Suggested Topics within your search.
Suggested Topics within your search.
-
9361
Privacy risk adaptive access control model via evolutionary game
Published 2019-12-01“…Aiming at the problem that in the private sensitive date centralized and opening information systems,a fine-grained and self-adaptive access control model for privacy preserving is desperately needed,thus the balance between privacy preserving and data access utility should be achieved,a rational multi-player risk-adaptive based access control model for privacy preserving was proposed.Firstly,the privacy risk values of access request and requester were formulized by the private information quantity of the requested dataset,and by using Shannon information.Secondly,a risk-adaptive based access control evolutionary game model was constructed by using evolutionary game under the supposing of bounded rational players.Furthermore,dynamic strategies of participants were analyzed by using replicator dynamics equation,and the method of choosing evolutionary stable strategy was proposed.Simulation and comparison results show that,the proposed model is effective to dynamically and adaptively preserve privacy and more risk adaptive,and dynamic evolutionary access strategies of the bounded rational participants are more suitable for practical scenarios.…”
Get full text
Article -
9362
Framing Religious Pluralism as Deviation
Published 2025-06-01“…The findings show that this account constructs pluralism as a theological and ideological threat, associated with Western liberalism and categorized as a form of kufr. …”
Get full text
Article -
9363
RESEARCH OF DIGITAL CAMERA DYNAMIC RANGE ON THE IMAGING PROCESSING BASIS
Published 2017-09-01“…The authors propose a method to extend the dynamic range of a digital camera for red, green and blue color channel of intensities by pairing the calibration dependencies, and determine the true brightness and color of a point on the object by calculation.Calibration dependencies (triads) of digital camera for red, green and blue color channels intensities were constructed. These dependences allow determining lower and upper bounds of the dynamic range. …”
Get full text
Article -
9364
A graph algorithm for the time constrained shortest path
Published 2022-12-01“…Highly efficient algorithms for solving the time constrained shortest path problem have been highlighted over the past decades to reduce the cost of vehicle travel in the road network. …”
Get full text
Article -
9365
A matching method for elderly care service personnel with multiple types of service expectations.
Published 2025-01-01“…With the rapid growth of the global aging population, the problem of providing for the elderly has become increasingly prominent. …”
Get full text
Article -
9366
Simulation and Analysis of Dynamic Process Distribution Effect of High Voltage IGBT
Published 2021-09-01“…Therefore, there is a current concentration phenomenon in the dynamic process of the IGBT chip, especially when the chip area is large, the current concentration phenomenon is particularly obvious, which leads to the problem of the dynamic process distribution effect. …”
Get full text
Article -
9367
Path planning algorithm for WCE with joint energy replenishment and data collection based on multi-objective optimization
Published 2018-10-01“…Considering limited energy of the wireless charging equipment (WCE) in wireless rechargeable sensor network,an energy replenishment strategy and a data collection strategy are designed.On the basis of these,a path planning model for WCE with functions of joint energy replenishment and data collection based on multi-objective optimization is constructed with two optimization objectives,maximizing the total energy utility of WCE and minimizing the average delay of data transmission of all the sensor nodes in the network.To deal with it,a multi-objective ant colony optimization algorithm based on elitist strategy was proposed,where the state transition strategy and the pheromone updating strategy were improved.Then,the Pareto set was obtained in terms of this multi-objective optimization problem.The parameter setting of ant colony algorithm’s effects on the proposed algorithm were analyzed under 20 sensor nodes.50 groups of contrastive experiments show that the average number of energy utilization obtained by ES-MOAC algorithm is 4.53% higher than that of NSGA-II algorithm.The average number of average delay of all node data transmission obtained by ES-MOAC algorithm is 5.12% lower than that of NSGA-II algorithm.…”
Get full text
Article -
9368
Interactive recommendation of social network communication between cities based on GNN and user preferences
Published 2025-04-01“…The method effectively solves the problem of cross-city users’ interest point preference change and constructs a recommendation framework based on interest point heat. …”
Get full text
Article -
9369
Detection method for underwater acoustic communication signals based on adaptive morphological filtering and Hough transform
