With the developing of the social economy,the amount of currency circulation has increased and become more frequent,but the customer gathering is often occurred in the many bank's *** this paper,with some framewor...
详细信息
With the developing of the social economy,the amount of currency circulation has increased and become more frequent,but the customer gathering is often occurred in the many bank's *** this paper,with some framework technology,Spring Boot and MyBatis,a WeChat public platform software is developed for customers who are available to book branch business,such as branch service reservation,bank business reservation,reservation information inquiry and so *** with WeChat public number and small program,the software offers humanized service and simple ***,it can meet the needs of users who can choose a reasonable time to go to the ideal branch to handle their business quickly,which not only saves users' time,but also improves the efficiency of the bank's system.
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding ***, digital image steganography has become a hot research direction in the field of...
详细信息
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding ***, digital image steganography has become a hot research direction in the field of information security. In order to ensure the concealment, reliability and security of image steganographic information, an image adaptive steganographic algorithm combining chaotic encryption and minimum distortion function is designed. The algorithm generates random keys, encrypt the secret information using Logistic and ChebyShev mapping, and then embeds the key and the encrypted secret information into the carrier image using the HILL steganographic algorithm. The algorithm stores the embedded key and the decryption key separately, so the attacker cannot get the correct secret information even if he gets the embedded key, which improves the security of the key. Experiments show that the pixel change rate of the algorithm is 6.76%, the peak signal-to-noise ratio is 59.51 db, and it has a very good anti-steganographic analysis ability.
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli...
详细信息
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduling is one of the core components in a distributed system. In this paper, we use dynamic optimization algorithms to improve the task scheduling efficiency of distributed vulnerability scanning system, we propose a PSO-based task scheduling scheme and improves the search ability of particles by adjusting algorithm parameters. We compared the time consume when using existing‘Resource Aware Scheduling algorithm'(RASA) with the basic particle swarm optimization(PSO) algorithm and the improved particle swarm optimization(IPSO) algorithm. Our results show that IPSO has better performance than other scheduling methods.
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s...
详细信息
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many solutions to multiple-set membership query problem are based on Bloom filters. And each of these solutions has its own merits. Some have high query speed and some have good accuracy. But generally, they cannot have both at the same time. In this paper, we propose a probabilistic data structure named constant-weight group coded Bloom Filter(CWGCBF) for fast and accurate multi-set membership query. The key technique in CWGCBF is encoding each element's set ID to constant weight code, and directly recording this constant-weight code in the bloom filter vector. Experimental results show that in terms of false positive ratio, CWGCBF, Shifting Bloom Filter and Combinatorial Bloom Filter have great advantages to the other compared Bloom filters, and in terms of time efficiency, CWGCBF and ID Bloom Filter are several times faster than the others.
In this paper, a handwritten digit recognition system based on Knearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine learn...
详细信息
In this paper, a handwritten digit recognition system based on Knearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine learning classifier, we design handwritten digit recognition in Python *** order to improve the accuracy and accuracy of handwritten character recognition, the method of smooth denoising and character segmentation methods are used to preprocess the data, extract the structure and statistical features. The experiments had shown that the accuracy of the algorithm for handwritten character recognition can reach over 97%.
An IoT(Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control uses...
详细信息
An IoT(Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control uses UART(Universal Asynchronous Receiver/Transmitter) to communicate with the slave controller. However, the communication rate of the UART interface is limited and the delay time is long, which affects the system's response to external events. In order to improve the response speed of the system to external events, this paper designs a multi-machine system based on SPI(Serial Peripheral Interface) interface. First, we use the SPI interface of the microcontroller to build a communication network. The circuit structure of the system is simple, and the hardware resource consumption is low. Then, for the problem that the SPI interface cannot detect communication errors and there is no response mechanism, we designed a communication protocol to make up for these defects from the software level. Finally, we use STM32 F429 IGT6 as the master controller and STM32 F103 C8 T6 as the slave controller to build the experimental platform. The experimental results show that the system is safe and reliable, and can meet the requirements of real-time applications.
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit...
详细信息
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorithm is proposed, In this algorithm, the pixel interval is encrypted by chaotic sequence,and the chaotic sequences of other pixels are obtained by XOR the chaotic values of the front and back points, Experiments show that the algorithm can encrypt and decrypt images quickly and has good effect.
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network(cGan). As a c Gan model essentially, a method named pix2 pix interprets image styl...
详细信息
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network(cGan). As a c Gan model essentially, a method named pix2 pix interprets image style transformation as a translation process from input pixels to target pixels. Lots of input to target image pairs should be prepared for model training for different application scenarios. When pix2 pix is applied to color black & white portraits, there are obvious differences in color and saturation between portraits of different genders while the ability of gender recognition isn't owned by pix2 pix in essence. Therefore, a gender recognition model is added to the network to produce more realistic and gender specific color portraits. The experiments show that our work has achieved better results than some other common methods.
GIFT is a new lightweight block cipher with smaller area and higher efficiency,which is very suitable for the Internet of Things(IoT) devices with constrained *** power analysis attack is an efficient method to extrac...
详细信息
GIFT is a new lightweight block cipher with smaller area and higher efficiency,which is very suitable for the Internet of Things(IoT) devices with constrained *** power analysis attack is an efficient method to extract the key from the cryptographic ***,it's not easy to reveal the key by means of power analysis attack,when the cipher is implemented by *** this article,we present the method of power analysis attack against ***,we implemented GIFT on FPGA using the SAKURA-G *** we explored the impact of point of interest(POI) on power analysis *** proposed the method of power analysis attack against the diffusion layer of *** experimental results show that the result of power analysis attack is affected by POI and the key can be recovered when POI is *** can reveal the key using correlation power analysis,when targeting the diffusion layer of GIFT.
With the wide application of smart card,people's demand for the security of smart card is *** AES(Advanced Encryption Standard)algorithm in smart card itself is safe enough,but the encryption algorithm is still th...
详细信息
With the wide application of smart card,people's demand for the security of smart card is *** AES(Advanced Encryption Standard)algorithm in smart card itself is safe enough,but the encryption algorithm is still threatened by side channel attacks due to time,power consumption,electromagnetic radiation and other information leakage during *** at the shortcomings of existing mask schemes in security,a smart card AES encryption NARMS mask against side channel attack is *** scheme calculates the random mask according to the random hamming weight value and random integer,selects 3 rounds of random selection and NARMS random mask strategy for protection in the first,second and ninth rounds of AES algorithm,optimizes and improves the design of random mask and the overall process of mask *** mask scheme designed in this paper is comprehensively compared with ordinary AES algorithm,fixed value mask scheme and RSM(Rotating S-Box Masking) *** show that this scheme can effectively resist the first and second order CPA(Correlation Power Analysis) attacks and has high efficiency,thus ensuring the key security of AES algorithm and privacy security of smart card application.
暂无评论