Consider quasigroup operations *1,*2,…,*n on a finite set A,we use them to define a transformation E(n):A+→A+,where A+={x1x2…xk|xi∈A,k≥1}.The function E(n) have several useful properties suitable for many cryptog...
详细信息
Consider quasigroup operations *1,*2,…,*n on a finite set A,we use them to define a transformation E(n):A+→A+,where A+={x1x2…xk|xi∈A,k≥1}.The function E(n) have several useful properties suitable for many cryptographical purposes,and the encoding method based on quasigroups has remained *** this paper,we analyse the security of E(n) and give an algorithm of partial break on the chosen plaintext attack.
In conventional image classification methods, complementary advantages between various single features of images are not fully applied;meanwhile,redundant information exists in the extracted *** a result,accuracy of i...
详细信息
In conventional image classification methods, complementary advantages between various single features of images are not fully applied;meanwhile,redundant information exists in the extracted *** a result,accuracy of image classification is not ***,a novel approach for image classification based on multi-feature combination and PCA-RBaggSVM(principal component analysis and random bagging support vector machine) is proposed in the ***, comprehensive features describing fully image content are extracted,then redundant information is removed by transforming extracted features with ***,RBaggSVM of ensemble SVM classifier is applied for classification. Experimental result shows that the method has higher accuracy and faster speed of image classification than similar methods.
SSL VPN is the simplest solution technology which can be used to access to enterprise resources by remote *** is no effective access control capacity in SSL VPN *** this paper,we use UCON model to build a set of fine-...
详细信息
SSL VPN is the simplest solution technology which can be used to access to enterprise resources by remote *** is no effective access control capacity in SSL VPN *** this paper,we use UCON model to build a set of fine-grain access control mechanism that is used for SSL VPN system to strengthen its safety performance.
Due to the developing of network technology,the increasing size of enterprises,the rising of cloud computing,the monitoring of large scale distributed computing is more and more *** studies of Distributed Monitoring o...
详细信息
Due to the developing of network technology,the increasing size of enterprises,the rising of cloud computing,the monitoring of large scale distributed computing is more and more *** studies of Distributed Monitoring on resources,programs,services,home and abroad,are lack of userconfigurable and run-time *** paper proposed an ECA rule-based configurable monitor frame for distributed system to solve this *** this frame,the monitoring probes are configured by users to gather necessary monitoring information,and probes can be deployed through software remote deployment *** monitoring information are put into complex event engine through form of events,we use complex event processing technology to extract the abstract management event,which are more significant and more *** the management event occurs,according to the ECA rules established by users,monitor frame can make warning or improvement measures,so can manage distributed systems run-time.
Grain is one of the eSTREAM project candidates in the hardware profile with 160 bits of internal *** this paper we present a kind of structural attack applied on this *** use two approximations of the nonlinear filter...
详细信息
Grain is one of the eSTREAM project candidates in the hardware profile with 160 bits of internal *** this paper we present a kind of structural attack applied on this *** use two approximations of the nonlinear filter function and combine the resulted relations in appropriate clock times for constructing the space of guessed *** has been no guess and determine attack on this cipher so far.70 bits of internal state should be ***,our attack has a complexity of order O(270).
With the development of wireless sensor networks,the routing protocol shall concern about not only the energy consumption of a single node,but also the balance of energy consumption across the whole network,so as to m...
详细信息
With the development of wireless sensor networks,the routing protocol shall concern about not only the energy consumption of a single node,but also the balance of energy consumption across the whole network,so as to maximize the lifetime of the *** the paper,we introduced agent into wireless sensor networks,proposed an Agent-based Energy-efficient Routing *** simulation results show that the scheme takes into account both nodes energy and path consumption,can balance energy consumption of the network nodes,and prolongs the lifetime of the network in a more efficient way.
The interpretation of natural scenes,generally so obvious and effortless for humans,still remains a challenge in computer *** this paper we propose to design binary classifiers capable to recognize some generic natura...
详细信息
The interpretation of natural scenes,generally so obvious and effortless for humans,still remains a challenge in computer *** this paper we propose to design binary classifiers capable to recognize some generic natural scene images,the countryside class and the city class for *** the segmentation each image is represented by a set of regions. Then the propounded 1*12 vectors are used to describe the ***,we propose a new simple kernal function based on graph edit distance and raise the question that Munkres' algorithm can be used to measure the similarity between the *** show that the improvements are effective.
Wireless sensor and actor networks are becoming a basis for a rapidly increasing range of applications in industrial measurement-control(M&C) *** application has different requirements in terms of M&C task,nod...
详细信息
Wireless sensor and actor networks are becoming a basis for a rapidly increasing range of applications in industrial measurement-control(M&C) *** application has different requirements in terms of M&C task,node functionalities,network size,complexity and cost;therefore,it is worthwhile time investment to design and implement a middleware for wireless sensor and actor networks that would be adaptable to various industrial applications of interest with a minimum amount of *** this paper,a general-purpose application platform is *** provides a solution to reuse coordination,real-time routing,task distribution mechanisms, which facilitates the development of new application systems,and reduces the cost of design and maintain.
Copula is a powerful tool for multivariate probability *** of distribution algorithms are a class of optimization algorithms based on probability distribution model. This paper introduces a new estimation of distribut...
详细信息
Copula is a powerful tool for multivariate probability *** of distribution algorithms are a class of optimization algorithms based on probability distribution model. This paper introduces a new estimation of distribution algorithm with multivariate Gaussian *** the algorithm,Gaussian copula parameters are firstly estimated by estimating Kendall's tau and using the relationship of Kendall's tau and correlation matrix,thus,joint distribution is estimated. Then,the Monte Carte simulation is used to generate new *** relative experimental results show that the new algorithm is effective.
This paper uses the agent-based modeling approach to construct an artificial stock market with the continuous double auction *** this market,several psychological effects that described in behavioral finance(such as a...
详细信息
This paper uses the agent-based modeling approach to construct an artificial stock market with the continuous double auction *** this market,several psychological effects that described in behavioral finance(such as anchoring effect, mental accounting and disposition effect),are introduced into the decision process of agent to illustrate the impact of agent's psychological *** on this model,this paper mainly studied the nonlinear dynamical characteristics of stock market, the comparison of two trading strategies,as well as the relationship between the tick size and the trading volume,under the influence of agent's psychological factors.
暂无评论