In LTE (Long Term Evolution), the high utilization for physical resources is achieved by scheduling suitable number of time frequency resource elements for one user in one subframe. This is supported by the rate match...
详细信息
A two-stage state recognition method is proposed for asynchronous SSVEP(steady-state visual evoked potential) based brain-computer interface(SBCI) *** two-stage method is composed of the idle state(IS) detection and c...
详细信息
A two-stage state recognition method is proposed for asynchronous SSVEP(steady-state visual evoked potential) based brain-computer interface(SBCI) *** two-stage method is composed of the idle state(IS) detection and control state(CS) discrimination *** on blind source separation and continuous wavelet transform techniques,the proposed method integrates functions of multi-electrode spatial filtering and feature *** IS detection module,a method using the ensemble IS feature is *** CS discrimination module,the ensemble CS feature is designed as feature vector for control intent ***,performance comparisons are investigated among our IS detection module and other existing *** the experimental results validate the satisfactory performance of our CS discrimination module.
This paper proposes a high-order terminal sliding-mode control strategy for wind energy integration into power network.A typical wind energy- conversion system and its mathematical model are *** a wind turbine to have...
详细信息
ISBN:
(纸本)9781479900305
This paper proposes a high-order terminal sliding-mode control strategy for wind energy integration into power network.A typical wind energy- conversion system and its mathematical model are *** a wind turbine to have the maximum active power extraction from the wind at any given instant,the electrical load on the generator is regulated using the maximum power point tracking *** wind energy- integration into power network,the structure of back to back PWM is *** the voltage and currents in the wind energy conversion system are measured and the control signals for both two PWM inverters are generated based on the control algorithins.
In the scene classification, a scene can be considered as a set of object cliques. Objects inside each clique have semantic correlations with each other, while two objects from different cliques are relatively indepen...
详细信息
This paper proposed a boundary feedback control design for open-channel networks with trapezoidal cross sections by using a Riemann invariants approach. The open-channel network is well modeled by the nonlinear Saint-...
详细信息
Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the constructio...
详细信息
Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the construction of high-security quantum information networks. We propose a scheme to implement MDI-QKD, but with continuous variables instead of discrete ones, i.e., with the source of Gaussian-modulated coherent states, based on the principle of continuous-variable entanglement swapping. This protocol not only can be implemented with current telecom components but also has high key rates compared to its discrete counterpart; thus it will be highly compatible with quantum networks.
Piece in Hand method is a security enhancement method for Multivariate Public key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece...
详细信息
Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, we propose an expr...
详细信息
Decentralizing attribute based encryption is a variant of multi-authority attribute based encryption which doesn't require a trusted central authority to conduct the system setup. In this paper, we propose an expressive decentralizing KP-ABE scheme with constant ciphertext size. In our construction, the access policy can be expressed as any non-monotone access structure. Meanwhile, the ciphertext size is independent on the number of attributes used in the scheme. We prove that our scheme is semantic secure in so-called Selective-Set model based on the n-DBDHE assumption. To the best of our knowledge, this is the first multi-authority attribute based encryption scheme realizing such expressive access policy and constant ciphertext size.
Data deduplication is an attractive technology to reduce storage space and upload bandwidth for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate cop...
详细信息
ISBN:
(纸本)9781479936311
Data deduplication is an attractive technology to reduce storage space and upload bandwidth for increasing vast amount of duplicated and redundant data. In a cloud storage system with data deduplication, duplicate copies of data will be eliminated and only one copy will be kept in the storage. To protect the confidentiality of sensitive data while supporting deduplication, the convergent encryption technique has been proposed to encrypt the data before outsourcing. However, the issue of keyword search over encrypted data in deduplication storage system has to be addressed for efficient data utilization. This paper firstly proposes two constructions which support secure keyword search in this scenario. In these constructions, the integrity of the data can be realized by just checking the convergent key, without other traditional integrity auditing mechanisms. security analysis demonstrates that our keyword search schemes are secure in terms of the definitions specified in the proposed security model.
Service composition is an important mean for integrating the individual Web services to create new value added systems that satisfy complex requirements. However, it is challenging to guarantee the reliability of serv...
详细信息
暂无评论