This paper proposes a new ID-based cryptographic scheme for implementing public-key cryptosystem and signature. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to...
详细信息
A neural-network-based approach to decomposing surface EMG signals into a multitude of single muscle-fiber action potentials (SFAP) is presented. This decomposition is done to yield the signal forms of the SFAPs and t...
详细信息
A neural-network-based approach to decomposing surface EMG signals into a multitude of single muscle-fiber action potentials (SFAP) is presented. This decomposition is done to yield the signal forms of the SFAPs and to allow for localizing the particular SFAPs relative to the recording (surface) electrodes. The goal of this approach is to allow the physician or medical researcher to observe the waveforms of the electrical activity and to localize SFAPs below the surface of the skin in a noninvasive manner and without discomforting the patient, as is important for several neurological diagnostic purposes. The approach uses a Hopfield neural network in combination with a Kohonen network for discrimination and a conventional computer correlation algorithm.< >
Several different approaches are discussed for implementing conversations in loosely coupled distributed computer systems (DCSs). Important implementation factors considered include the control of exits of processes o...
详细信息
Several different approaches are discussed for implementing conversations in loosely coupled distributed computer systems (DCSs). Important implementation factors considered include the control of exits of processes on completion of their conversation tasks and the approach to execution of the conversation acceptance test. Two different exit control strategies, one in a synchronous manner and the other in an asynchronous manner, and three different approaches to execution of the conversation acceptance test, centralized, decentralized, and semi-centralized, are examined and compared in terms of system performance and implementation cost. The effectiveness of these execution approaches also depends on the way conversations are structured initially by program designers. Therefore, the two major types of conversation structures, name-linked recovery block and abstract data type conversations are examined to analyze which execution approaches are the most efficient for each conversation structure. These results provide guidelines for implementing conversations in loosely coupled DCSs.< >
A novel ID-based cryptographic scheme for implementing a public-key cryptosystem and signature is proposed. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to cho...
详细信息
A novel ID-based cryptographic scheme for implementing a public-key cryptosystem and signature is proposed. Instead of generating and publishing a public key for each user, the ID-based scheme permits each user to choose his/her name or network address as his/her public key. This eliminates the needs of a large public field and the exchange of private or public keys. The major advantage of the ID-based cryptosystem based on this scheme over other published ID-based cryptosystems is that the number of users can be extended to t*L users without degrading the system's security even when users conspire, where L is the number of the system's secrets, and t is the number of factors in p-1, where p is a large prime number.< >
A password authentication mechanism based on the public-key distribution cryptosystem is proposed. The scheme uses an authentication table to replace the traditional password file. With this scheme, even if the authen...
详细信息
A password authentication mechanism based on the public-key distribution cryptosystem is proposed. The scheme uses an authentication table to replace the traditional password file. With this scheme, even if the authentication table is comprised, the system security is preserved. The user's password is effectively bound to the user's identification in a timely, efficient, and simple manner.< >
We propose that short-period doping superlattices are suitable for the enhancement of a third-order susceptibility arising from free carriers in nonparabolic energy subbands. The inherent advantage lies in the ability...
We propose that short-period doping superlattices are suitable for the enhancement of a third-order susceptibility arising from free carriers in nonparabolic energy subbands. The inherent advantage lies in the ability to simply engineer the superlattice potential profile, yielding control of miniband energy dispersion. We consider short-period GaAs doping superlattices composed of uniformly doped donor and acceptor layers, and planar-doped n- and p-type monolayers separated by intrinsic regions. Calculations of the electronic structure of compensated and n-type noncompensated n-i-p-i superlattices incorporating miniband dispersion at nonzero temperature are reported. We show that small modulations of the superlattice potential lead to large subband nonparabolicities and we calculate a twentyfold improvement in the third-order susceptibility over bulk GaAs at room temperature, comparable to that predicted for GaAs/AlGaAs compositional superlattices.
This paper documents an experiment performed by The Johns Hopkins University Applied Physics Laboratory to measure the effect of inserting a data bus into a combat system. The experiment was conducted at the Aegis Com...
详细信息
This paper documents an experiment performed by The Johns Hopkins University Applied Physics Laboratory to measure the effect of inserting a data bus into a combat system. The experiment was conducted at the Aegis computer Center located at the Naval Surface Weapons Center in Dahlgren, Virginia (NSWC/DL). The purpose of the experiment was to determine whether or not the Aegis Weapon System (the core of the Aegis Combat System) could be operated with a portion of its point-to-point interelement cables replaced by a data bus. The data bus chosen for the experiment employs message broadcasting with receiver selection. A primary goal of the experiment was to minimize the amount of Aegis computerprogram changes required to accommodate the data bus. The results presented in this paper will show that the experiment was a success. Key certification tests were passed with no computerprogram changes to the tactical elements and minimal changes in the Aegis tactical executive (ATES) program (less than 110 words changed).
The methods of impedance or admittance measurements are discussed for a variety of biological cells. The aim of this paper is the description of the techniques of measurements and the analysis of systematic errors ari...
详细信息
The methods of impedance or admittance measurements are discussed for a variety of biological cells. The aim of this paper is the description of the techniques of measurements and the analysis of systematic errors arising from electrode arrangements and measuring systems. Detailed discussion on the nature of membrane admittance of biological cells can be found elsewhere.
Advances in technology coupled with the inefficiency of the conventional von-Neumann type architecture in handling database systems have motivated the design and implementation of the so called database machines. Unfo...
A tutorial is presented on the applications of signal and image processing to medicine that covers both one- and multidimensional signals, such as EEG, ECG, IR, ultrasound signals, etc., and two- and three-dimensional...
详细信息
A tutorial is presented on the applications of signal and image processing to medicine that covers both one- and multidimensional signals, such as EEG, ECG, IR, ultrasound signals, etc., and two- and three-dimensional images, such as CAT scanners, MRI magnetic resonance imaging, ultrasound images, holographic images, etc. The analysis problems covered range from the inverse scattering problem through signal/image enhancement in noise and filtering, parameter identification, pattern discrimination and recognition, coding, and data reduction to visualization and 3-D manipulation.< >
暂无评论