期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
A Trust Evaluation Mechanism Based on Autoencoder Clustering Algorithm for Edge Device Access of IoT
1
作者 Xiao Feng Zheng Yuan 《Computers, Materials & Continua》 SCIE EI 2024年第2期1881-1895,共15页
First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism... First,we propose a cross-domain authentication architecture based on trust evaluation mechanism,including registration,certificate issuance,and cross-domain authentication processes.A direct trust evaluation mechanism based on the time decay factor is proposed,taking into account the influence of historical interaction records.We weight the time attenuation factor to each historical interaction record for updating and got the new historical record data.We refer to the beta distribution to enhance the flexibility and adaptability of the direct trust assessment model to better capture time trends in the historical record.Then we propose an autoencoder-based trust clustering algorithm.We perform feature extraction based on autoencoders.Kullback leibler(KL)divergence is used to calculate the reconstruction error.When constructing a convolutional autoencoder,we introduce convolutional neural networks to improve training efficiency and introduce sparse constraints into the hidden layer of the autoencoder.The sparse penalty term in the loss function measures the difference through the KL divergence.Trust clustering is performed based on the density based spatial clustering of applications with noise(DBSCAN)clustering algorithm.During the clustering process,edge nodes have a variety of trustworthy attribute characteristics.We assign different attribute weights according to the relative importance of each attribute in the clustering process,and a larger weight means that the attribute occupies a greater weight in the calculation of distance.Finally,we introduced adaptive weights to calculate comprehensive trust evaluation.Simulation experiments prove that our trust evaluation mechanism has excellent reliability and accuracy. 展开更多
关键词 Cross-domain authentication trust evaluation autoencoder
下载PDF
ssues of Human Beings Trafficking in Albania
2
作者 Jashar Vreka 《Sociology Study》 2017年第1期56-64,共9页
The theme of trafficking of human beings treats one of the most severe and dangerous criminal phenomena of the organized crime in Albania. The objects of this paper are: human trafficking; ways of trafficking; risk o... The theme of trafficking of human beings treats one of the most severe and dangerous criminal phenomena of the organized crime in Albania. The objects of this paper are: human trafficking; ways of trafficking; risk of Albanian society; and investment of the criminal benefits deriving from trafficking in legal economic activities, it is of great importance for the treatment of proactive investigations to the trafficking of human beings. Another important aspect of the trafficking investigations is the investigation of criminal assets and the way how they are used in the economy of the country. In this paper, we stress that the investigation of criminal assets benefited by the crime of trafficking human beings as well as other wealth financed by these assets is important as the investigation of the criminal activity of trafficking itself. Also, we aim to evaluate the necessity of acting of all law enforcement agencies and other state institutions in order to be successful in the fight against the crime of trafficking of human beings. At the end of this paper, we do treat the necessity and the ways of collaboration of law enforcement agencies, NGOs, and structures of local government for rehabilitation of the victims of trafficking and their integration in the social life. 展开更多
关键词 TRAFFICKING human beings organized crime proactive investigations criminal assets
下载PDF
Autocorrelation of two Legendre-Sidelnikov sequences 被引量:1
3
作者 XIE Jia GAO Jun-tao +1 位作者 YUE Zhao LI Xue-lian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第5期83-88,93,共7页
Sequences with nice pseudo-randomness play an important role in not only communication system but also cryptography system. Based on the Legendre-Sidelnikov sequence, a modified Legendre-Sidelnikov sequence was introd... Sequences with nice pseudo-randomness play an important role in not only communication system but also cryptography system. Based on the Legendre-Sidelnikov sequence, a modified Legendre-Sidelnikov sequence was introduced. The exact value of the autocorrelation function was derived by strict computation. According to the values of the autocorrelation functions of the two Legendre-Sidelnikov sequences, it is proven that both of them have perfect pseudo-randomness. Furthermore, a detailed comparison between autocorrelation functions of the two Legendre-Sidelnikov sequences was deduced. It indicates that no matter which parameters are chosen, the modified sequence has pseudo-randomness as good as the primitive sequence, which is of great significance for applications. 展开更多
关键词 AUTOCORRELATION PSEUDO-RANDOMNESS binary sequence quadratic character Legendre-Sidelnikov sequence two-prime generator
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部