We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable aut...
详细信息
We present an accountable authority key policy attribute-based encryption (A-KPABE) *** this paper,we extend Goyal's work to key policy attribute-based encryption *** first generalize the notion of accountable authority in key policy attribute-based encryption scenario,and then give a *** addition,our scheme is shown to be secure in the standard model under the modified Bilinear Decisional Diffie-Hellman (mBDDH) assumption.
Communication and information diffusion are typically difficult in situations where centralised structures may become unavailable. In this context, decentralised communication based on epidemic broadcast becomes essen...
详细信息
ISBN:
(纸本)9781467308670
Communication and information diffusion are typically difficult in situations where centralised structures may become unavailable. In this context, decentralised communication based on epidemic broadcast becomes essential. It can be seen as an opportunity-based flooding for message broadcasting within a swarm of autonomous agents, where each entity tries to share the information it possesses with its neighbours. As an example of applications for such a system, we present simulation results where agents have to coordinate to map an unknown area.
Including social networking in e-learning platforms enhances and empowers collaboration, knowledge sharing, and knowledge capturing. This new technology brings new learners into the culture of the institutions, the ne...
详细信息
Including social networking in e-learning platforms enhances and empowers collaboration, knowledge sharing, and knowledge capturing. This new technology brings new learners into the culture of the institutions, the new generation of people is very demanding in terms of development and the use of new technologies for everything in their lives, so to foster the loyalty of younger generation they must be provided with the same kind of technologies they are using in their personal lives. Wherefore, social networking is part of the learning and development processes. Problem identification: This study focuses on the assessment of learner behavioural comparative study of social networking tools to illustrate the weak points, and propose a model enhancing these points for supporting social learning. Objectives: This study aims to achieving the following objectives: 1. Assessment of e-learning through social networks. 2. Assessment of learner behavior through social networks. 3. How social network influences the learner behavior. 4. Better understanding of different kinds of social networks and the differences between them. Research methodology: The decomposed technology acceptance model was applied to construct the research model on which the hypotheses were based. A mixed data gathering technique using a questionnaire, interview and observation has been used, A questionnaire was developed to evaluate the use of social networking in teaching and learning and assesses its effectiveness on the sense of community among learners. Interview and observation was used in order to clarify strengths, weakness and limitations of social learning. Findings: It has been noted that there were some interesting answers when asked about how you think social learning, enhance the learner's behaviour and foster the learning process. The answers focused on: Informal learning with other people and through engagement with peers encourages learners' collaboration and the learners because it inclu
In the resource constrained Wireless Sensor Networks (WSNs), the broadcast authentication is widely fulfilled by the emerging delayed authentication technique. The one level backward one-way key chain in the delayed a...
详细信息
ISBN:
(纸本)9781467309899
In the resource constrained Wireless Sensor Networks (WSNs), the broadcast authentication is widely fulfilled by the emerging delayed authentication technique. The one level backward one-way key chain in the delayed authentication technique limits heavily the duration of the broadcast authentication. In this paper, we propose a long duration broadcast authentication scheme for WSNs. The proposed scheme uses a novel hierarchical key chain to extend the duration of broadcast authentication to be as long as the whole lifetime of WSNs. Moreover, the overhead of the proposed scheme is significantly reduced compared to that with one level key chain. Extensive experimental results show that the novel hierarchical key chain fully outperforms the one level key chain in terms of memory and computation.
It is generally difficult to identify surface and deep layer muscle activity. If we could identify surface and deep layer muscle activity, we can provide effective tools for rehabilitation. Therefore, in this study, w...
详细信息
ISBN:
(纸本)9781467354950
It is generally difficult to identify surface and deep layer muscle activity. If we could identify surface and deep layer muscle activity, we can provide effective tools for rehabilitation. Therefore, in this study, we aim to identify surface and deep layer muscle activity using surface electrodes. We focused on the intersection of muscle fibers of surface layer muscle and deep layer muscle. On such a place, we found that we could measure independent muscle activity along each muscle fiber. In this result, we could confirm that we could measure surface layer muscle activity independently by comparing with the signal which is measured on extended line of surface muscle fiber and on outside of the deep layer muscle. Additionally, we identified propagation direction of EMG signal using electrode array. It was determined from delay time of EMG signal measured on each electrode. When we activated surface and deep layer muscle independently, each propagation direction of EMG signal corresponded to each muscle fiber direction. Thus, we indicated that identification of surface and deep layer muscle activity is possible.
Recently many researchers are working on Peer-to-Peer (P2P) networks, which are able to overcome the firewalls, NATs and other security devices without changing the network policy. P2P architectures will be very impor...
详细信息
Recently many researchers are working on Peer-to-Peer (P2P) networks, which are able to overcome the firewalls, NATs and other security devices without changing the network policy. P2P architectures will be very important for future distributed systems and applications. In such networks, peers are heterogeneous in providing the services and they do not have the same competence of reliability. Therefore, it is necessary to estimate whether a peer is trustworthy or not for file sharing and other services. In this paper, we propose an integrated fuzzy-based trustworthiness system for P2P Communications in JXTA-Overlay, which consists of two Fuzzy Logic Controllers (FLC1 and FLC2). For FLC1, we use three input parameters: Number of Jobs (NJ), Number of Connections (NC) and Connection Lifetime (CL) and the output is Actual Behavioural Criterion (ABC). We use ABC and Reputation (R) as input linguistic parameters for FLC2 and the output is Peer Reliability (PR). We evaluate the proposed system by computer simulations. The simulation results has shown that the proposed system has a good behaviour.
Peer to Peer (P2P) systems recently are receiving a lot of attention from the researchers. In such systems, peers are heterogeneous in providing resources and services. Peers do not have the same reliability so it is ...
详细信息
Peer to Peer (P2P) systems recently are receiving a lot of attention from the researchers. In such systems, peers are heterogeneous in providing resources and services. Peers do not have the same reliability so it is necessary to evaluate their trustworthiness for a reliable sharing of the resources and services. In this paper, we propose a fuzzy-based system for peer reliability in JXTA-Overlay P2P platform. We took in consideration two parameters: Actual Behaviour Criterion (ABC) and Amount of Data Exchanged (ADE) between peers. We evaluate the performance of the proposed system by computer simulations. The simulation results shows that the proposed system has a good behaviour and it can be used successfully to select the most reliable peer to execute the tasks.
Facial expression plays an important role in face-to-face human-computer communication. Although considerable efforts have been made to enable computers to speak like human beings, how to express the rich semantic inf...
详细信息
Facial expression plays an important role in face-to-face human-computer communication. Although considerable efforts have been made to enable computers to speak like human beings, how to express the rich semantic information through facial expression still remains a challenging problem. In this paper, we use the concept of “modality” to describe the semantic information which is related to the mood, attitude and intention. We propose a novel parametric mapping model to quantitatively characterize the non-verbal modality semantics for facial expression animation. In particular, seven-dimensional semantic parameters (SP) are first defined to describe the modality information. Then, a set of motion patterns represented with Key FAP (KFAP) is used to explore the correlations of MPEG-4 facial animation parameters (FAP). The SP-KFAP mapping model is trained with the linear regression algorithm (AMMSE) and an artificial neural network (ANN) respectively. Empirical analysis on a public facial image dataset verifies the strong correlation between the SP and KFAP. We further apply the mapping model to two different applications: facial expression synthesis and modality semantics detection from facial images. Both objective and subjective experimental results on the public datasets show the effectiveness of the proposed model. The results also indicate that the ANN method can significantly improve the prediction accuracies in both applications.
暂无评论