Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains...
详细信息
Wireless sensor networks have received a great attention since they emerged as new ways of communicating and distributing information in wireless network. However the security aspect of wireless sensor network remains an issue, namely authentication, key management and secure localization. Since the communication of wireless sensor is on broadcast basis, researchers are focusing on how to design an efficient authentication scheme since the data might lost during the transmission and this is crucial for entity authentication prior the actual communication. Entity or user authenticity is important to avoid forgery and replay attack. This paper will focus on authentication by investigating three authentication schemes based on user authentication for Wireless Sensor Network. We identify their weakness and we finally introduce a new scheme which is based on identity-bits commitment for authentication that overcomes problems identified in studied schemes. A basic security analysis is followed to support the strength of the scheme in a real deployment.
In this paper, a method for hand posture recognition, which is robust for hand posture changing in an actual environment, is proposed. Conventionally, a data glove device and a 3D scanner have been used for the featur...
详细信息
Sensor network terminals are installed in large numbers in the field and transmit data periodically by radio. Such terminals must be miniaturized, and save power so that each device can operate by battery for several ...
详细信息
Sensor network terminals are installed in large numbers in the field and transmit data periodically by radio. Such terminals must be miniaturized, and save power so that each device can operate by battery for several years. As one way to satisfy these two conditions, in this research we propose a terminal design which eliminates the receiver circuit. Because there is no receiver circuit, circuitry can be miniaturized, and power can be saved because there is no need to consume power to receive signals. However, the terminals cannot perform carrier detection and reception acknowledgement because there is no receiver circuit. We propose following two new protocols to solve this problem.
One of the major challenges in developing autonomous systems is to make them able to recognize and categorize objects robustly. However, the appearance-based algorithms that are widely employed for robot perception do...
详细信息
One of the major challenges in developing autonomous systems is to make them able to recognize and categorize objects robustly. However, the appearance-based algorithms that are widely employed for robot perception do not explore the functionality of objects, described in terms of their affordances. These affordances (e.g., manipulation, grasping) are discriminative for object categories and are important cues for reliable robot performance in everyday environments. In this paper, we propose a strategy for object recognition that integrates both visual appearance and grasp affordance features. Following previous work, we hypothesize that additional grasp information improves object recognition, even if we reconstruct the grasp modality from visual features using a mapping function. We considered two different representations for the grasp modality: (1) motor information of the hand posture while grasping and (2) a more general grasp affordance descriptor. Using a multi-modal classifier we show that having real grasp information significantly boost object recognition. This improvement is preserved, although to a lesser extent, if the grasp modality is reconstructed using the mapping function.
This study proposed a new language which offers the possibility to query Geographic Information systems (GIS) with visual queries. Following the progress of the society and the development of technology, there is much...
详细信息
作者:
Ougouti, N.S.Belbachir, H.Amghar, Y.Benharkat, N.A.System
Signal and Data Laboratory Departement of Computer Science Faculty of Science University of Science and Technology Oran Mohamed Boudiaf USTO P.O. Box 1505 El MNaouer Oran Algeria LIRIS
UMR 5205 Insa of Lyon 7 Avenue Jean Capelle F-69621 Villeurbanne CEDEX France
Access to distributed, heterogeneous and autonomous information sources, becomes possible with the Internet. These information sources are distinguished by the nature of information, namely, the ontological domain to ...
详细信息
A magnetic shielding type superconducting fault current limiter (MSFCL) has undesirable leakage impedance and thus the voltage drop relating to the leakage impedance occurs in the steady-state operation (the standby c...
详细信息
ISBN:
(纸本)9781424417353
A magnetic shielding type superconducting fault current limiter (MSFCL) has undesirable leakage impedance and thus the voltage drop relating to the leakage impedance occurs in the steady-state operation (the standby condition of a fault). Therefore, this paper proposes a divided MSFCL model to reduce the value of the leakage impedance in the steady-state operation. The four-divided model of MSFCL was actually constructed. Then experiments were carried out to demonstrate the advantage of the divided model. Moreover, the divided model was compared with a non-divided model with the same turns of the coils. We confirmed the advantage of the divided model through these experiments.
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also ea...
详细信息
ISBN:
(纸本)9781601321190
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information so. In this paper we will overview the use of data hidden techniques in digital images. In particular we will describe on how one can use the human vision system and pure Steganography to increase the she of the data that we want to embed in the image. We will focused on the property of human vision system that help to increase the amount of data hidden in the bitmap (.bmp) image practically, and improve the work by given result and make a brief discussion on this result Quality of Image vs. Quantity of Data hidden in the Image represents a challenge, in fact quality of image and the quantity of data hidden work in reverse side once we try to increase the amount of data hidden the image quality will be effected, in this research paper we will try to study the impact of increase the data hidden on the quality of image, the author test the result with a specialist on the area of image processing as a survey to insure the quality of the image being a subject for suspecting about a fabrications or distortions, in the next stage we will work on the 5 * LSB m a special images or specific areas.
Severe image skewness, which is inevitable in text image acquiring, increases difficulties in image segmentation and decreases character recognition accuracy. In this paper, an improved skew angle estimation technique...
详细信息
ISBN:
(纸本)1934272620
Severe image skewness, which is inevitable in text image acquiring, increases difficulties in image segmentation and decreases character recognition accuracy. In this paper, an improved skew angle estimation technique is presented. In addition, a novel technique of detecting and extracting text from camera-captured images is proposed to solve the following major obstacles in realizing the visual translation: low resolution, various brightness or grayscale, and perspective distortion, and moreover, involuted layouts and interaction of content mixed with the colorful background. As a result, the higher accuracy of camera-based visual translation is witnessed from the obtained testing results.
A wide range of steganography techniques has been described in this literature. Our paper sets the main focus on the evaluation of transparency, robustness and capacity of the embedding function of Substitution Techni...
详细信息
ISBN:
(纸本)9781615676576
A wide range of steganography techniques has been described in this literature. Our paper sets the main focus on the evaluation of transparency, robustness and capacity of the embedding function of Substitution Techniques of digital audio steganography algorithms. Here, beside the evaluation of embedding parameters for the existing techniques, two problems -weaknesses- of Substitution Techniques are investigated which if they could be solved, the large capacity - strength- of Substitution Techniques would be practical.
暂无评论