knowledge unit database of the gear transmission scheme is established and transformed into the corresponding data structure. The solution of hybrid combination schemes of knowledge units is implemented by considering the series-parallel combination of knowledge units. …”
    Get full text
    Article
  17. 117

    The Scanian Economic-Demographic Database (SEDD) by Martin Dribe, Luciana Quaranta

    Published 2020-11-01
    “…The data for 1813-1967 was structured in the model of the Intermediate Data Structure (IDS). In addition to storing source data in the SEDD IDS tables, a wide range of individual- and context-level variables were constructed, which means that most types of analyses using SEDD can be conducted without the need of further elaboration of the data. …”
    Get full text
    Article
  18. 118

    Security Management Technology of Multilayer Satellite Internet Based on Blockchain by Ruijie ZHU, Yudong ZHANG, Yating WEI, Chao XI

    Published 2022-03-01
    “…Satellite internet have the advantages of wide coverage, low latency, large transmission capacity and no geographical infl uence.It can provide ubiquitous internet access services for users all over the world.However, the heterogeneity of satellite internet and ground network, the channel opening and node exposure of satellite internet will pose a security threat to network access and resource management.Aiming at the security problem of satellite internet, a multilayer satellite internet security management architecture based on blockchain was proposed.As a distributed ledger technology, blockchain uses chain data structure to verify and store data, and adopts encryption methods to maintain that data blocks cannot be tampered.Blockchain can realize network security access, trusted resource management, and provide information security protection for satellite internet.This paper improved the security of satellite internet by integrating blockchain technology with satellite internet.…”
    Get full text
    Article
  19. 119

    Research and implementation on acquisition scheme of telecom big data based on Hadoop by Baoyou WANG, Jing QIAN, Shijin YUAN

    Published 2017-01-01
    “…ETL is a very important step in the implementation process of data warehouse.A good ETL flow is important,which can effectively process the telecom big data and improve the acquisition efficiency of the operation platform.Firstly,the main data content of the big data platform was expounded.Secondly,in order to improve the efficiency of massive data collection,Hadoop and Oracle mashup solution was suggested.Subsequently,a dynamic triggered ETL scheduling flow and algorithm was proposed.Compared with timer start ETL scheduling method,it could effectively shorten waiting time and avoid the phenomenon of resources to seize and congestion.Finally,according to the running log of Hadoop platform and Oracle database,the relationship between acquisition efficiency and data quantity was analyzed comparatively.Furthermore,practice result shows that the hybrid data structure of the big data platform complement each other and can effectively enhance the timeliness of data collection and access better application effect.…”
    Get full text
    Article
  20. 120

    FAULT DIAGNOSIS BASED ON MIXED LABEL INFORMATION LOCALITY PRESERVING PROJECTIONS DIMENSION REDUCTION by YUAN LongYin, ZHANG QianTu, LEI Jing, WU ShengCai

    Published 2019-01-01
    “…The similarity matrix is used to preserve the local structure of the same-label samples before and after dimension reduction, whereas the divergence matrix is used to enlarge the distance between the different-label samples after dimension reduction. As a result, data structure is retained effectively, better low dimension structure can be obtained, and higher fault diagnosis accuracy can achieved. …”
    Get full text
    Article