Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 22 papers published in subject: > since this site started. |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Privacy Preserving on Recommender System by Leveraging Attribute-Based Encryption Technique | |||
LI Ye,ZHANG Hua | |||
Computer Science and Technology 29 November 2017 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Recommender Systems aim to predict the rating or preference of a user given to an item and provide suggestions of further resources that are likely to be of interest. However, a lot of information about users need to be acquired for better recommendation result. Those information will leak users\' own privacy, which lead to lose the users\' trust of recommender systems. In recent years, more and more study focused on the various kinds of privacy protection techniques. Our paper proposes a novel method of the privacy preserving on recommender system for the first time. Employ Attribute-Based Encryption technique to protect users\' privacy. Based on the scheme, our paper builds up a recommender system that allows users\' information collection can be controlled by themselves, and those information will be encrypted before sending to the recommendation server so that user\'s privacy can be safeguarded from attacker\'s tracing even if the communication channel is not secure.. Besides, our paper adjusts ABE algorithms to make this technique suitable and efficient for recommender systems. Furthermore, our paper presents the security analysis for our scheme. | |||
TO cite this article:LI Ye,ZHANG Hua. Privacy Preserving on Recommender System by Leveraging Attribute-Based Encryption Technique[OL].[29 November 2017] http://en.paper.edu.cn/en_releasepaper/content/4742030 |
2. A Quantitative Approach: The Detection and Annoyance Ability of Multidimensional Stimuli in Peripheral Vision | |||
CHEN Diandi,LI Xia | |||
Computer Science and Technology 06 September 2017 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper outlines an approach to quantify the relatively best combination of detection and annoyance performance of users when visual notification information is performed away from the foveal region and cognized by peripheral vision. Key to provide both subjective and objective suggestion on the process of creating an effectively and humanely ambient-interactive system, by calculating the capabilities of different dynamic stimuli to attract attention efficiently and minimise unwanted distraction and annoyance on users. The experiment involved multidimensional stimuli that comprised original size, original colour, change type of size, change type of colour, and trial time, were conducted to determine how detectable and annoying these were in attracting users\' attention in peripheral vision. The results showed that there were four extremely significant effects for detection time: original size, change type of size, change type of colour, and trial time. By contrast, there were four significant main effects for annoyance: original size, original colour, change type of size, and trial time. Especially, original size, original colour, and change type of size effects were extremely significant than trial time effect. In addition to these, we described the quantitative relationships of the stimuli effects to detection and annoyance based on the results, which acted as the vital part of the evaluative approach. | |||
TO cite this article:CHEN Diandi,LI Xia. A Quantitative Approach: The Detection and Annoyance Ability of Multidimensional Stimuli in Peripheral Vision[OL].[ 6 September 2017] http://en.paper.edu.cn/en_releasepaper/content/4741380 |
3. Automatic Schizophrenia Discrimination on fNIRS by Using General Linear Model and SVM | |||
CHEN Lei,SONG Hong,GAO Ruiqi | |||
Computer Science and Technology 17 May 2017 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Schizophrenia is a kind of serious mental illness. Due to the lack of an objective physiological data supporting and a unified data analysis method, doctors can only rely on the subjective experience of the data to distinguish normal people and patients, which easily lead to misdiagnosis. In recent years, functional Near-Infrared Spectroscopy (fNIRS) has been widely used in clinical diagnosis, it can get the hemoglobin concentration through the variation of optical intensity. In this paper, a method is proposed to distinguish patients with schizophrenia based on data measured by fNIRS during a cognitive task. Firstly, general linear model (GLM) was used to extract features based on oxy-Hb signals from 52-channel fNIRS data of schizophrenia and healthy controls. Then, a classier based on Support Vector Machine (SVM) is designed and trained to discriminate schizophrenia from healthy controls. We recruited a sample which contains 34 healthy controls and 42 schizophrenic patients to do the one-back memory task. The hemoglobin response was measured in the prefrontal cortex during the task using a 52-channel fNIRS system.The experimental results indicate that the proposed method can achieve a satisfactory classification with the accuracy of 85.15%, 100% for healthy controls and 78.58% for schizophrenic samples. Also, our results suggested that fNIRS has the potential capacity to be an effective objective biomarker for the diagnosis of schizophrenia. | |||
TO cite this article:CHEN Lei,SONG Hong,GAO Ruiqi. Automatic Schizophrenia Discrimination on fNIRS by Using General Linear Model and SVM[OL].[17 May 2017] http://en.paper.edu.cn/en_releasepaper/content/4734551 |
4. Characterization of Effective Connectivity in Physiology-based Model via Modified Dynamic Causal Model | |||
XIANG Wentao,YANG Chunfeng,WU Jiasong,SHU Huazhong,LE BOUQUIN JEANNES Régine | |||
Computer Science and Technology 23 November 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:This paper proposes a new strategy named Modified Dynamic Causal Modelling (MDCM) to detect effective connectivity in an underlying physiology based model aimed at simulating epileptic activities in the hippocampus. The MDCM consists of three parts considering a state-space environment. First of all, an analytical form of the power spectral densities (PSD) as a function of the model parameters is obtained by calculating the transition matrix of the state-space linearized model. Secondly, the PSD are measured from the observed intracerebral electroencephalographic (iEEG) signals, and then the model parameters are estimated by an Expectation Maximum (EM) algorithm. Thirdly, a new estimation of the parameters is obtained using an iterative algorithm and another estimation of the PSD is derived, the most plausible model being finally selected among a set of candidate models. Simulated experimental results indicate that the proposed MDCM outperforms DCM in scenarios of unidirectional flow propagation. | |||
