Algorithms based on row enumeration always scan and construct conditional transposed tables, which increases the execution time and space cost. To address this problem, we adopt the DAG (Directed Acyclic Graph) to com...
详细信息
Algorithms based on row enumeration always scan and construct conditional transposed tables, which increases the execution time and space cost. To address this problem, we adopt the DAG (Directed Acyclic Graph) to compress the dataset to save the memory space. In DAG, each node is related to a rowid, and each two nodes have a corresponding directed edge which stores the common items of the two rowids. Each row is given an integer according to its coming order and the DAG follows that order. A directed acyclic graph records the relation between rows and items by doing AND(&) operation with the nodes' binary code of the edges. We also present DAGHDDM which is a new approach for mining frequent closed itemsets in high dimensional datasets. In this algorithm, we adopt the BitTable to compress the dataset firstly, and then construct DAG according to the BitTable. We increase the same items of the adjacent edges to implement pattern growth, traverse the DAG in reversal way and adopt a close-checking method to generate all frequent closed itemsets. It scans the dataset only once and does not generate candidate itemsets. The experimental results show that the proposed DAGHDDM algorithm can decrease the cost of time.
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example...
详细信息
ISBN:
(纸本)9781467358088
In this paper, we analyze on the use of token-controlled public key encryption (TCE)schemes. We argue that for many of the applications in some possibilities of application in financial or legal scenarios, for example, the millionaire's will problem, the `private-opening' commitment, the scheduled payment problem, and the sealed-bid auctions and electronic lotteries problem, in the literature, the use of token-controlled public key encryption on its own, leads to inadequate solutions. We suggest that when considering applications of TCE, it is advisable to pay close attention to the lack of authentication and incorporate defences against the problems highlighted in this paper.
In MAS (Multi-Agent system), communicating among agents is an important characteristic as it is important in transmitting information among agents, recognizing the status changing, and scheduling and accomplishing coo...
详细信息
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some ...
详细信息
Masking in gate level could efficiently protect AES S-box out of power analysis attack. But there still exists a kind of attack, called glitch attack, to achieve the sensitive information from gate cell leakage. Some works had been done to resist against glitch attack, which carefully masked AND gate or used Wave Dynamic Differential Logic (WDDL) cell. In this paper, we propose an improved masked AND gate, in which the relationship between input masked values and masks is nonlinear. Usually, when converting S-box operations from GF(2 8 ) to GF(((2 2 ) 2 ) 2 ), all the necessary computations become XOR and AND operations. Therefore, to fully mask AES S-box is to substitute the unmasked XOR and AND operations with the proposed masked AND gate and protected XOR gate. Although the proposed masked AND gate take up one extra XOR gate than Trichina's design and Baek's design, it can resist against glitch attack without using specific gate cell, such as WDDL.
In wireless orthogonal frequency division multiplexing (OFDM) systems, the knowledge of signal-to-noise ratio (SNR) plays an important role for system optimization. Most of the exiting literatures have studied the SNR...
详细信息
In wireless orthogonal frequency division multiplexing (OFDM) systems, the knowledge of signal-to-noise ratio (SNR) plays an important role for system optimization. Most of the exiting literatures have studied the SNR estimation for perfect synchronization in additive white Gaussian noise (AWGN) channels, or in frequency selective channels. However, the realistic channels are always doubly selective, and there may exist some residual symbol timing offset (STO) and carrier frequency offset (CFO) after coarse synchronization in the time domain. In this paper, we take these into account and propose a time-domain average SNR estimation scheme using one OFDM training symbol (preamble) which has been divided into multiple parts with equal length. Compared with the timedomain low-complexity SNR estimator (TLSE), our proposed time-domain preamble-based SNR estimator (TPSE) can not only be implemented in the presence of STO and CFO, but also generate more accurate SNR estimation for the channels with large Doppler shift. The estimated SNR value based on our scheme in the time-domain can be further reused to improve the ensuing CFO estimation and fine synchronization efficiently.
Currently, unmanned aerial vehicles (UAVs) are applied to routine inspection tasks of electric distribution networks. As an important information source, machine vision attracts much attention in the area of the UAV...
详细信息
ISBN:
(纸本)9781467316439
Currently, unmanned aerial vehicles (UAVs) are applied to routine inspection tasks of electric distribution networks. As an important information source, machine vision attracts much attention in the area of the UAV's autonomous control. To this end, real-time algorithms are studied-in this paper to detect the power lines in the UAV video images. First, video images are converted into binary images through an adaptive thresholding approach. Then, Hough Transform is used to detect line candidates in the binary images. Finally, a fuzzy C- means (FCM) clustering algorithm is used to discriminate the power lines from the detected line candidates. The properties of power lines are used to remove the spurious lines, and the length and slope of the detected lines are used as features to establish the clustering data set. Experimental results show that the algorithms proposed are effective and able to tolerate noises from complicated terrain background and various illuminations.
In this paper, we propose a new methodology to combine spectral information and spatial features for Support Vector Machine (SVM)-based classification. The novelty of the proposed work is in the combination of band se...
详细信息
In this paper, we propose a new methodology to combine spectral information and spatial features for Support Vector Machine (SVM)-based classification. The novelty of the proposed work is in the combination of band selection (i.e., linear prediction (LP)-based method), spatial feature extraction (i.e., morphology profiles (MP)), and spectral transformation (i.e., principal component analysis (PCA)) to build a computationally tractable system. The preliminary result with ROSIS data shows that using the selected bands and MP features extracted from principal components (PCs) can yield the highest accuracy. We believe such finding is instructive to feature extraction/selection for spectral/spatial-based hyperspectral image classification.
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical laye...
详细信息
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical layer or from the post-processing *** propose a possible attack on a passive detection QKD system based on the imperfection from the software *** analysis shows that Eve can obtain all the information about the key without being discovered.
Owing to the uncertainty of transmission opportunities between mobile nodes, the routing in delay-tolerant networks (DTNs) exploits the mechanism of opportunistic forwarding. Energy-efficient algorithms and policies f...
详细信息
Owing to the uncertainty of transmission opportunities between mobile nodes, the routing in delay-tolerant networks (DTNs) exploits the mechanism of opportunistic forwarding. Energy-efficient algorithms and policies for DTN are crucial to maximizing the message delivery probability while reducing the delivery cost. In this contribution, we investigate the problem of energy-efficient optimal beaconing control in a DTN. We model the message dissemination under variable beaconing rate with a continuous-time Markov model. Based on this model, we then formulate the optimization problem of the optimal beaconing control for epidemic routing and obtain the optimal threshold policy from the solution of this optimization problem. Furthermore, through extensive numerical results, we demonstrate that the proposed optimal threshold policy significantly outperforms the static policy with constant beaconing rate in terms of system energy consumption savings.
This paper present a geometric method to reconstruct human motion pose from 2D point correspondences obtained from uncalibrated monocular images. The proposed algorithm can handle images with very strong perspective e...
详细信息
暂无评论