Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for ...
详细信息
ISBN:
(纸本)1601320914
Authentic program modification is very important for a multi-application smart card system since applications in the system are realized after the issuance of the smart card. In this paper, we propose a framework for such authentic program modification. In our framework, before issuing a smart card to an individual, the card issuer stores a unique long bit string called PID on the card. From the PID, unique substrings (subPIDs) are generated and used for different authentication purposes. The program modification protocol utilizes the subPIDs along with a one-way hash function and a pseudo random number generator function to verify the identity of the parties and the authenticity of the program. Our proposed framework provides a simple and practical solution to the program modification problem by avoiding direct interaction between the card holder and the issuer. In addition, use of hash functions makes the implementation cost of smart cards low.
This article reports the first high time resolution measurements of gigantic jets from the Imager of Sprites and Upper Atmospheric Lightning (ISUAL) experiment. The velocity of the upward propagating fully developed j...
详细信息
This article reports the first high time resolution measurements of gigantic jets from the Imager of Sprites and Upper Atmospheric Lightning (ISUAL) experiment. The velocity of the upward propagating fully developed jet stage of the gigantic jets was ∼107 m s-1, which is similar to that observed for downward sprite streamers. Analysis of spectral ratios for the fully developed jet emissions gives a reduced E field of 400-655 Td and average electron energy of 8.5-12.3 eV. These values are higher than those in the sprites but are similar to those predicted by streamer models, which implies the existence of streamer tips in fully developed jets. The gigantic jets studied here all contained two distinct photometric peaks. The first peak is from the fully developed jet, which steadily propagates from the cloud top (∼20 km) to the lower ionosphere at ∼90 km. We suggest that the second photometric peak, which occurs ∼lms after the first peak, is from a current wave or potential wave-enhanced emissions that originate at an altitude of ∼50 km and extend toward the cloud top. We propose that the fully developed jet serves as an extension of the local ionosphere and produces a lowered ionosphere boundary. As the attachment processes remove the charges, the boundary of the local ionosphere moves up. The current in the channel persists and its contact point with the ionosphere moves upward, which produces the upward surging trailing jets. Imager and photometer data indicate that the lightning activity associated with the gigantic jets likely is in-cloud, and thus the initiation of the gigantic jets is not directly associated with cloud-to-ground discharges. Copyright 2009 by the American Geophysical Union.
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security of th...
详细信息
ISBN:
(纸本)9780889867598
In this paper, a novel approach is presented for multimedia information hiding using visual cryptography. The approach combines both the steganographic and cryptographic effect to improve the quality of security of the data. The technique provides three levels of security without reducing the payload and the image quality. In order to attain even better quality, an enhancement technique is proposed. The experiments done on various images and the results obtained showed the robustness of the technique.
With increasing defect density, microprocessors, especially the embedded caches, will encounter more faults. Adding spare resources to replace defective components is a widely accepted method for yield enhancement. In...
With increasing defect density, microprocessors, especially the embedded caches, will encounter more faults. Adding spare resources to replace defective components is a widely accepted method for yield enhancement. In this work, a repair method using content addressable memory combined with spare bits, as well as a novel fault injection method is proposed. With the proposed fault injection technique, various numbers and types of faults can be flexibly injected into the silicon. A wireless sensor network system using our self-repairable microprocessor (SRP) is developed to prove the effectiveness of the proposed technique.
A unicast video-on-demand (VOD) system is good at interactivity but bad at scalability. Many multicast schemes have been proposed to solve the scalability problem in recent years. However, the weakness of these scheme...
详细信息
The data analysis involves the performance of different tasks, which can be performed by many different techniques and strategies. This research emphasizes the performance of the Data Clustering task using the artific...
详细信息
ISBN:
(纸本)1601320728
The data analysis involves the performance of different tasks, which can be performed by many different techniques and strategies. This research emphasizes the performance of the Data Clustering task using the artificial neural network Self-Organizing Maps as the main artifact. SOM is an Artificial Neural Network based in a competitive unsupervised learning, what implies in the training being entirely guided by the data and the neurons of the map compete among themselves. This neural network has the ability to form mappings that quantify the data, preserving its topology. This work introduces a new methodology of data clustering since SOM, that considers the topological map generated by him and the data topology in the clustering process, once considers the neighborhood of the input data.
Complex technical systems, such as mechatronic systems, can exploit networking as well as the computational power available today to achieve an automatic improvement of the technical system performance at run-time thr...
详细信息
A novel digital redesign of the analog model-reference-based decentralized adaptive controller is proposed for the sampled-data large scale system consisting of N interconnected linear subsystems with actuator faults....
详细信息
ISBN:
(纸本)9780889867468
A novel digital redesign of the analog model-reference-based decentralized adaptive controller is proposed for the sampled-data large scale system consisting of N interconnected linear subsystems with actuator faults. The adaptation of the analog controller gain is derived by using the model-reference adaptive control theory based on Lyapunov method. In this paper, it is shown that the sampled-data decentralized adaptive control system is theoretically possible to asymptotically track the desired output with a specified performance even when actuator faults occur. Then, a method of actuator fault recovery is proposed. With the estimated faults, one can use the proposed input compensation method to solve actuator faults. In this paper, we also introduce a prediction-based digital redesign method to develop the corresponding sampled-data controller for the sampled-data decentralized adaptive control systems.
Nanometer technology is gradually being applied after deep submicron technology due to the rapid progress of the VLSI fabrication process. Recently, system- on-a-chip (SoC) based products are gaining more advantages s...
详细信息
We introduce a general framework for string kernels. This framework can produce various types of kernels, including a number of existing kernels, to be used with support vector machines (SVMs). In this framework, we c...
详细信息
ISBN:
(纸本)9781848161085
We introduce a general framework for string kernels. This framework can produce various types of kernels, including a number of existing kernels, to be used with support vector machines (SVMs). In this framework, we can select the informative subsequences to reduce the dimensionality of the feature space. We can model the mutations in biological sequences. Finally, we combine contributions of subsequences in a weighted fashion to get the target kernel. In practical computation, we develop a novel tree structure, coupled with a traversal algorithm to speed up the computation. The experimental results on a benchmark SCOP data set show that the kernels produced by our framework outperform the existing spectrum kernels, in both efficiency and ROC50 scores.
暂无评论