Security plays an especially important role for application of wireless sensor network due to the vulnerability of network. In this paper, we propose and implement one approach of mutual authentication scheme with key...
详细信息
Security plays an especially important role for application of wireless sensor network due to the vulnerability of network. In this paper, we propose and implement one approach of mutual authentication scheme with key agreement for wireless sensor network, which is significant to security provisioning in wireless sensor network with resource limitations. Then we discuss new sensor node security join process in the network. Based upon the provision concept, the proposed scheme does not require public keys for sensor nodes such that the additional cost for certificates can be reduced. Finally, test results show that these security methods may be used to realize the security and reliability of the wireless sensor networks.
The problem of the distributed identification of a macroscopic first-order traffic model, viz. the Cell Transmission Model (CTM), is considered in the paper. The parameters to be identified characterize the dynamics o...
详细信息
ISBN:
(纸本)9781457710957
The problem of the distributed identification of a macroscopic first-order traffic model, viz. the Cell Transmission Model (CTM), is considered in the paper. The parameters to be identified characterize the dynamics of the density in different sections of the freeway (cells). We explore different distributed identification schemes. The purposes of the approach are mainly to obtain good prediction models through the minimization of the one-step ahead prediction error of the densities of the cells, and to reduce the computational time and the effort required to perform the identification. The methodology is validated relying on real-life data measured on a portion of the A12 freeway in The Netherlands. An evaluation of the performance of the identified model used as a set of virtual sensors in different scenarios is presented.
Brain computer Interface (BCI) provides a direct communication channel from brain to peripheral equipment. Common Spatial Patterns (CSP) is wildly used to extract features for electroencephalogram (EEG). However, basi...
详细信息
In order to capture a selective packaging mechanism among eight RNA segments in influenza A viruses, we assume that almost nucleotides in the positions of packaging signals must be simultaneously changed. In this pape...
详细信息
ISBN:
(纸本)9781467327428
In order to capture a selective packaging mechanism among eight RNA segments in influenza A viruses, we assume that almost nucleotides in the positions of packaging signals must be simultaneously changed. In this paper, we formulate such positions as correlated mutations based on a joint entropy ratio, develop a method of finding all of them by using set enumeration with pruning and apply to nucleotide sequences among RNA segments in H3N2 influenza viruses.
The length of signal pulses is finite in practical quantum key distribution. The finite-key analysis of an unconditional quantum key distribution is a burning problem, and the efficient quantum key distribution protoc...
详细信息
The length of signal pulses is finite in practical quantum key distribution. The finite-key analysis of an unconditional quantum key distribution is a burning problem, and the efficient quantum key distribution protocol suitable for practical implementation, measurement-device-independent quantum key distribution (MDI QKD), was proposed very recently. We give the finite-key analysis of MDI QKD, which removes all detector side channels and generates many orders of key rate higher than that of full-device-independent quantum key distribution. The secure bound of the ultimate key rate is obtained under the statistical fluctuations of relative frequency, which can be applied directly to practical threshold detectors with low detection efficiency and highly lossy channels. The bound is evaluated for reasonable values of the observed parameters. The simulation shows that the secure distance is around 10 km when the number of sifted data is 1010. Moreover the secure distance would be much longer in practice because of some simplified treatments used in our paper.
This issue marks the beginning of the IEEE Transactions on Neural Networks and Learning Systems (TNNLS). By adding «Learning Systems» to the title, we now state explicitly the scope of the TRANSACTIONS to in...
详细信息
Approximate Entropy (ApEn) is a regularity statistic that quantifies the unpredictability of fluctuations in a time series and can classify complex systems. This study, ApEn is used to extract features from motor imag...
详细信息
Quantum mechanics is potentially advantageous for certain information-processing tasks, but its probabilistic nature and requirement of measurement backaction often limit the precision of conventional classical inform...
详细信息
Quantum mechanics is potentially advantageous for certain information-processing tasks, but its probabilistic nature and requirement of measurement backaction often limit the precision of conventional classical information-processing devices, such as sensors and atomic clocks. Here we show that, by engineering the dynamics of coupled quantum systems, it is possible to construct a subsystem that evades the measurement backaction of quantum mechanics, at all times of interest, and obeys any classical dynamics, linear or nonlinear, that we choose. We call such a system a quantum-mechanics-free subsystem (QMFS). All of the observables of a QMFS are quantum-nondemolition (QND) observables; moreover, they are dynamical QND observables, thus demolishing the widely held belief that QND observables are constants of motion. QMFSs point to a new strategy for designing classical information-processing devices in regimes where quantum noise is detrimental, unifying previous approaches that employ QND observables, backaction evasion, and quantum noise cancellation. Potential applications include gravitational-wave detection, optomechanical-force sensing, atomic magnetometry, and classical computing. Demonstrations of dynamical QMFSs include the generation of broadband squeezed light for use in interferometric gravitational-wave detection, experiments using entangled atomic-spin ensembles, and implementations of the quantum Toffoli gate.
This paper gives new results on the design and experimental evaluation of an Iterative Learning control (ILC) law in a repetitive process setting. The experimental results given are from a gantry robot facility that h...
详细信息
This paper gives new results on the design and experimental evaluation of an Iterative Learning control (ILC) law in a repetitive process setting. The experimental results given are from a gantry robot facility that has been extensively used in the benchmarking of linear model based ILC designs. An example is also given to demonstrate that this new design offers much superior performance in comparison to some previous designs based on the Roesser model for 2D linear systems.
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean s...
详细信息
In this work, we propose a recursive local linear estimator (RLLE) for identification of nonlinear autoregressive systems with exogenous inputs, along with an analysis of its strong consistency and asymptotical mean square error properties. The performance of the proposed RLLE is verified by a simulation example.
暂无评论