Top-k keyword and top-k document extraction are very popular text analysis techniques. Top-k keywords and documents are often computed on-the-fly, but they exploit weighted vocabularies that are costly to build. To co...
详细信息
In this paper we consider the influence of parametric perturbations on the maximal Lyapunov exponent of the discrete time-varying system. The main result states that the exact upper movability boundaries of the greate...
详细信息
More than 50% of the motorcycle accidents are fatal for the rider. 70% of those are due to the time needed for the emergency service to arrive at the accident. This leads us to a necessity in finding a device able to ...
详细信息
This paper concerns solvers for time fractional differential equations in Matlab and Octave. The main analysis revolves around a time step size adaptive solver basing on the numerical method called SubIval. The basis ...
详细信息
This paper concerns solvers for time fractional differential equations in Matlab and Octave. The main analysis revolves around a time step size adaptive solver basing on the numerical method called SubIval. The basis of SubIval is explained and formulae for the step size adaptivity are given. The solver is compared with others basing on: fractional linear multistep methods, product integration rules and the Grunwald-Letnikov approximation.
RBAC (Role-based access control) is an efficient method for sharing objects between different groups of users. If RBAC is implemented using ABE (Attribute Based Encryption), then the resulting system enforces access c...
详细信息
RBAC (Role-based access control) is an efficient method for sharing objects between different groups of users. If RBAC is implemented using ABE (Attribute Based Encryption), then the resulting system enforces access control indirectly, through cryptography. We propose a new multi-user system based on Cryptographically Enforced RBAC. To improve performance, our system combines existing work on Cryptographically Enforced RBAC with symmetric cryptography. From the best of our knowledge, we are the first to implement and experimentally evaluate the feasibility of such a system, which was previously only analyzed theoretically. We describe the architecture of our system, its implementation and evaluate performance. Our solution can be used to implement secure storage in clouds where the service provider is untrusted.
The non-binary(NB) Irregular Repeat Accumulate(IRA) codes, as a subclass of NB LDPC codes, potentially have an excellent error-correcting performance. They are also known to provide linear complexity of encoding, but ...
详细信息
The non-binary(NB) Irregular Repeat Accumulate(IRA) codes, as a subclass of NB LDPC codes, potentially have an excellent error-correcting performance. They are also known to provide linear complexity of encoding, but the basic encoding method with the serial rate-1 accumulator significantly limits the encoder throughput. Then the objective of the research presented in this paper is to develop an encoding method pro- viding significantly increased throughput of an NB-IRA encoder altogether with a flexible code construction methods for the structured(S-NB-IRA) codes eligible for the proposed encoding method. For this purpose, we reformulate the classic encoding algorithm to fit into the partial parallel encoder architecture. We propose the S-NB-IRA encoder block diagram and show that its estimated throughput is proportional to the submatrix size of the parity check matrix, which guarantees a wide complexity- throughput tradeoff. Then, in order to facilitate the S-NB-IRA coding systems design, we present a computer search algorithm for the construction of good S-NB-IRA codes. The algorithm aims at optimizing the code graph topology along with selecting an appropriate non-binary elements in the parity check matrix. Numerical results show that the constructed S-NB-IRA codes significantly outperform the binary IRA and S-IRA codes, while their performance is similar to the best unstructured NB-LDPC codes.
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Theref...
详细信息
ISBN:
(纸本)9781509054442
The development of Linux is one of the most prominent examples of free and open-source software collaboration. The kernel is used in many projects including Android which has over 82% in market share worldwide. Therefore, Linux's kernel security has a lot of impact on IT&C industry. This paper presents an audit solution over the Linux kernel in order to discover security vulnerabilities. Therefore, fuzzing campaigns are performed through system calls. This choice was made due to the fact that system calls are the natural way user space communicates with the kernel space and a real life scenario can be reproduced.
Creativity tasks require specific imagery, memory and semantic processes, as it has been revealed by various neuroscientific studies. There is significant evidence that an increase of spectral power in the EEG alpha b...
详细信息
Purpose - The main aim of this study was a preparation development of dopant solution (DS) which can be deposited by a spray-on method and subsequently allows obtaining the no emitter layer with surface resistance in ...
详细信息
The paper presents stages of creating a measurement system for a light-weight electric vehicle of the Silesian Greenpower team. The aim of the work was to design a measuring device and mobile application for drivers a...
The paper presents stages of creating a measurement system for a light-weight electric vehicle of the Silesian Greenpower team. The aim of the work was to design a measuring device and mobile application for drivers and the team. The system itself consists of a measuring device, applications for Android and Windows. The purpose of the device was to provide information about the car in real time. The collected data is saved and displayed on the driver's phone. At the same time, the data is stored in a database, which allows the whole team to observe current parameters. Working of the measurement system has been described in the paper. Screenshots from individual applications, a specification of selected sensors and source code of the created applications have been presented. The summary of the project are graphs showing the smooth operation of the measurement system during races taking place on the Rockingham circuit in the UK.
暂无评论