In order to simulate the microscopic traffic situation of large cities, based on current fast development of graphics hardware, the road structure was separated into road segments and intersections, which were connect...
详细信息
In order to simulate the microscopic traffic situation of large cities, based on current fast development of graphics hardware, the road structure was separated into road segments and intersections, which were connected together with signal lights;an improved constraint based follow the leader method was given to update vehicles position with different speed limitations of different lanes considered. Accordingly a heterogeneous many-core based three dimensional microscopic traffic simulation framework was implemented with C++, which was tested with different scenes. The results indicate that such design can make the system more flexible and closer to the reality with potential collision avoided, and can also present a more realistic detailed appearance;moreover such kind of heterogeneous architecture can improve the microscopic traffic simulation efficiency greatly, suitable for large scale 3D city scene. Both the cost of three dimensional rendering and the cost from simulation become higher with the increasing of vehicle number, however the rendering procedure is more likely to be the bottleneck of the whole system. The test also verifies the scalability of the system.
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases w...
详细信息
ISBN:
(纸本)9781467352543
Considered cryptosystems such as Cardano square lattices are characterized by the high-speed encryption in use today Enhanced Programming computers. This is because the number of different variants rapidly increases with the size of a square. In this paper we have shown that, for the size of 20 × 20, the number of such grids exceeds the number of 1.6 × 2 60 Therefore, these systems have sufficient cryptographic resistance. Application of these systems in conjunction with substitution cipher can still more resist cryptographic attacks.
Cloud computing is a promising computing paradigm which has recently drawn extensive attention from both academia and industry. Meanwhile, structured document plays a vital role as information carrier in cloud computi...
详细信息
Cloud computing is a promising computing paradigm which has recently drawn extensive attention from both academia and industry. Meanwhile, structured document plays a vital role as information carrier in cloud computing. Therefore apparently, secure access to structured document is a key technology for the quality control of cloud services. In order to prevent information leakage and unauthorized access to the structured document, which is a common problem caused by lack of the multilevel security mechanism in current cloud computing environment, we propose an action-based multilevel access control model (referred to as the AMAC) and provide a formal description of access control policies. In our AMAC model, we employ noninterference theory in the information flow to establish AMAC noninterference model, and prove the security of multilevel access control policies in our AMAC model. Comparison and analysis with the existing access control models demonstrate that the AMAC model not only improves the flexibility of access control policies on the basis of roles, contexts and access actions, but also realizes multilevel security mechanism in terms of the security levels of the user, the access actions and the structured document.
Markov decision processes (MDPs) are often used for modelling distributed systems with probabilistic failure or randomisation. We consider the problem of model repair for MDPs defined as follows: if the MDP fails to s...
详细信息
Markov decision processes (MDPs) are often used for modelling distributed systems with probabilistic failure or randomisation. We consider the problem of model repair for MDPs defined as follows: if the MDP fails to satisfy a property, we aim to find new values for the transition probabilities so that the property is guaranteed to hold, while at the same time the cost of repair is minimised. Because solving the MDP repair problem exactly is infeasible, in this paper we focus on approximate solution methods. We first formulate a region-based approach, which yields an interval in which the minimal repair cost is contained. As an alternative, we also consider sampling based approaches, which are faster but unable to provide lower bounds on the repair cost. We have integrated both methods into the probabilistic model checker PRISM and demonstrated their usefulness in practice using a computer virus case study.
Wireless Sensor Networks (WSNs) are subject to node failures because of limited energy and link unreliability which makes the design of routing protocols in such networks a challenging task. The multipath routing sche...
详细信息
ISBN:
(纸本)9781629932170
Wireless Sensor Networks (WSNs) are subject to node failures because of limited energy and link unreliability which makes the design of routing protocols in such networks a challenging task. The multipath routing scheme is an optimal alternative to address this problem which splits the traffic across multiple paths instead of routing all the traffic along a single path. However, using more paths introduces more contentions which degrade energy efficiency. The problem becomes even more difficult in the scenario of multiple source-destination pairs since the flow distribution of each link is uncertain. Our goal is to minimize the energy cost and provide the robust transmission by choosing the optimal paths. We propose a Distributed Energy Efficient Routing protocol (D2ER) to achieve this goal. In D2ER, we first study the problem from a theoretical standpoint by mapping it to the multi-commodity network design problem. Then, we employ the transportation method to solve this problem since it is hard to build a global addressing scheme due to the great number of sensor nodes. Simulation results demonstrate that our optimal algorithm can save energy drastically.
At Crypto'07, Goyal introduced the notion of accountable authority identity-based encryption (A-IBE) in order to mitigate the inherent key escrow problem in identity-based encryption, and proposed two concrete con...
详细信息
The Meta data structure stored in the flash array can be used to make addressing for the data stored in the system and to obtain the dynamic property parameters of NAND flash. The meta data structure will be reconstru...
详细信息
The Meta data structure stored in the flash array can be used to make addressing for the data stored in the system and to obtain the dynamic property parameters of NAND flash. The meta data structure will be reconstructed during the startup period of the solid storage system. The procedure of data reading and writing to the solid storage system can be supported by the meta data structure. The Meta data storage structure in the flash chip for persistence and the corresponding reconstruction approach for large scale flash array are researched in this paper. To make sure the effectiveness of the approach and the quickly reconstruction progress, the solid storage system architecture and storage style of meta data are both studied, and a reconstruction algorithm is presented. The totally reading and partly reconstruction approach is created by author. For the Meta data stored in the flash array, it is once loaded into RAM. When some logical area is accessed by the system, the corresponding meta structure of the area will be reconstructed. According to the software simulation and real circuit verification, the approach presented in this paper can not only accomplish startup procedure quickly, and make the meta data ready, but also the refresh of the meta data during the operation of the storage system makes less writing bandwidth and system overhead. The meta data structure and reconstruction algorithm presented in this paper can be used to large scale flash array, and the storage overhead to the storage system is lower, with fast reconstruction procedure.
What the network learners have said in network learning forum posts directly reflects the needs of the learners during the network learning. By mining topics from forum posts, the network learning support service coul...
详细信息
What the network learners have said in network learning forum posts directly reflects the needs of the learners during the network learning. By mining topics from forum posts, the network learning support service could be greatly improved. For this purpose, the Learner-Topic model was employed in this paper to mine the learner's posts for discovering its topics. And then use the topics for learning resources recommendation.
The population ratio between the excited states of rubidium in the electrodeless discharge rubidium vapour lamp is calculated according to the near-infrared spectra in the region of 780-1550 nm. By using a 1529 nm las...
详细信息
The population ratio between the excited states of rubidium in the electrodeless discharge rubidium vapour lamp is calculated according to the near-infrared spectra in the region of 780-1550 nm. By using a 1529 nm laser, we measure the density of natural rubidium atoms at the 5P3/2 level. The populations of different excited states are then clarified.
暂无评论