Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many s...
详细信息
Multiple-set membership query problem plays a very important role in many network systems, including packet forwarding architectures in big data centers, routing switching devices and internet firewall systems. Many solutions to multiple-set membership query problem are based on Bloom filters. And each of these solutions has its own merits. Some have high query speed and some have good accuracy. But generally, they cannot have both at the same time. In this paper, we propose a probabilistic data structure named constant-weight group coded Bloom Filter(CWGCBF) for fast and accurate multi-set membership query. The key technique in CWGCBF is encoding each element's set ID to constant weight code, and directly recording this constant-weight code in the bloom filter vector. Experimental results show that in terms of false positive ratio, CWGCBF, Shifting Bloom Filter and Combinatorial Bloom Filter have great advantages to the other compared Bloom filters, and in terms of time efficiency, CWGCBF and ID Bloom Filter are several times faster than the others.
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorit...
详细信息
For chaotic encryption algorithm, the algorithm of generating chaotic sequence is complex, and the data is float, which directly affects the speed of encryption. In this paper, an interlaced chaotic encryption algorithm is proposed, In this algorithm, the pixel interval is encrypted by chaotic sequence,and the chaotic sequences of other pixels are obtained by XOR the chaotic values of the front and back points, Experiments show that the algorithm can encrypt and decrypt images quickly and has good effect.
An IoT(Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control uses...
详细信息
An IoT(Internet of Things) system is a multi-machine system composed of a master controller and multiple slave controllers. In some automatic control systems such as petroleum and electric power, the main control uses UART(Universal Asynchronous Receiver/Transmitter) to communicate with the slave controller. However, the communication rate of the UART interface is limited and the delay time is long, which affects the system's response to external events. In order to improve the response speed of the system to external events, this paper designs a multi-machine system based on SPI(Serial Peripheral Interface) interface. First, we use the SPI interface of the microcontroller to build a communication network. The circuit structure of the system is simple, and the hardware resource consumption is low. Then, for the problem that the SPI interface cannot detect communication errors and there is no response mechanism, we designed a communication protocol to make up for these defects from the software level. Finally, we use STM32 F429 IGT6 as the master controller and STM32 F103 C8 T6 as the slave controller to build the experimental platform. The experimental results show that the system is safe and reliable, and can meet the requirements of real-time applications.
In this paper, a handwritten digit recognition system based on Knearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine learn...
详细信息
In this paper, a handwritten digit recognition system based on Knearest neighbor algorithm is designed and implemented. By analyzing the application principle and steps of k-nearest neighbor algorithm in machine learning classifier, we design handwritten digit recognition in Python *** order to improve the accuracy and accuracy of handwritten character recognition, the method of smooth denoising and character segmentation methods are used to preprocess the data, extract the structure and statistical features. The experiments had shown that the accuracy of the algorithm for handwritten character recognition can reach over 97%.
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network(cGan). As a c Gan model essentially, a method named pix2 pix interprets image styl...
详细信息
This paper proposes a method to color black & white portrait images with gender recognition model and condition generation network(cGan). As a c Gan model essentially, a method named pix2 pix interprets image style transformation as a translation process from input pixels to target pixels. Lots of input to target image pairs should be prepared for model training for different application scenarios. When pix2 pix is applied to color black & white portraits, there are obvious differences in color and saturation between portraits of different genders while the ability of gender recognition isn't owned by pix2 pix in essence. Therefore, a gender recognition model is added to the network to produce more realistic and gender specific color portraits. The experiments show that our work has achieved better results than some other common methods.
With the wide application of smart card,people's demand for the security of smart card is *** AES(Advanced Encryption Standard)algorithm in smart card itself is safe enough,but the encryption algorithm is still th...
详细信息
With the wide application of smart card,people's demand for the security of smart card is *** AES(Advanced Encryption Standard)algorithm in smart card itself is safe enough,but the encryption algorithm is still threatened by side channel attacks due to time,power consumption,electromagnetic radiation and other information leakage during *** at the shortcomings of existing mask schemes in security,a smart card AES encryption NARMS mask against side channel attack is *** scheme calculates the random mask according to the random hamming weight value and random integer,selects 3 rounds of random selection and NARMS random mask strategy for protection in the first,second and ninth rounds of AES algorithm,optimizes and improves the design of random mask and the overall process of mask *** mask scheme designed in this paper is comprehensively compared with ordinary AES algorithm,fixed value mask scheme and RSM(Rotating S-Box Masking) *** show that this scheme can effectively resist the first and second order CPA(Correlation Power Analysis) attacks and has high efficiency,thus ensuring the key security of AES algorithm and privacy security of smart card application.
GIFT is a new lightweight block cipher with smaller area and higher efficiency,which is very suitable for the Internet of Things(IoT) devices with constrained *** power analysis attack is an efficient method to extrac...
详细信息
GIFT is a new lightweight block cipher with smaller area and higher efficiency,which is very suitable for the Internet of Things(IoT) devices with constrained *** power analysis attack is an efficient method to extract the key from the cryptographic ***,it's not easy to reveal the key by means of power analysis attack,when the cipher is implemented by *** this article,we present the method of power analysis attack against ***,we implemented GIFT on FPGA using the SAKURA-G *** we explored the impact of point of interest(POI) on power analysis *** proposed the method of power analysis attack against the diffusion layer of *** experimental results show that the result of power analysis attack is affected by POI and the key can be recovered when POI is *** can reveal the key using correlation power analysis,when targeting the diffusion layer of GIFT.
Networks are ubiquitous in the real world such as social networks and communication networks, and anomaly detection on networks aims at finding nodes whose structural or attributed patterns deviate significantly from ...
详细信息
In the era of artificial intelligence with big data as the background, the statistical analysis method based on complex network has become a research hotspot and actively promoted the development of big data visualiza...
详细信息
ISBN:
(纸本)9781665400718
In the era of artificial intelligence with big data as the background, the statistical analysis method based on complex network has become a research hotspot and actively promoted the development of big data visualization. Complex network is a new discipline developed by cross research with other disciplines. Its network topology has obvious clustering characteristics, that is, complex network cluster structure. Together with small world and scale-free, it is called the three most important and basic attributes of complex network topology. The fundamental purpose of complex network clustering algorithm is to detect the actual network cluster structure in complex network, which has very important practical value for mining the cluster structure in network and understanding its characteristics, and is conducive to understanding the functions of network, such as predicting the development of complex network, analyzing the behavior of social network, discovering hot topics on network, etc. This paper combines the methods and ideas of complex network analysis, carries out the method design and research of organization analysis, and tries to solve the relationship and characteristics of inter departmental cooperation within the organization.
Crime is one of the most complex social problems around the world, posing a major threat to human life and property. Predicting crime incidents in advance can be a great help in fighting against crime and has drawn co...
详细信息
暂无评论