Based on the semidefinite programming relaxation model of the code division multiple access maximum likelihood multiuser detection problem,a detection strategy by successive linear programming method is *** proposed m...
详细信息
Based on the semidefinite programming relaxation model of the code division multiple access maximum likelihood multiuser detection problem,a detection strategy by successive linear programming method is *** proposed method converts the semidefinite programming relaxation to a nonlinear programming problem by the semidefinite matrix factorization.A successive linear programming method is used to solve the nonlinear *** with randomized method,a suboptimal solution is obtained for the multiuser detection *** results show that the bit error rate performances of a detection strategy based on the successive linear programming method is almost similar to that of the detection strategy based on the semidefinite programming ***,average CPU time of the successive linear programming method is lower than that of the semidefinite programming relaxation method.
As the user's identity and sensitive information are regularly used in the process of cloud service access control,there will be a need to protect the user privacy from disclosing to cloud *** paper describes a ne...
详细信息
As the user's identity and sensitive information are regularly used in the process of cloud service access control,there will be a need to protect the user privacy from disclosing to cloud *** paper describes a new access control policy based on group signatures in cloud service,which allows users to access the cloud services on behalf of group and prevents users from disclosing their privacy to the cloud service *** build our access control policy,we construct a double center access control *** this basis,a scheme of access control based on group signatures is given,which is derived from of the short group *** scheme can manage multi-groups and validate the group certificates of *** also prove the correctness of our scheme.
Synchronization and pinning control of complex networks is to regulate the agents' behavior and improve network performance. In this article, we review some recent developments in pinning control. Stability algori...
详细信息
Synchronization and pinning control of complex networks is to regulate the agents' behavior and improve network performance. In this article, we review some recent developments in pinning control. Stability algorithms and pining strategies in different types of complex networks are presented and compared. Adaptive pinning control is also summarized. In addition, the research extended to discrete-time case is reviewed. As some related research, the development in consensus and flocking of multi-agent system are introduced briefly. At last, we give some ideas about pinning control in social networks.
Four approaches of time-series analysis,neural network,wavelet analysis,nonparametric regression were briefly outlined in the beginning of this *** daily average concentrations of SO2,NO2 and PM10 in xi'an during ...
详细信息
Four approaches of time-series analysis,neural network,wavelet analysis,nonparametric regression were briefly outlined in the beginning of this *** daily average concentrations of SO2,NO2 and PM10 in xi'an during September 27,2006 to May 3,2008 were analyzed using different methods,e.g.,time-series analysis,BP neural network,RBF neural network,de-noising BP neural network,de-noising RBF neural network,and nonparametric regression,and the concentrations of SO2 in xi'an from April 4,2008 to May 3,2008 were *** forecasting results were compared and discussed in order to evaluate the effects of different *** results show that all the methods mentioned can be used in time series analysis of air pollutants and the de-noising BP neural network is more scientific.
Security-mediated certificateless (SMC) signature not only addresses the issues about instantaneous revocation of keys in certificateless signature (CLS) but also resolves the key escrow problem in identity-based sign...
详细信息
Security-mediated certificateless (SMC) signature not only addresses the issues about instantaneous revocation of keys in certificateless signature (CLS) but also resolves the key escrow problem in identity-based signature (IBS). In this paper, based on Waters' signature scheme [15], Paterson et al.'s IBS scheme [13] and xiong et al.'s CLS scheme [18], we propose a SMC signature scheme which is secure against malicious-but-passive KGC attack in the standard model.
In the beamformers of modern digital ultrasound imaging system,to avoid storing amount of precalculated parameters,real time delay calculation has to be *** paper describes the design and implementation of a calculato...
详细信息
In the beamformers of modern digital ultrasound imaging system,to avoid storing amount of precalculated parameters,real time delay calculation has to be *** paper describes the design and implementation of a calculator of beamforming delay parameters,which based on pipelined Coordinate Rotation Digital computer(CORDTC) architecture and 2-level carry look ahead(CLA) *** computational speed is achieved while computational logic is *** calculator is used in a 128-channel ultrasound system with sampling frequency of 40 MHz and beamforming delay update rate of 10 *** synthesized for a Virtex-5 XC5VLX110T FPGA,the maximum clock frequency is 351.494MHz,and only 8 calculators are needed in two-receive-beam system.
Applying a variable convergence factor technique,we derive an adaptive filter based on Davidon-Fletcher-Powell (DFP) algorithm and present update recursion of the inverse autocorrelation matrix *** MATLAB 7.0,DFP algo...
详细信息
Applying a variable convergence factor technique,we derive an adaptive filter based on Davidon-Fletcher-Powell (DFP) algorithm and present update recursion of the inverse autocorrelation matrix *** MATLAB 7.0,DFP algorithm is implemented in parameter identification and short-term traffic flow *** results obtained demonstrate that divergence may exist in application to parameter identification because of inappropriate parameters' selection for LMS and RLS algorithm that must predefine parameters ***,DFP algorithm can always guarantee its stability and convergence *** to short term traffic flow prediction show that DFP algorithm is well capable of reflecting change tendency and regularity of traffic flow series and is characteristic of higher prediction accuracy.
In this paper,according to the security and privacy requirements in VANETs,we propose an ID-based ring signature scheme with revocable anonymity,which means that an entity that has the power can revoke anonymity of th...
详细信息
In this paper,according to the security and privacy requirements in VANETs,we propose an ID-based ring signature scheme with revocable anonymity,which means that an entity that has the power can revoke anonymity of the ring signature,thus the entity can determine the real signer identity when *** the analysis and comparison with the existing schemes,our proposed scheme not only has the general features:Spontaneity,Conditional privacy,Multilevel privacy,but has two appealing characteristics:higher efficiency and shorter length of signature,and the security of our proposed scheme is analyzed under random oracle *** proposed scheme can achieve the following security and privacy requirements:message authentication and integrity,message non-repudiation,privacy protection and accountability.
Being proposed in 2007,cloud computing has been a hot researching area of computer network *** giant companies can offer the cloud services *** the development of cloud computing,a set of security problem appears,such...
详细信息
Being proposed in 2007,cloud computing has been a hot researching area of computer network *** giant companies can offer the cloud services *** the development of cloud computing,a set of security problem appears,such as accessing security and so *** paper surveys the security problems of current cloud computing., then based on the architecture of cloud computing,a security model is proposed.
This paper put foreword a general architecture of cloud storage system,and discusses the key *** is a new network storage services,cloud storage is an extension of the concept of cloud computing and developed a new **...
详细信息
This paper put foreword a general architecture of cloud storage system,and discusses the key *** is a new network storage services,cloud storage is an extension of the concept of cloud computing and developed a new *** architecture of cloud storage is based on it conception and the proposed hierarchical and the discussed key technologies involving data organization,virtual storage,Data Duplication,security,etc,*** the development of cloud computing and global data growth,it will get more attention and will be developed well.
暂无评论