We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut...
详细信息
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authority in key policy attribute-based encryption scenario,and then give a *** addition,our scheme is shown to be secure in the standard model under the modified Bilinear Decisional Diffie-Hellman (mBDDH) assumption.
The importance of the process point of view is not restricted to a specific enterprise sector. In the field of health, as a result of the nature of the service offered, health institutions' processes are also the ...
详细信息
Two-axis pan and tilt systems are widely used in surveillance applications for high accuracy positioning of sensor payloads such as cameras and laser pointers. In order to develop advanced control algorithms to improv...
详细信息
Two-axis pan and tilt systems are widely used in surveillance applications for high accuracy positioning of sensor payloads such as cameras and laser pointers. In order to develop advanced control algorithms to improve the performance of these systems, a model of the system must be developed. This model should include the dynamics of the system to include effects such as compliance and account for friction effects in the drive. This paper discusses the development of the overall model of the system using National Instruments LabVIEW, and in particular, the models for friction and the drive train that will be used.
One of the important challenges in robotics is the automatic synthesis of provably correct controllers from high level specifications. One class of such algorithms operates in two steps: (i) high level discrete contro...
详细信息
One of the important challenges in robotics is the automatic synthesis of provably correct controllers from high level specifications. One class of such algorithms operates in two steps: (i) high level discrete controller synthesis and (ii) low level continuous controller synthesis. In this class of algorithms, when phase (i) fails, then it is desirable to provide feedback to the designer in the form of revised specifications that can be achieved by the system. In this paper, we address the minimal revision problem for specification automata. That is, we construct automata specifications that are as “close” as possible to the initial user intent, by removing the minimum number of constraints from the specification that cannot be satisfied. We prove that the problem is computationally hard and we encode it as a satisfiability problem. Then, the minimal revision problem can be solved by utilizing efficient SAT solvers.
With Internet environment is getting optimized and users preferring mobile communications, Cloud Service Providers (CSP) aim to provide services to users depending on their geographic locations with higher service ava...
详细信息
ISBN:
(纸本)9781467321723
With Internet environment is getting optimized and users preferring mobile communications, Cloud Service Providers (CSP) aim to provide services to users depending on their geographic locations with higher service availability and faster access speed. Mobile cloud computing falls into this category, where mobile users can move around and request cloud services at any given geographic locations. To build such a geographic-based mobile cloud services, an effective mobile cloud resource allocation and service request scheduling scheme is highly desired. To this end, the presented service request scheduling scheme takes a comprehensive approach by considering system parameters from both CSP and mobile users such as computation, energy, connectivity, service payment, mobile users' satisfaction, etc. Finally, the performance evaluation of the proposed scheduling scheme is evaluated through simulations where the results show that the presented scheme achieves better system overall gain compared to traditional over-provisioning approaches.
As cloud services need a fair pricing for both service providers and customers. If the price is too high, the customer may not use it, if the price is too low, service providers have less incentive to develop services...
详细信息
ISBN:
(纸本)9781467328920
As cloud services need a fair pricing for both service providers and customers. If the price is too high, the customer may not use it, if the price is too low, service providers have less incentive to develop services. This paper proposes a novel pricing framework for cloud services using game theory (Cournot Duopoly, Cartel, and Stackelberg models) and data mining techniques (clustering and classification, e.g., SVM (Support Vector Machine)) to determine optimal prices for cloud services. The framework is dynamic because the price is determined based on recent usage data and available resources, it is also intelligent as it takes into various economic models into consideration, it is benign because it considers two conflicting parties, service providers and consumers, into consideration at the same time, and it is customizable based on various pricing strategies proposed by service providers and usage patterns as exhibited by consumers. Linear regression is used in various game theory models to determine the optimal price. A global pricing union (GPU) framework is proposed to achieve the best practice of game theory models. Based on the proposed technique, this paper applies this pricing framework to a case study in cloud services, and demonstrates that the prices obtained meet the requirement of traditional supply-demand analysis. In other words, the price obtained is good enough.
Cloud computing environments provide a resource pool for customers for their processing, storage and networking needs. It is necessary for customers to choose desirable configuration from vast resources available in t...
详细信息
Cloud computing environments provide a resource pool for customers for their processing, storage and networking needs. It is necessary for customers to choose desirable configuration from vast resources available in the cloud. This paper proposes a heuristic model to choose a cloud configuration for efficient use. Trend analysis in data mining is used to predict the future trend and assist provisioning. The model is experimented with Intel power 32 core machine and in Azure cloud. Both environments demonstrated that the proposed model provided effective solutions.
Inverter fed induction machine drives have become one of the most important part in industrial applications. The devices are usually operated near or at the rated vales. Additionally high dynamic operations, overload ...
详细信息
Inverter fed induction machine drives have become one of the most important part in industrial applications. The devices are usually operated near or at the rated vales. Additionally high dynamic operations, overload cycles and the fast switching inverter are putting additional stress to all machines components. The stator winding system is one of the most critical components. Faults in the winding system of a machine can cause a dramatic damage due to their fast developing behavior. An early detection of winding faults can reduce these consequences. In this paper a method is presented to achieve reliable fault detection on stator winding faults focused on application at higher speed levels where immediate detection is imperative. Higher inverter modulation indexes provide the possibility to estimate the transient leakage inductance in each PWM modulation cycle. This parameter contains the information on machine asymmetries. Specific signal processing steps provide a high sensitive fault indicator.
In this study, we investigate the break index labeling problem with a syntactic-to-prosodic structure conversion. The statistical relationship between the mapped syntactic tree structure and prosodic tree structure of...
详细信息
In this study, we investigate the break index labeling problem with a syntactic-to-prosodic structure conversion. The statistical relationship between the mapped syntactic tree structure and prosodic tree structure of sentences in the training set is used to generate a Synchronous Tree Substitution Grammar (STSG) which can describe the probabilistic mapping (substitution) rules between them. For a given test sentence and the corresponding parsed syntactic tree structure, thus generated STSG can convert the syntactic tree to a prosodic tree statistically. We compare the labeling results with other approaches and show the probabilistic mapping can indeed benefit break index labeling performance.
Histopathology is a microscopic anatomical study of body tissues and widely used as a cancer diagnosing method. Generally, pathologists examine the structural deviation of cellular and sub-cellular components to diagn...
详细信息
暂无评论