TO cite this article:XIANG Wentao,YANG Chunfeng,WU Jiasong, et al. Characterization of Effective Connectivity in Physiology-based Model via Modified Dynamic Causal Model[OL].[23 November 2015] http://en.paper.edu.cn/en_releasepaper/content/4663295 |
5. Threshold proxy re-encryption | |||
ZHOU De-Hua, CHEN Ke-fei, ZHENG Dong | |||
Computer Science and Technology 11 March 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In a Proxy Encryption(PRE) scheme, a semi-trusted proxy, converts a ciphertext for Alice(delegator) intoa ciphertext for Bob(delegatee) without knowing the underlyingplaintext. PRE can used for applications requiring delegation,such as delegated distributed file systems, outsourced filtering of encrypted spam, and encrypted email forwarding, etc. However, when the semi-trusted proxy was corrupt and colluded the delegatee, the ciphertext can be decrypted. In some scenarios requirethe delegator further control the proxy re-encryption. For example, whereby only extit{k} proxy serverssatisfying the threshold value set by delegator can be transformed and combined, then can be decrypted by delegatee, we introduce the notion of Threshold Proxy Re-Encryption (or TPRE), We further proposed a concrete TPRE scheme, and prove its security in the random oraclemodel. | |||
TO cite this article:ZHOU De-Hua, CHEN Ke-fei, ZHENG Dong. Threshold proxy re-encryption[OL].[11 March 2014] http://en.paper.edu.cn/en_releasepaper/content/4587585 |
6. Simple method to find primitive polynomials of degree $n$ over $GF(2)$ where $2^{n}-1$ is a Mersenne prime | |||
WANG Jiantao, Dong Zheng | |||
Computer Science and Technology 25 February 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A novel view on the group structure of cyclotomic cosets modula $2^n-1$ is described. The structure is cyclic when $2^{n}-1$ is a prime. The integers modula $2^n-1$ can be regarded as the exponents of a primitive element $lphain GF(p^n)$ with minimal polynomial $f(x)$. The traces of $lpha^i$ can be computed by the Newton Formula from $f(x)$, and show a same structure as the cyclic group of the cyclotomic cosets. We show then by the permutation of the traces of $lpha^i$ all the primitive polynomials can be calculated fast. | |||
TO cite this article:WANG Jiantao, Dong Zheng. Simple method to find primitive polynomials of degree $n$ over $GF(2)$ where $2^{n}-1$ is a Mersenne prime[OL].[25 February 2014] http://en.paper.edu.cn/en_releasepaper/content/4587059 |
7. A New sight on Finite Field Trace and Its Application on Minimal Polynomial Computation | |||
WANG Jiantao, Dong Zheng | |||
Computer Science and Technology 25 February 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:A novel method is described for computing the trace of an element from a given finite field $GF(p^n)$. This method shows a simplex and linear structure of different elements' traces by applying the Newton Formula, and the usual procedure of computing the products and sums of elements of $GF(p^n)$ is not required. The structure of the minimal polynomial of an element from $GF(p^n)$ is also studied. Combining the structure with the trace computation, we derive a new fast way for computing the minimal polynomial of an element from $GF(p^n)$. | |||
TO cite this article:WANG Jiantao, Dong Zheng. A New sight on Finite Field Trace and Its Application on Minimal Polynomial Computation[OL].[25 February 2014] http://en.paper.edu.cn/en_releasepaper/content/4587019 |
8. A Review of Energy Efficiency Technology in Computer Servers and Cluster Systems | |||
WANG Jun,FENG ling,XUE Wenwei | |||
Computer Science and Technology 05 January 2011 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Energy efficient computing has become a critical concern in the IT industry. For both hardware manufacturers and software developers, energy management work spans all levels from chips, operating systems, servers, to applications. In this paper, we overview energy-saving techniques developed at hardware, system software, and application levels, with an emphasis on energy-efficient computer servers and cluster systems. | |||
TO cite this article:WANG Jun,FENG ling,XUE Wenwei. A Review of Energy Efficiency Technology in Computer Servers and Cluster Systems[OL].[ 5 January 2011] http://en.paper.edu.cn/en_releasepaper/content/4404104 |
9. On the Design of Trivium | |||
Tian Yun | |||
Computer Science and Technology 08 September 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:eSTREAM called for new stream ciphers designed for niche areas such as exceptional performance in software and hardware where resources are restricted. This project provides an open platform to discuss these ciphers. Trivium is one of the promising new ciphers submitted to it. Until now, no attack has been successfully applied to it. This paper illustrates new design principles of stream ciphers based on the structure of Trivium and introduces the definition of k-order primitive polynomials. New designs of Trivium are also given according to the principles in this paper. | |||
TO cite this article:Tian Yun. On the Design of Trivium[OL].[ 8 September 2009] http://en.paper.edu.cn/en_releasepaper/content/35025 |
10. A mechanical model of the problem solving process | |||
Xia Chengjiao,Chen Jian,Ding Chenglin,Yu Jiang tao | |||
Computer Science and Technology 14 August 2009 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Machining is a very practical problem. In order to obtain higher profits and occupy a bigger market,it is necessary not only to produce products to meet the needs of the community, but also to have a rational allocation of resources and other production equipment, and try to improve production efficiency. Taking into account this problem that the increasement of prices will certainly cause the drop in sales, we fully understand the research resultsthe in this issue of economics,and introduct the concept of elasticity of the establishment of a price increase and the final function of the relationship between profits through Solving MATLAB2 a role in the overall profit growth of the product and determine the most out of this one of the most appropriate growth rate. | |||
TO cite this article:Xia Chengjiao,Chen Jian,Ding Chenglin, et al. A mechanical model of the problem solving process[OL].[14 August 2009] http://en.paper.edu.cn/en_releasepaper/content/34477 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated