Learn More
Privacy-preserving data mining is discovering accurate patterns and rules without precise access to the original data. This paper focuses on privacy-preserving research in the situation of distributed decision-tree mining, and presents a decision-tree mining algorithm based on homomorphic encryption technology, which can get accurate mining effect in the(More)
Aging population inspired the market on advanced real time caring for the elder in home setting, accurately recognizing human activities is a challenging task. Activities of daily living are good indicators for behavior recognition. In this paper, we describe a new method to deploy a cost-effective solution which can be run on embedded device as smart(More)
This study was conducted to investigate the effect of zinc-bearing zeolite clinoptilolite (Zn-ZCP) on performance, growth performance, nutrient retention, digestive enzyme activities, and intestinal function in broiler chickens. A total of 180 1-day-old Arbor Acres chickens were randomly divided into three groups with six replicates of ten birds for a(More)
Trusted computing has become a new and challenging research issue in the field of information security. To further enhance the safety of BIOS, we construct a trusted computing platform based on Extensible Firmware Interface (EFI), the trust chain is transferred from the first stage of EFI to the operating system by applying TPM (Trusted Platform Module) and(More)
  • 1