The form recognition algorithms in existence are inefficient, and only can abide tiny broken lines. This paper presents an algorithm based on vertex chain code for form cell rectangle recognition, the algorithm uses region-labeling robot to label the inner border of a form cell to get its vertex chain code, using the characters of the vertex chain code, the algorithm can remove the sawteeth on the form frame line efficiently and restore the form frame lines and get the region of the form cell by searching the vertex chain code of the four angles of the cell. Experiments prove that the algorithm has the advantages of high speed, high robustness and being able to resist broken form frame lines.
There has been growing interests in private concerns for future data mining research. Privacy preserving data mining concentrates on developing accurate models without sharing precise individual data records. This paper addresses basic ideas and solutions for secure data mining over distributed data. An algorithm based on dot product for distributed mining association rules is presented. It also gives a protocol of secure dot product computation which is effective to discover frequent itemsets on vertically partitioned data. It can provide good data privacy.
The traffic volume of BitTorrent is becoming larger and larger with the wide application of BT software in the networks. It is necessary to model and analyze BT traffic, and to evaluate the files of BT system. A downloader model, a seed model, and a file evaluation method of BT system are proposed in this paper. Some BT sharing data are analyzed using the models and the file evaluation method.
A new intrusion detection scheme based on the combination of the order and frequency characters of system calls (COFIDS) is proposed. This paper applies a text category algorithm (k-Nearest Neighbor Classifier, kNN) to the proposed intrusion detection scheme. In order to improve the intrusion detection rate, a similarity enhancement factor (SEF) is also presented. The preliminary experimental results demonstrate that the proposed COFIDS can provide obvious improvement in intrusion detection ability. The experiments with COFIDS also show that the proposed scheme has higher ability against to noise in the training data and to intrusion detection false positive rate.
Based on the classical MPLS technology and the characteristic of mobile satellite networks, a MPLS-based mobile satellite system top design, which includes networking concept, protocol stack and system functional blocks, is proposed. At last, the key problem that must be faced in MPLS-based mobile satellite communication networks is analyzed and some resolutions are given.