-
Article
Predicting examinee performance based on a fuzzy cloud cognitive diagnosis framework in e-learning environment
The score profiles could be used to measure learners’ skills proficiency via cognitive diagnosis models (CDMs) for predicting their performance in the future examination. The prediction results could provide i...
-
Chapter and Conference Paper
Measurement-Device-Independent Quantum Identity Authentication Based on Single Photon
To overcome the channel attacks of the detector side, a measurement-device-independent quantum identity authentication based on single photon is proposed. The participants authenticate the identity of each oth...
-
Chapter and Conference Paper
A Short Flows Fast Transmission Algorithm Based on MPTCP Congestion Control
With the development of cloud computing and big data technology, traffic in the network presents new features. Real-time online interactive applications are increasing, mainly including web services, instant m...
-
Chapter and Conference Paper
Research on Educational Data Mining Based on Big Data
Educational data mining (EDM) is a cross-disciplinary technology involving computer science, education, statistics, etc. It analyzes and mines education-related data to discover and solve various types of educ...
-
Chapter and Conference Paper
Research on DINA Model in Online Education
Learning tests play an important role in both traditional learning and online learning. The traditional education test can only report students’ scores or abilities, but not their knowledge level, which is no ...
-
Article
A Quantum Blind Signature Scheme Based on Block Encryption and Quantum Fourier Transfer
Motivated by the block encryption and quantum Fourier transfer, a quantum blind signature scheme is proposed. Alice encodes the original message into three pairs of hybrid entangled states, which are distribut...
-
Article
An Arbitrated Proxy Blind Signature Based on Hyper Entanglement Analysis
Motivated by the hyperentangled Bell states analysis, an arbitrated quantum proxy blind signature (QPBS) scheme is developed. Four participants accomplish the task of signing and verifying via exchanging the e...
-
Article
A high capacity quantum weak blind signature based on logistic chaotic maps
Motivated by the teleportation of hyper-entangled states, a high capacity quantum weak blind signature (QWBS) scheme is developed via logistic chaotic maps. Three participants jointly accomplish the task in tw...
-
Chapter and Conference Paper
Blocking Time-Based MPTCP Scheduler for Heterogeneous Networks
In order to solve the problem of buffer congestion caused by multipath transmission, we present Blocking Time-based MPTCP (MPTCP-BT) in heterogeneous network. The proposed algorithm designs a new metric path b...
-
Chapter and Conference Paper
Pavement Crack Segmentation Algorithm Based on Local Optimal Threshold of Cracks Density Distribution
Asphalt pavement distress is very important for road maintenance and rehabilitation decisions. The traditional manual pavement crack detection by human eyes is expensive, labor intensive, time consuming, and s...
-
Chapter and Conference Paper
Network Security Situation Assessment Based on Stochastic Game Model
From the perspective of game theory, this paper studies the information security problem, establishes an offense and defense game model of information security, and puts forward a quantitative evaluation algor...
-
Chapter and Conference Paper
Fast Algorithm for Multisource Image Registration Based on Geometric Feature of Corners
Due to the different imaging characteristics of sensor, there are big differences of multisource images in gray and trend of gray gradient. And the existing algorithms of image registration were time-consuming...
-
Chapter and Conference Paper
A SWP Specification for Sequential Image Processing Algorithms
To retarget sequential image processing algorithm written in sequential languages (e.g. C) to processors with multimedia extensions and multimedia-specific embedded microprocessors is an open issue. Image proc...