Improving the safe WSN's real-time,energy consumption,and anti-leak is an important research *** on specific operations as addition,multiplication,and so *** homomorphic encryption can manipulate the ciphertext di...
详细信息
ISBN:
(纸本)9781509046584
Improving the safe WSN's real-time,energy consumption,and anti-leak is an important research *** on specific operations as addition,multiplication,and so *** homomorphic encryption can manipulate the ciphertext directly to get the correct results without *** fully homomorphic encryption's process of the decryption can be omitted,the safe WSN's characteristics such as real-time and so on can be improved *** management is an important problem of fully homomorphic encryption,in which the ability to anti-capture in WSN comes *** this paper,based on the calculation algorithm of two element symmetrical polynomials proposed by Blundo,we propose a pairwise key establishment scheme by introducing fully homomorphic encryption,which does not only prevent enemy intercepting information about polynomial relation,but also resist the large-scale node capture attack *** and experiments show that this scheme can totally meet the requirements of resource,energy consumption and so on of WSN,and improve the security of WSN at the meantime.
To improve the performance of real-time task scheduling and the utilization of the system resources in Cyber-Physical System,at the same time,to reduce the number of task switching,this paper improved traditional pree...
详细信息
ISBN:
(纸本)9781509046584
To improve the performance of real-time task scheduling and the utilization of the system resources in Cyber-Physical System,at the same time,to reduce the number of task switching,this paper improved traditional preemptive task scheduling,introduced the concept of buffer time and the guard time,made judgments when the task may need to switch to,according to the situation to retain the task which had lower priority but should not be suspended,and let the higher priority task wait for a ***,our research verifies the performance of the algorithm by examples and simulation experiments,demonstrates that the algorithm can optimize the performance of CPS,avoids the jitter caused by frequent task switching and its adverse effects on system performance,reduces the number of task switching,and improves the utilization of resources within the system to some extent.
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user *** significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security ***,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user *** paper provides an in-depth analysis of the effects of DoH on *** discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security ***,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security.
In this paper,we study the process of physical state transition in the embedded *** key to dramatically increase the efficiency of system is important to meet the deadline and the quality of task process for actors wh...
详细信息
ISBN:
(纸本)9781509046584
In this paper,we study the process of physical state transition in the embedded *** key to dramatically increase the efficiency of system is important to meet the deadline and the quality of task process for actors which were released the real-time events and were driven to transfer the state of the *** address these two goals at the same time,we defined a real-time events label of the value constraint and clock constraint conditions,and established a super dense time model contained constraint *** on partial order model to simulate the state time sequence order,we proposed a real-time semantics of the state transition for embedded control *** embedded system state transition constraint while supporting the value constraint was proposed,and this model validation under the clock constraint of events,was ensured real-time operation in the process of execution sequence what has a certain event and *** example of laser gyroscope blocking threshold test system is performed to evaluate the performance of the feedback controller in-depth research which has the effect of value constraint for the state transition of systems.
Embedded system real time measurement and representation method is widely used in industrial CPS control system application,such as engine fault *** malfunction diagnostic methods,which filter the changes in measurabl...
详细信息
ISBN:
(纸本)9781509046584
Embedded system real time measurement and representation method is widely used in industrial CPS control system application,such as engine fault *** malfunction diagnostic methods,which filter the changes in measurable parameters through Kalman filter and then map them to changes in performance parameters of the engine via neural network,have the weaknesses in that the neural network has a slow convergence rate and the optimum is prone to local ***,proposes an approach using genetic algorithm,which stands out in finding global optimum,to refine BP neural *** approach uses global optimum to refine the initial and threshold values of the neural network,decreasing the times of neural network trainings,and thus reducing the training error and lowering the time of *** simulation shows that the approach is feasible,improves the real-timing and error precision of malfunction diagnosis,and therefore is highly valuable in applications.
In this contribution we introduce the Parallel Factor 2 (PARAFAC2) analysis as a novel method for the simultaneous detection and classification of neural action potentials. In order to measure these action potentials ...
作者:
Gierdziewicz, MaciejChair of Applied Computer Science
Faculty of Automation Electrical Engineering Computer Science and Biomedical Engineering AGH University of Science and Technology Al. Mickiewicza 30 Cracow30-059 Poland
In this paper the generation of a geometrical model for simulation of the transport process inside the bouton of the biological neuron is considered. The transport is modeled in three-dimensional space by using nonlin...
详细信息
Due to the direct contact between electrode and scalp, dry EEG electrodes are exposed to increased mechanical wear compared to conventional gel-based electrodes. However, state-of-the-art commercial cap systems common...
详细信息
The intense incursion of the Internet of Things (IoT) into all areas of modern life has led to a need for a more detailed study of these technologies and their mechanisms of work. It is necessary to study mechanisms i...
详细信息
Focusing on the background of utilizing magnetic compass in the air-ground amphibious robot system,this paper explores error compensation of magnetic compass in the process of moving on the ground and the *** on the e...
详细信息
ISBN:
(纸本)9781509009107
Focusing on the background of utilizing magnetic compass in the air-ground amphibious robot system,this paper explores error compensation of magnetic compass in the process of moving on the ground and the *** on the error analysis on the air-ground amphibious robot magnetic compass,this paper applies the ellipsoid fitting algorithm for error identification of this model coefficient and thus calibration of magnetic compass is realized in the ***,through the processing of three sets of data together with the comparison of the traditional empirical Calibration methods,the effectiveness of the proposed method is verified.
暂无评论