Utilizing a stack cache in a real-time system can aid predictability by avoiding interference that heap memory traffic causes on the data cache. While loads and stores are guaranteed cache hits, explicit operations ar...
详细信息
The multilevel inverters (MLIs) are classified into three topologies such as Diode Clamped, Flying Capacitor and Cascade Multilevel Inverter (CMLI). CMLI topologies include two kind of structure that is named symmetri...
详细信息
The 2nd ACM InternationalWorkshop on Multimedia Analysis for Ecological Data (MAED'13) is held as part of ACM Multimedia 2013. MAED'13, following the first workshop of the MAED series (MAED'12) that was he...
详细信息
With the enormous growth of digital content in internet, various types of online reviews such as product and movie reviews present a wealth of subjective information that can be very helpful for potential users. Senti...
详细信息
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of came...
详细信息
In this paper, we propose a kernel estimation algorithm using fast best kernel retrieval (FBKR) from spectral irregularities to achieve the deblurring. In daily life, when people take a photograph by any kinds of camera equipment, image motion blur caused by camera motion often happens. Camera motion during exposure will produce a blurred image, this kind of blur is often non-liner mode. Motion blur always causes the decline of image quality, as long as the users using the hand-held photography equipment often have a similar experience. Based on this reason, reconstructing a clear image from blurred image is the main objective in this paper. Reconstruction is an ill-pose problem. In current motion blur estimation algorithms, these algorithms usually use the recursive method to estimate motion blur kernel. However, recursive process is quite time-consuming. In order to enhance time-consuming, in this paper, based on iterative phase retrieval algorithm and normalized sparsity measure, we propose a fast and effective blur kernel retrieval algorithm, which can find the best kernel in a short time. Experiments verify that our method can effectively reduce the execution time and obtain the best motion blur kernel to deblur a deblurred image and keep the quality of image deblurring.
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an ...
详细信息
We consider the problem of secure communications in a Gaussian two-way relay network where two nodes exchange confidential messages only via an untrusted relay. The relay is assumed to be honest but curious, i.e., an eavesdropper that conforms to the system rules and applies the intended relaying scheme. We analyze the achievable secrecy rates by applying network coding on the physical layer or the network layer and compare the results in terms of complexity, overhead, and efficiency. Further, we discuss the advantages and disadvantages of the respective approaches.
The paper analyzes three recently proposed algorithms, which differ not only in the method of finding solution to the Maximum Lifetime Coverage problem in Wireless Sensor Networks (WSN), but also approaches to a state...
详细信息
IKEv2 offers authentication, authorization and key agreement services to establish a security association between two peers bound to IP addresses, but it is still vulnerable to some security problems such as denial of...
详细信息
ISBN:
(纸本)9789898565693
IKEv2 offers authentication, authorization and key agreement services to establish a security association between two peers bound to IP addresses, but it is still vulnerable to some security problems such as denial of service (Dos) and man-in-the-middle attack. Host Identity Protocol (HIP) is also a security protocol that defines host identifiers for naming the endpoints and performs authentication and creation of IPsec security associations between them bound to identifiers. The purpose of HIP is to support trust systems, enhance mobility and greatly reduce the Denial of Service (Dos) attacks. We focus on an extension to IKEv2 in order to enhance authentication, eliminate man-in-the-middle attack and guarantee denial of service to provide better security between the two peers. In this paper, we describe our proposal that consists of combining the IKEv2 with the HIP to set up a security association based on two parameters which are location and Identity. This combination can provide better security properties than each protocol used alone. This scheme, named (HIP-IKEv2) couples location and identity to define a security association between two peers. We have used the Automated Validation of Internet Security Protocols and Applications (AVISPA) and its Security Protocol Animator (SPAN), and two powerful automated tools in order to formally specify and validate the HIP-IKEv2 protocol.
Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiolo...
详细信息
ISBN:
(纸本)9780819497765
Biometric signatures for identity recognition have been practiced for centuries. Basically, the personal attributes used for a biometric identification system can be classified into two areas: one is based on physiological attributes, such as DNA, facial features, retinal vasculature, fingerprint, hand geometry, iris texture and so on;the other scenario is dep.ndent on the individual behavioral attributes, such as signature, keystroke, voice and gait style. Among these features, iris recognition is one of the most attractive approaches due to its nature of randomness, texture stability over a life time, high entropy density and non-invasive acquisition. While the performance of iris recognition on high quality image is well investigated, not too many studies addressed that how iris recognition performs subject to non-ideal image data, especially when the data is acquired in challenging conditions, such as long working distance, dynamical movement of subjects, uncontrolled illumination conditions and so on. There are three main contributions in this paper. Firstly, the optical system parameters, such as magnification and field of view, was optimally designed through the first-order optics. Secondly, the irradiance constraints was derived by optical conservation theorem. Through the relationship between the subject and the detector, we could estimate the limitation of working distance when the camera lens and CCD sensor were known. The working distance is set to 3m in our system with pupil diameter 86mm and CCD irradiance 0.3mW/cm2. Finally, We employed a hybrid scheme combining eye tracking with pan and tilt system, wavefront coding technology, filter optimization and post signal recognition to implement a robust iris recognition system in dynamic operation. The blurred image was restored to ensure recognition accuracy over 3m working distance with 400mm focal length and aperture F/6.3 optics. The simulation result as well as experiment validates the proposed code ap
暂无评论