论文部分内容阅读
User abnormal behavior analysis based on neural network clustering
【机 构】
:
College of Information Engineering, Henan University of Science and Technology, Luoyang 471000, Chin
【出 处】
:
中国邮电高校学报(英文版)
【发表日期】
:
2016年3期
其他文献
New key pre-distribution scheme using symplectic geometry over finite fields for wireless sensor net
To achieve secure communication in wireless sensor networks (WSNs),where sensor nodes with limited computation capability are randomly scattered over a hostile territory,various key pre-distribution schemes (KPSs) have been proposed.In this paper,a new KP
Some emerging services such as augmented/virtual reality need high data rates.Whereas,the existing 2nd generation(2G),the 3rd generation (3G) and the 4th generation (4G) networks cannot provide such high transmission rates.To meet these requirements,the t
Ciphertext-policy attribute-based searchable encryption (CP-ABSE) can achieve fine-grained access control for data sharing and retrieval,and secure deduplication can save storage space by eliminating duplicate copies.However,there are seldom schemes suppo
Access control scheme is proposed for System Wide Information Management (SWIM) to address the problem of attribute revocation in practical applications.Based on the attribute based encryption (ABE),this scheme introduces the proxy re-encryption mechanism
Modeling and realization of mobile-to-mobile wideband MIMO channels based on the geometrical multi-r
A geometry-based stochastic scattering model (GBSSM) based on geometrical multiple rings and ellipses is proposed for wideband multiple-input multiple-output (MIMO) mobile-to-mobile (M2M) fading channels.The proposed GBSSM is deployed with cross-polarized
Effect of non-spherical atmospheric charged particles and atmospheric visibility on performance of s
In order to study the relationship between the non-spherical atmospheric charged particles and satellite-ground quantum links attenuation.The relationship among the particle concentration,equivalent radius,charge density of the charged particle,the attenu
To extract and express the knowledge hidden in information systems,discernibility matrix and its extensions were introduced and applied successfully in many real life applications.Binary discemibility matrix,as a representative approach,has many interesti
Currently,the photovoltaic (PV) cloud network is an important research point in energy Internet.From the perspective of the robustness analysis of PV cloud network,traditional robustness index,the relative size of the giant connected component before and
Area-efficient design methodology is proposed for the analog decoding implementations of the rate-1/2 accumulate repeat-4 jagged-accumulate (AR4JA) low density parity check (LDPC) code.The proposed approach is designed using optimized decoding architectur