Published 2025-07-01“…Based on the local density of pixel neighborhoods in time-frequency maps, AMF was constructed, which could dynamically adjust the scale factor of structural element to highlight signal detailed SC. …”
Get full text
Article -
9370
Data poisoning attack detection approach for quality of service aware cloud API recommender system
Published 2023-08-01“…To solve the problem that existing studies usually assumed that the QoS data of cloud API recommender system was reliable, ignoring the data poisoning attack on cloud API recommender system by malicious users in open network environment, a data poisoning attack detection approach based on multi-feature fusion was proposed.Firstly, a user connected network graph was constructed based on the designed similarity function, and users’ neighborhood features were captured using Node2vec.Secondly, sparse auto-encoder was used to mine user QoS deep feature, and user interpretation feature based on QoS data weighted average deviation was designed.Furthermore, a fake user detection model based on support vector machine was established by integrating user neighborhood feature, QoS deep feature, and interpretation feature, the model parameters were learned using grid search and alternating iterative optimization strategy to complete fake user detection.Finally, the effectiveness and superiority of the proposed approach were verified through extensive experiments, realizing the poison attack defense against QoS aware cloud API recommender system at the data side.…”
Get full text
Article -
9371
Simulation Analysis of Rainstorm Waterlogging in Shenzhen Dakonggang Area Based on MIKE FLOOD
Published 2024-05-01“…Based on the MIKE FLOOD platform,this paper constructs a rainstorm waterlogging model by coupling the three models of MIKE 11,MIKE URBAN,and MIKE 21 to analyze the waterlogging problem in the Shenzhen Dakonggang area. …”
Get full text
Article -
9372
Stable Cycles and Tori of a System of Three and Four Diffusive Coupled Oscillators
Published 2016-12-01“…For this case on a stable integral manifold of the system a normal form is constructed for which, in case of three oscillators interact, we can study the simplest stationary states and their phase transformations. …”
Get full text
Article -
9373
Suppression of polarization random noise in a two-dimensional force sensorbased on random forest
Published 2025-01-01“…The polarization random noise signal model is constructed, the polarization random noise signal is enhanced and the polarization random noise power spectrum of a two-dimensional force sensor is calculated. …”
Get full text
Article -
9374
Thermal Characteristics Testing and Analysis of Dry Gear Hobbing Machine on Multivariate Information Fusion
Published 2024-01-01“…Aiming at the problem of thermal characteristics of dry-cutting hobbing machine, research on multi-source information fusion test and analysis is carried out. …”
Get full text
Article -
9375
Abnormal Diagnosis Method of Self-Powered Power Supply System Based on Improved GWO-SVM
Published 2023-01-01“…In order to solve the problem of low abnormal diagnosis rate of self-powered power supply system, an improved grey wolf optimization-support vector machine (GWO-SVM) algorithm combined with maximal information coefficient (MIC) are proposed. …”
Get full text
Article -
9376
On the Detection of Exploitation of Vulnerabilities Leading to the Execution of a Malicious Code
Published 2020-06-01“…In the latter case, this problem is usually solved by forming a profile of a normal behavior and deviation from normal behavior over a predetermined threshold is regarded as an anomaly or an attack. …”
Get full text
Article -
9377
A computational model for bacteriophage ϕX174 gene expression.
Published 2024-01-01“…However, several aspects of ϕX174 gene regulation are not fully resolved. Here we construct a computational model for ϕX174 and use the model to study gene regulation during the phage infection cycle. …”
Get full text
Article -
9378
THE CORRELATION OF THE MEDIEVAL EUROPEAN STATE AND LAW IN THE DOCTRINE OF P.A. KROPOTKIN
Published 2025-03-01“…The actual task of Russian state studies and jurisprudence remains the opposition to the ideological and theoretical constructions of Russian classical anarchism. Purpose: to establish the most significant features and disadvantages of P.A. …”
Get full text
Article -
9379
Système de parenté et acteur : quelles médiations ?
Published 2018-06-01“…Its characteristics are discussed by asking the problem of contextualization and periodization. Two ways of research have been already taken in account. …”
Get full text
Article -
9380
The Role of Value Judgment in Congruent Personalities, Trait Authenticity, and Authentic Leadership
Published 2019-06-01“…Value judgment was measured by two profiles of the Hartman Value Profile (HVP), a judgment profiling instrument delineating the thinking, evaluation, problem-solving patterns, and orientation in 52 indices in personal (HVPII) and social domains (HVPI). …”
Get full text
Article