In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distributio...
详细信息
ISBN:
(纸本)9780889868021
In Internet, IP multicast has been used successfully to provide an efficient, best-effort delivery service for group communication applications. However, applications such as multiparty private conference, distribution of stock market information, pay per view and other subscriber services require secure multicast to protect integrity and confidentiality of the group traffic, and validate group member's authenticity. Providing secure multicast for group communication is problematic without a robust group key management. In this paper, we propose an anonymous group key management with ID-based Signature and secret sharing technologies to distribute a new group key securely to each participant of a group with only one rekey message whenever the group membership changes. The key management guarantees that a legal user, without revealing his/her real identity, can join a group after finishing the mutual authentication with the group initiator, and enforces the forward secrecy and backward secrecy.
The finger vein image acquired with an acquisition system should be properly aligned to proceed with comparing algorithm. However it is not easy to find control the points since the images are naturally blurred with a...
详细信息
In the classic use of P2P, e.g. file sharing, there is no concern about persistent peer identification, peer and content reputation and content authenticity. Security proposals currently found in technical literature ...
详细信息
In the classic use of P2P, e.g. file sharing, there is no concern about persistent peer identification, peer and content reputation and content authenticity. Security proposals currently found in technical literature try to adapt techniques from client-server architecture to P2P environments, which it is not the most appropriate approach. This work proposes applying public keys to identify peers. It allows creating a persistent identification scheme, without losing anonymity, even in a self-managed environment as P2P. Also, it applies digital signature to provide authenticity to the P2P content and to guarantee non-repudiation in the content transfer. In order to provide credibility to the non-certified content and public keys a reputation mechanism is applied. We have developed a prototype to show the benefits of this approach.
Electrical muscle stimulation demonstrates potential for restoring functional movement and for preventing muscle atrophy after spinal cord injury (SCI). To optimize delivery of electrical stimulation protocols, an acc...
详细信息
Electrical muscle stimulation demonstrates potential for restoring functional movement and for preventing muscle atrophy after spinal cord injury (SCI). To optimize delivery of electrical stimulation protocols, an accurate and easy-to-implement mathematical skeletal muscle model is essential. The existing models are either accurate but complex, making them hard to implement, such as the Hill-Huxley-type model, or simple but inaccurate, such as second order model. In this paper, we propose a Wiener-Hammerstein system to model the paralyzed skeletal muscle dynamics under electrical stimulus conditions. The proposed model has substantial advantages in identification algorithm analysis and implementation including computational complexity and convergence. Experimental data sets were collected on soleus muscles under 15 Hz frequency stimulation for fourteen subjects with SCI. The simulation results show that the proposed model outperforms the Hill-Huxley-type model not only in peak force prediction, but also in fitting performance for force output of each individual stimulation train.
High-frequency power Doppler imaging of angiogenesis can be challenging given the presence of small blood vessels and slow flow velocities. In the presence of substantial Doppler artifacts such as false-positive color...
详细信息
This paper introduces a granular, interval-based evolving modeling (IBeM) approach to develop system models from a stream of data. IBeM is an evolving rule-based modeling scheme that gradually adapts its structure (in...
详细信息
This paper introduces a granular, interval-based evolving modeling (IBeM) approach to develop system models from a stream of data. IBeM is an evolving rule-based modeling scheme that gradually adapts its structure (information granules and rule base) and rules antecedent and consequent parameters from data (inductive learning). Its main purpose is continuous learning, self-organization, and adaptation to unknown environments. The IBeM approach develops global model of a system using a fast, one-pass learning algorithm, and modest memory requirements. To illustrate the effectiveness of the approach, the paper considers actual time series forecasting applications concerning electricity load and stream flow forecasting.
The objective of this study is to introduce the concept of evolving granular neural networks (eGNN) and to develop a framework of information granulation and its role in the online design of neural networks. The sugge...
详细信息
The objective of this study is to introduce the concept of evolving granular neural networks (eGNN) and to develop a framework of information granulation and its role in the online design of neural networks. The suggested eGNN are neural models supported by granule-based learning algorithms whose aim is to tackle classification problems in continuously changing environments. eGNN are constructed from streams of data using fast incremental learning algorithms. eGNN models require a relatively small amount of memory to perform classification tasks. Basically, they try to find information occurring in the incoming data using the concept of granules and T-S neurons as basic processing elements. The main characteristics of eGNN models are continuous learning, self-organization, and adaptation to unknown environments. Association rules and parameters can be easily extracted from its structure at any step during the evolving process. The rule base gives a granular description of the behavior of the system in the input space together with the associated classes. To illustrate the effectiveness of the approach, the paper considers the Iris and Wine benchmark problems.
Topology control is one of the main techniques that can be used to decrease energy spenditure in wireless sensor networks. Although it has been the subject of much research, less attention has been devoted to study th...
详细信息
Topology control is one of the main techniques that can be used to decrease energy spenditure in wireless sensor networks. Although it has been the subject of much research, less attention has been devoted to study the effects of overhearing on topology control, i.e., the effects of the cost implied by nodes hearing transmissions even if these transmissions were not intended to them. In this paper we describe a distributed (localized) algorithm for topology control in wireless sensor networks. Our approach differs from previous work mainly in the sense that it takes the effects of overhearing into consideration and that it might eliminate more communication links from a given connectivity graph, and thus possibly assign lower transmission power to some nodes. This is done by eliminating so-called k-redundant edges, instead of eliminating only two redundant edges. We present the sketch of the proof of properties of the algorithm and simulation results.
Thread level parallelism and multi-core processors are current alternatives to increase performance of general-purpose applications. In the same way, networks-on-ohip (NoCs) are the main alternatives for supporting pa...
详细信息
ISBN:
(纸本)9781424438273
Thread level parallelism and multi-core processors are current alternatives to increase performance of general-purpose applications. In the same way, networks-on-ohip (NoCs) are the main alternatives for supporting packet throughput for the next generations of many-core processors. NPoC (network processor on chip) is a proposal to increase the performance of programmable NoC routers and multi-cluster NoC architectures using interleaved multithreading (IMT) technique. Therefore, the main goal of this paper is to present the design impact of interleaved multithreading for network processors on chip focusing on area and performance feasibility. Results show that NPoC-based router has an acceptable and similar area relative to a conventional NoC, and higher performance up to 7.1% than the same NPoC version without IMT.
This work presents a proposal for extending the role-based access control (RBAC) model to support activities that demand runtime mutability in their authorization attributes. Such activities cannot be subdivided in a ...
详细信息
ISBN:
(纸本)9781424434862
This work presents a proposal for extending the role-based access control (RBAC) model to support activities that demand runtime mutability in their authorization attributes. Such activities cannot be subdivided in a set of subtasks executed sequentially neither can be accomplished by a single role. The approach presented allows the creation of quorum roles, which can only be activated in a session with the endorsement of a quorum of other roles. A prototype illustrates the application of our proposal in a network management scenario. In the illustrative scenario, a previously defined set of roles, by endorsement, activates a quorum role to perform a management task without the participation of the network administrator role.
暂无评论