Authentication and key exchange are fundamental for establishing secure communication channels over public insecure ***-party key exchange protocol is an important technique for two clients to agree a session key with...
详细信息
Authentication and key exchange are fundamental for establishing secure communication channels over public insecure ***-party key exchange protocol is an important technique for two clients to agree a session key with the help of a trusted server who shares a human password with each client. Many protocols have been proposed for the requirements of security and efficiency over the *** security consideration, we are concerned with the off-line password-guessing *** make the attack to a three-party key exchange protocol based on Elliptic Curve Discrete Logarithm Problem(ECDLP) and show that it is vulnerable against the off-line password-guessing attack. In fact,the off-line password-guessing attack is available for malicious participants and is effective to similar *** avoid this problem,we give a suggestion to eliminate it and enforce the security.
Based on layered decoding and semi-parallel structure,a novel architecture of multi-rate QC-LDPC decoder is proposed in this *** can support any code rates without any changes in hardware to achieve higher hardware **...
详细信息
Based on layered decoding and semi-parallel structure,a novel architecture of multi-rate QC-LDPC decoder is proposed in this *** can support any code rates without any changes in hardware to achieve higher hardware *** update of current layer and the comparison of next layer are processed simultaneously to improve the *** check-to-variable messages are stored indirectly to reduce the storage *** on the proposed architecture,a QC-LDPC decoder of 2304 bits and 6-encodings style is *** ModelSim SE6.0 simulation results verify that the proposed decoder is correct and ***,the decoder is synthesized by Synopsys Design Compiler on SMIC 0.18μm CMOS technology,and the maximum throughput can achieve 318 Mbps at 145 MHz and 15 iterations.
In this paper,the radial distortion correcting problem with the plimbline method is revisited,which uses the fact that in pinhole camera model a straight line in the scene should be imaged as a line in image space.A n...
详细信息
In this paper,the radial distortion correcting problem with the plimbline method is revisited,which uses the fact that in pinhole camera model a straight line in the scene should be imaged as a line in image space.A new algorithm is proposed,the distortion correcting problem is reformulated as a LS problem and solved via QR *** the single line case and multi-lines case are taken into *** is very simple and easy to implement compared with other iterative technique based methods while has reasonable radial distortion correcting result. Experiments on both simulated data and real images,which include both the indoor scene images and outdoor scene images, show its performance.
Wireless sensor networks(WSNs) are often deployed in unattended and hostile *** order to protect the sensitive data and securing communication,secret keys should be used to encrypt the exchanged messages between commu...
详细信息
Wireless sensor networks(WSNs) are often deployed in unattended and hostile *** order to protect the sensitive data and securing communication,secret keys should be used to encrypt the exchanged messages between communicating *** this paper,we propose a self-organizing key management scheme based on trust model and Bilinear Pairing, called Behavior Trust-Based Keying(BTBK).The administrative services provided by BTBK ensure the survivability of the *** to behavior trust degree of the communicating node,BTBK provides security mechanisms including pairwise key establishment,update and revocation dynamically,which does not need base sites or special *** performances of WSNs,***,invulnerability,connection probability of nodes,less storage and communication overhead, can be substantially improved by using BTBK *** scheme and its detailed performance evaluation are presented based on simulation.
This paper mainly presented a research in which a GPRS-based environment monitoring system(GEMS) was developed to collect meteorological data influencing apple *** data collected are transmitted to a web server throug...
详细信息
This paper mainly presented a research in which a GPRS-based environment monitoring system(GEMS) was developed to collect meteorological data influencing apple *** data collected are transmitted to a web server through GPRS service,and meanwhile replicated and stored in a SD card for avoiding the *** system has been deployed into 5 different main apple production regions in Yunnan province. Via two-year test,the research showed that GEMS is functional as regards to monitoring the environmental factors which influence apple production,which hence provide real-time service for registered farmers to guide their work.
Instruction detection technology is a new generation of security technology that monitor networks or systems to avoid malicious activity and policy violation. Compared with traditional security protection measures suc...
