This paper focuses on the image composition of transparent objects, where existing image matting methods suffer from composition errors due to the lack of accurate foreground during the composition process. We propose...
详细信息
Given an array A[1 : n] of n elements drawn from an ordered set, the sorted range selection problem is to build a data structure that can be used to answer following queries: Given a pair of indices i, ...
详细信息
The Semantic Web has improved ontological representations, information retrieval, logic, and trust. Due to the lack of a hybrid crowdsourced co-inventive design workspace in Malaysia, this study has aimed to investiga...
详细信息
Mobile Edge Networks (MENs) are wireless networks that establish "close-to-end-users-clouds" to provide storage, computation, and communication services. MENs employ the Extended Triple Diffie–Hellman (X3DH...
详细信息
Mobile Edge Networks (MENs) are wireless networks that establish "close-to-end-users-clouds" to provide storage, computation, and communication services. MENs employ the Extended Triple Diffie–Hellman (X3DH) protocol to establish secret keys that provide end-to-end encryption among their nodes. X3DH relies on a cloud server that stores the public keys of the nodes to address the asynchronous scenarios when they operate offline. The cloud server in X3DH protocol represents a single point of failure (SPoF), as the exchange of secure keys is disrupted if the server fails or is compromised. Moreover, a malicious attacker, Eve, can launch various DoS attacks against the MEN nodes (e.g., packet dropping or packet modification) and wireless links (e.g., jamming) to disrupt the execution of X3DH during secure key exchange. This paper proposes the DoS-Resistant-X3DH (DR3DH) protocol to resolve the SPoF of the cloud server in X3DH and to address packet dropping, packet modification, and jamming DoS attacks. DR3DH employs Reed–Solomon Erasure Coding to encode the X3DH public keys into fragments that are distributed into a set of storage nodes. These storage nodes, which are determined by an Integer Linear Programming (ILP) solver, are optimum. That is, they have lowest probabilities to launch packet dropping/modification attacks and lowest probabilities that the wireless links toward them are jammed. The authors evaluated DR3DH through trace-driven simulations in MATLAB using two mobility traces and a proof-of-concept implementation in Java. The authors also compared DR3DH with two approaches that employ Random and Greedy policies when selecting the storage nodes for keys fragments. The results demonstrate the resistance of DR3DH to DoS attacks, achieving a high success rate that outperforms the Random and Greedy approaches by between 13.6% and 83.0%. Additionally, the results confirm the feasibility of DR3DH under different mobility models and node speeds, as demonstrated by
This paper discusses a design method of digital frequency transmission system based on SOPC design thought and DSP Builder tool, simulates the waveform with Simulink, converts 2FSK model to VHDL files, and uses embedd...
详细信息
Trust models like Beth, Jøsang and EigenRep evaluated trust degree by the history of interactions or the reputations, and some other learners brought fuzzy theory, cloud model into the researches of trust managem...
详细信息
The pursuit–evasion problem in multi-robot systems (MRS) has raised much attention in the last two decades. However, most of them are focused on single-target pursuit problem and the cooperative mechanism is adopted....
详细信息
A designated verifier signature (DVS) scheme has the property that only the designated verifier specified by the signer can check the validity of the signature instead of anyone else. Meanwhile, the designated verifie...
详细信息
A modeling method of motion-function is presented to represent the motion in detection of video images within the physical and motional characters of body. It concentrates on the characters of video surveillance, with...
详细信息
ISBN:
(纸本)9780769535210
A modeling method of motion-function is presented to represent the motion in detection of video images within the physical and motional characters of body. It concentrates on the characters of video surveillance, with the examples of walking videos, and results in walking functions by extracting and dealing with the data from the experiments. On this basis, more experiments are required to validate all coefficients in functions, and induce final expressions of gait function and modeling.
In this paper, we describe the main courses of object-oriented software engineering, analyze the necessity of bilingual teaching and explain in detail the teaching plan and strategy of object-oriented software enginee...
详细信息
ISBN:
(纸本)9780769535210
In this paper, we describe the main courses of object-oriented software engineering, analyze the necessity of bilingual teaching and explain in detail the teaching plan and strategy of object-oriented software engineering. Finally, we, summarize the advantages and disadvantages of this bilingual teaching course. We conclude that practice has proved the worth of bilingual teaching in object-oriented software engineering.
暂无评论