Lianzhong Liu

Learn More
Analyzed here is the physical interpretation of objective function of semi-supervised fuzzy C-means (SS-FCM) algorithm and its coefficient alpha. A conclusion-Stutzpsilas modification to the objective function of Pedrycz is much clearer: unlabeled samples involves in unsupervised learning of FCM, labeled samples involves in unsupervised learning with(More)
Database encryption, as a mechanism for active security enhancement, is a crucial technique to protect data confidentiality. Two important objectives of designing an encrypted database are high security and performance. In this paper, a new paradigm for database encryption is proposed in which database encryption can be provided as a service to applications(More)
This randomized, parallel-group, open study investigated the efficacy and safety of risperidone oral solution (RIS-OS) in combination with clonazepam and intramuscular haloperidol for the treatment of acute agitation in patients with schizophrenia, and the study explored the possibility of decreasing the efficacy of an acute 6-week treatment by switching(More)
Recognition of contact states is often necessary or preferred in planning and executing contact-based assembly motions in the presence of uncertainties. However , due to inevitable uncertainties, not all contact states can be identiied at all contact conngurations. A crucial question is what kinds of contact states at what kinds of conngurations are(More)
The encryption mechanism is an effective way to protect the sensitive data in database from various attacks. When the data is encrypted, the query performance degrades greatly. How to query encrypted data efficiently becomes a challenge. In this paper, a scheme to support query over encrypted data is proposed. Firstly, we extend two-phase framework to(More)
It is important to construct more efficient index used for query over encrypted character strings in database. A few of approaches to deal with such issues have been worked out. In this paper, an bloom filter based index to support fuzzy query over encrypted character data is proposed on the principle of two-phase query. Firstly a triple is used to express(More)
Database auditing can help strengthen the security of database. In this paper, we present a framework of database auditing, which log the database activities through analyzing network traffic, execute audit analysis through event correlation and generate alarms if an anomaly or a violation of security regulations is detected. Compared with native auditing(More)
Dependency between business and resources that ensure the normal function of the business has increased dramatically in size and complexity. As communication network becomes larger and more complex, the need for advanced correlation between audit alarm and business is becoming urgent. This paper proposes a framework for business-oriented security audit,(More)
This paper concerns the new development in multi-agent based enterprise software engineering practices, systematically discusses the main issues and approaches towards successful enforcement of complex agent-oriented software engineering, related to multi-agent system (MAS) organization structure design, ontology based domain knowledge representation and(More)