详细信息
Instruction detection technology is a new generation of security technology that monitor networks or systems to avoid malicious activity and policy violation. Compared with traditional security protection measures such as firewall, instruction detection can prevent attacks both from external and internal. The SVM is a statistical learning model(SLT), which shows an extraordinary advantage when dealing with small sample. Its advantages are:(1) SVM's goal is to get the optimal solution under limited samples but not infinity samples which is the prerequisite of traditional machine learning like neural network or regression.(2) SVM has a regularization parameter to avoid over-fitting and uses the kernel trick to transit to high-dimensional feature space to increase VC dimension. This manuscript is based on the SVM to extract intrusion detection information, at the same time in order to eliminate noise caused by false alarm probability, we also combined with the context validation as a preliminary analysis, so as to achieve a novel computer network intrusion detection(NCNID) algorithm.
Linear modeling is the most common used statistical technique to discover hidden relationship between underlying random variables of interests because of its simplicity and interpretability. In this paper, we utilize ...
详细信息
Linear modeling is the most common used statistical technique to discover hidden relationship between underlying random variables of interests because of its simplicity and interpretability. In this paper, we utilize linear models to study glycosylated hemoglobin, which a measure of the disease of diabetes. We want to find which other predictors or indicators have the most influential power on glycosolated hemoglobin. The dataset is collected from the American Diabetes Association. However, the dataset is incomplete due to missing data problem. We utilize EM algorithm to learn the linear model from the partial missing data. Convergence rate and robustness against initial values are examined. Moreover, we prove the convergence of EM algorithm in a more general setting. In addition, we evaluate the performance of EM at different missing rates and compare the results with two other methods that are typically used to deal with missing *** result shows that the EM algorithm have better performance than other methods in various missing rates in this application.
In order to improving the designing efficiency and achieving automation of airfoil optimization designing,A method which combined the airfoil parametric modeling software、the CFD software with Isight platform was pre...
详细信息
In order to improving the designing efficiency and achieving automation of airfoil optimization designing,A method which combined the airfoil parametric modeling software、the CFD software with Isight platform was presented,it was used to optimize the airfoil to ameliorate its aerodynamic performance. During the process of optimization designing,first,we adopted the design of experiment(DOE) method to search the designing space,achieved the optimal initialization ***,we adopted Non-dominated Sorting Genetic Algorithm(NSGA-Ⅱ) to optimize the airfoil,got the optimal airfoil aerodynamic solution. The optimized solution proved that the aerodynamic performance of the airfoil has been significantly improved,which shows the optimization designing method was reasonable and feasible.
Next generation mobile network is characterized by ubiquitous access. It is therefore challenging to address the convergence of heterogeneous network and performance of handover. In this paper, a novel vertical handov...
详细信息
Next generation mobile network is characterized by ubiquitous access. It is therefore challenging to address the convergence of heterogeneous network and performance of handover. In this paper, a novel vertical handover framework is proposed for optimizing mobile handover signaling. This framework is based on the cooperation of Media Independent Handover(MIH) and Software-Defined Networking(SDN), featuring seamless vertical handover and agile network path reconfiguration. Moreover, an optimized network selection algorithm, called Dynamic-VIKOR(D-VIKOR), is proposed to further enhance handover performance. Compared with the original VIKOR, D-VIKOR can significantly reduce the computational load through frequently evaluating dynamic attributes, but not the static attributes. Finally, the simulation results highlight the reduction of handover delay and execution time due to applying the cooperated handover framework.
Hoisting technique plays an important role of spaceflight test and launch. Simulation of hoisting technique can promote effectivity and safety. Based on finite automata, seven key steps of hoisting technique are analy...
详细信息
Hoisting technique plays an important role of spaceflight test and launch. Simulation of hoisting technique can promote effectivity and safety. Based on finite automata, seven key steps of hoisting technique are analyzed. Double-hook erecting process is designed as a key step, and analyzed the force of the load. The state transition diagram is designed to describe the double-hook erecting. Using ODE as a physics engine, the double-hook erecting is simulated by rigid body kinematic. With physics engine, the force of the object is calculated by rigid body kinematics, and the centroid's displacement is more accurate compared with particle kinematics. Also, simulation using the physics engine provides a certain reference value for the security of staff, the operable range and so on. The hoisting technique simulation system based on physics engine has been applied in launch site.
暂无评论