Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification,...
详细信息
ISBN:
(纸本)9780769537443
Shamir proposed the first (t, n) threshold secret sharing scheme. Shamir's scheme is ideal and perfect. In this paper, we propose two modifications of Shamir's secret sharing scheme. In our first modification, each shareholder keeps both x-coordinate and y-coordinate of a polynomial as private share. In our second modification, dealer uses polynomial with degree larger than the threshold value t to generate shares for a (t, n) threshold scheme. We show that these two modified schemes are ideal and perfect. Using these two modifications, we design a multilevel threshold secret sharing schemes (MTSS). We prove that the proposed scheme is secure.
Schema matching, the problem of finding semantic correspondences between elements of two schemas, plays a key role in many applications, such as data warehouse, heterogeneous data sources integration and semantic Web....
详细信息
Schema matching, the problem of finding semantic correspondences between elements of two schemas, plays a key role in many applications, such as data warehouse, heterogeneous data sources integration and semantic Web. The existing approaches to automating schema matching almost focus on computing direct element matches (1:1 matches) between two schemas. However, relationships between real-world schemas involve many complex matches besides 1:1 matches. At present, there are few methods can discover complex matches, such as iMAP, but they have bad matching efficiency, because the candidate matches space is so large which they need searching. A complex schema matching system called CSM is introduced in this paper. Firstly it can filter unreasonable matches on data types and values by preprocessor and clustering processor, and employs a set of special-purpose searchers in match generator to explore a specialized portion of the search space and discovers 1:1 and complex matches. Then it estimates candidate matches and selects optimal candidate matches by using similarity estimator and match selector respectively. Finally, according to the problem that there are opaque columns in the schemas being matched, it can apply complementary matcher to discover matching relations between opaque columns further more. Thereby it can discover more general, reasonable matching pairs. Experiments show that, CSM does not only discover matches between schemas roundly, but also improve the matching recall and precision in practice.
Mobile IPv6 (MIPv6) allows mobile devices to be always addressed by its home address. This paper describes a micro-mobility based test-bed development with enhanced MIPv6 features including multicast function and hier...
详细信息
Mobile IPv6 (MIPv6) allows mobile devices to be always addressed by its home address. This paper describes a micro-mobility based test-bed development with enhanced MIPv6 features including multicast function and hierarchical design. The test-bed is hardware and software based comprising of five Personal computers (PCs) and one laptop. The laptop represents the Mobile Node (MN) while the functions of the PCs are as follows;two as Access Points (AP), one as Home Agent (HA), and the other two as foreign Multicast Router (MR) and Correspondent Node (CN) respectively. This test-bed is used to analyze handover delay, packet delay, packet loss, throughput and overall throughput in real wireless environment for conventional handover and enhanced MIPv6 handover scenarios. The results show the enhanced handover scheme reduces handover delay 94.32% (4.35s-0.2s), packet delay by 84.43% (0.7s-0.109 s), packet loss from 44 to 0 packet while the throughput and overall throughput were increased by approximately 117.34% and 124.3% respectively over the conventional system. Finally, it can be concluded that the proposed scheme gives advantages of higher throughput, zero packet loss and lower delays and can significantly improve micro-mobility performance of 3G, 4G and beyond mobile communication systems.
Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and ma...
详细信息
Most existing overlay multicast approaches refuse to consider any network layer support no matter whether it is available or not. This design principle greatly increases the complexity of the routing algorithms and makes the overlay topologies incompatible with the underlying network. To address these issues, topology-aware overlay multicast over IP multicast networks (TOMIMN) was proposed as a novel overlay multicast protocol, which exploits the cooperation between end-hosts and IP multicast routers to construct a topology-aware overlay tree. Through a little modification to protocol independent multicast sparse mode (PIM-SM), a multicast router is able to receive registration from nearby group members and redirect passing-by join requests to them. Due to the multicast router's support, TOMIMN organizes its group members into an overlay multicast tree efficiently, which matches the physical network topology well.
SIP-based Internet Telephony is an increasingly popular communication system that is used by various users and organizations. Most of deployments are based on client/server model in traditional SIP system. Especially,...
