Regenerating code is a fault-tolerant technique based on the network ***,most of the researchers just focus on the construction of the codes,ignoring the security of the codes in application,especially the security in...
详细信息
ISBN:
(纸本)9781467349970
Regenerating code is a fault-tolerant technique based on the network ***,most of the researchers just focus on the construction of the codes,ignoring the security of the codes in application,especially the security in an extremely open environment such as cloud computing and cloud storage.A secure regenerating code,called SRCS is proposed in this paper to solve the fault-tolerant of distributed networked *** achieves the security of the regenerating code using the threshold public-key encryption with low redundancy and high *** the storage system based on the SRCS,the data owner shares his private key to a set of key servers and uses the storage servers to stores the *** if the attacker compromises all storage servers,he can't get the *** shows that SRCS is secure in the semi-adaptive model using decisional BDHE assumption.
The derivation of the Lagrangian for different configurations of spherical robots is explored through the use of the Euler Lagrange equations and additional constrains for the generalized velocities. The degrees of fr...
详细信息
ISBN:
(纸本)9781479914609
The derivation of the Lagrangian for different configurations of spherical robots is explored through the use of the Euler Lagrange equations and additional constrains for the generalized velocities. The degrees of freedom are specified with rotation matrices and linear displacement vectors, allowing to determine the necessary elements for all the models in a procedural way, and to obtain the dynamics of the system. One of the thus obtained models is used for simple velocity control tests with two approaches, using the torque and velocity of the rotatory actuators as control inputs, with successful results for a simplified system with one degree of freedom, and satisfactory results for the general system.
A novel tamed spread spectrum communication system with long PN (Pseudo Random) code is proposed and its receiver FPGA (Field Programmable Gate Array) implementation method is also designed. Meanwhile, the performance...
详细信息
The world faces an energy problem. Oil supply is gradually running out. Its use is polluting the planet with greenhouse gas. Most alternative energy sources also pose some environmental problems. Hence the efficient u...
详细信息
Centimeter scale mobile biobots offer unique advantages in uncertain environments. Our previous experimentation has demonstrated neural stimulation techniques in order to control the motion of Madagascar hissing cockr...
详细信息
ISBN:
(纸本)9781457702167
Centimeter scale mobile biobots offer unique advantages in uncertain environments. Our previous experimentation has demonstrated neural stimulation techniques in order to control the motion of Madagascar hissing cockroaches. These trials relied on stimulation by a human operator using a remote control. We have developed a Kinect-based system for computer operated automatic control of cockroaches. Using image processing techniques and a radio transmitter, this platform both detects the position of the roach biobot and sends stimulation commands to an implanted microcontroller-based receiver. The work presented here enables repeatable experimentation and allows precise quantification of the line following capabilities of the roach biobot. This system will help refine our model for the stimulation response of the insect and improve our ability to direct them in increasingly dynamic situations.
The transmission rate of visible light communications(VLC) remains low as the low modulation bandwidth performance of light emitting diode(LED). This paper proposes a transmission system consisting of multiple LEDs an...
详细信息
The transmission rate of visible light communications(VLC) remains low as the low modulation bandwidth performance of light emitting diode(LED). This paper proposes a transmission system consisting of multiple LEDs and a photodiode(PD) toincrease the transmission rate. We combines the radiosuperposition coded modulation(SCM), interleave division multiple access(IDMA) technology with VLC. Tofit the driving voltage non-negative characteristics of LED and detect the mixed multi-LED lightintensity signals, the VLC multi-LED parallel transmission based on OOK modulation scheme is proposed, which has about K(K is the number LED wicks) times the transmission rate of the traditional ways. Finally, we analyze the number of iterations, the different specific interleaver and the driving voltages that are the factors influence the transmission performance. The simulation alsoverifies the high speed transmission capability and the anti-nonlinearity performance of the proposed scheme.
Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodolog...
详细信息
ISBN:
(纸本)9781479907526
Security of industrial network is a hot topic that requires constant efforts. Access control models and related analysis are powerful tools for the design and verification of security policies. However, the methodologies developed in the standard ICT world are not always suitable for the application in industrial environments because of the well known limitations that these systems are constantly dealing with. We propose here an approach for the automatic verification of the implementation of security policies in industrial systems with a particular attention on the limited security mechanisms available in these environments. We leverage a formal class model suitable for the description of system device configurations and the related security policies.
Fault detection functions with learning method of a robotic manipulator are very useful for factory automation. All production has the possibility to fail due to unexpected accidents. To reduce the fatigue of human wo...
详细信息
ISBN:
(纸本)9781467356411;9781467356435
Fault detection functions with learning method of a robotic manipulator are very useful for factory automation. All production has the possibility to fail due to unexpected accidents. To reduce the fatigue of human workers, small errors automatically should be corrected by a robot system. Also a learning method is important for fault detection, because labor of system integrator should be reduced. In this paper, an external thread fastening task by a robotic manipulator is investigated. To discriminate the four states of a task, linear support vector machine methods with two feature parameters are introduced. The effectiveness of the proposed algorithm is confirmed through an experiment and recognition examination. Finally, the ability of linear SVM is compared with artificial neural network method.
Vehicle-pedestrian collision avoidance is an important issue on intelligent vehicles research *** pedestrian detection and collision avoidance were concentrated by previously many studies,there are many problems about...
详细信息
Vehicle-pedestrian collision avoidance is an important issue on intelligent vehicles research *** pedestrian detection and collision avoidance were concentrated by previously many studies,there are many problems about the collision prediction and *** on pedestrian detection,the trajectory prediction and time to collision(TTC) still needs to be further studied to prevent vehicle-pedestrian *** this study,a monocular camera with low cost was *** well performance of pedestrian detection was *** on this detection system,a model of pedestrian trajectory prediction was ***,the extended Kalman filter was used to predict motion of *** on trajectory prediction,time to collision range(TTCR) was proposed identify three levels risks,including safe,potential collision and *** this study,the on-road experiments were conducted to validate the proposed *** experimental result shows that the TTCR is more reasonable and safe to apply in vehicle-pedestrian collision avoidance.
Information flow control is a key issue in the largescale systems,it needs to consider the collaboration between multi-components,execution efficiency,system security,and other aspects,the complexity of information fl...
详细信息
ISBN:
(纸本)9781467349994
Information flow control is a key issue in the largescale systems,it needs to consider the collaboration between multi-components,execution efficiency,system security,and other aspects,the complexity of information flow control is particularly prominent in the virtualization *** current information flow control in virtualization system mainly use direct communication and asynchronous communication mode,but they have disadvantage such as complexity of VMM designing,increasing the risk of system security,low efficiency of data *** this paper,we establish a synchronous communication mechanism based on the Collaborative-VMM,three key information flow control were designed in this VMM including I/O processing,interrupt processing,and user interface,it can eliminate the issue of processing delay between VMM and the I/O processing *** experimental results show that the synchronous communication mechanism can simplify the design of virtualization system and does not reduce the performance of the system at the same time,it is a viable information flow control scheme.
暂无评论