详细信息
ISBN:
(纸本)9781605580890
SIP-based Internet Telephony is an increasingly popular communication system that is used by various users and organizations. Most of deployments are based on client/server model in traditional SIP system. Especially, conferencing function is used for voice/video conference include file transfer and share remote applications through internet network. The conferencing system has an association between SIP user agents (Participants) and central point of control (Focus). The functionalities of SIP conference are organized in a centralized manner and heavily rely on dedicated servers. And it has some drawbacks to make the conferencing system is not reliable and scalable when participants increase. Peer-to-Peer (P2P) is another model different from client/server model. Every peer plays an equally important role in the network. P2P network is self-organized architecture, does not require any server in the network and hence make a good solution to those problems mentioned in above. In this paper, we describe the architecture designed to construct Peer-to-Peer (P2P) network collaborating with existing traditional SIP for conferencing system. The details in this paper include the operations of how to create, join, leave and terminate the conference in P2P-SIP conference network. We have shown that our proposed scheme compared to other recently schemes is more attractive in terms of scalability (e.g. based on pure P2P), working with traditional SIP, as well as interactive communication approach for all SIP clients and extend function join our P2P-SIP conference. Copyright 2008 ACM.
network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended of Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an ...
详细信息
ISBN:
(纸本)9781605581279
network Mobility (NEMO) Basic Support protocol is an extension Mobile IPv6. NEMO signaling is performed with extended of Mobile IPv6 messages. NEMO Basic Support protocol is concerned with managing the mobility of an entire network, it provides for devices or vehicles which move to another point of attachment to the Internet. NEMO can maintain sessions established between nodes on the mobile network and the global Internet after the Mobile Router (MR) changes its point of attachment. However, NEMO uses a bi-directional tunnel between the MR and its Home Agent (HA), resulting in a pinball route between 2 nodes. In addition, nested mobile networks will further increase the sub-optimality of routing, causing problems for some application. This proposed solution decreases packet delay, network resource usage and processing delay. Also, the bi-directional tunnel can be avoided, and the level of nesting of mobile networks does not increase packet overhead. This solution only requires modification of the MR. Copyright 2008 ACM.
Prostate cancer is one of the leading causes of cancer death for men. However, early detection before cancer spreads beyond the prostate can reduce the mortality. Therefore, in vivo imaging techniques play an importan...
详细信息
ISBN:
(纸本)9781424439317
Prostate cancer is one of the leading causes of cancer death for men. However, early detection before cancer spreads beyond the prostate can reduce the mortality. Therefore, in vivo imaging techniques play an important role to localize the prostate cancer for treatment. Although magnetic resonance imaging (MRI) has been proposed to localize prostate cancer, the studies on automated localization with multispectral MRI have been limited. In this study we propose combining the pharmacokinetic parameters derived from DCE MRI with T2 MRI and DWI. We also propose to use relevance vector machines (RVM) for automatic prostate cancer localization, compare its performance to support vector machines (SVM) and show that RVM can produce more accurate and more efficient segmentation results than SVM for automated prostate cancer localization with multispectral MRI.
Functional improvements to mobile terminals have made possible the spread of multimedia information delivery services. Especially for sports, a service that extracts important scenes and reports them to users has beco...
详细信息
Recently it has been predicted that materials with exceptionally strong optical activity may also possess a negative refractive index, allowing the realization of superlenses for super-resolution imaging and data stor...
详细信息
Recently it has been predicted that materials with exceptionally strong optical activity may also possess a negative refractive index, allowing the realization of superlenses for super-resolution imaging and data storage applications. Here we demonstrate experimentally and numerically that a chirality-induced negative index of refraction is possible. A negative index of refraction due to three-dimensional chirality is demonstrated for a bilayered metamaterial based on pairs of mutually twisted planar metal patterns in parallel planes, which also shows negative electric and magnetic responses and exceptionally strong optical activity and circular dichroism. Multilayered forms of the metamaterial are found to be suitable for use as ultrathin polarization rotators and circular polarizers for practical applications.
Learning video system is used in distance learning programs to deliver pre-recorded lectures. In this paper, we start our discussion on a multimedia presentation recording system which we had developed. We then presen...
详细信息
暂无评论