In this paper,the vehicle audio encryption system based on scrambling thought and applied to vehicle-mounted media is *** pseudo random number is generated each time it is encrypted,and it is substituted into the Fibo...
详细信息
ISBN:
(纸本)9781510871076
In this paper,the vehicle audio encryption system based on scrambling thought and applied to vehicle-mounted media is *** pseudo random number is generated each time it is encrypted,and it is substituted into the Fibonacci transform to generate a key with variable *** audio data is divided by the number of pseudo random numbers into the Fibonacci sequence,and is encrypted in permutation *** Fibonacci transform has symmetry and creates an audio file that cannot be parsed and played after the permutation *** the security analysis of encryption algorithm,the audio files of different length are *** key space,anti-attack ability,key sensitivity and other indicators are tested to achieve good *** addition,this algorithm is simple in calculation and can realize the ideal real-time performance in practical application.
Exactly-one constraints have comprehensive applications for the fields of artificial intelligence and operations research. For many encoded SAT problems generated by the existing encoding schemes of exactly-one constr...
Exactly-one constraints have comprehensive applications for the fields of artificial intelligence and operations research. For many encoded SAT problems generated by the existing encoding schemes of exactly-one constraints, the state-of-the-art knowledge compilers cannot complete compilation. In this paper, we propose a new encoding scheme of exactly-one constraints. We introduce two-dimensional auxiliary variables (represented as a matrix) to denote the constraint that exactly one of some variables can be assigned as true. The clauses generated by our scheme is significantly less than those generated by three other existing encoding schemes. The experimental results on the exact cover problems show that the encoded CNF formulas generated by our scheme requires less compilation time, compared with the other three coding schemes.
Merkle tree has been widely applied in the field of P2 P *** this paper,an efficient authentication scheme is proposed in the integrity check module for vehicle live video streaming system by optimizing the constructi...
详细信息
ISBN:
(纸本)9781510871076
Merkle tree has been widely applied in the field of P2 P *** this paper,an efficient authentication scheme is proposed in the integrity check module for vehicle live video streaming system by optimizing the construction and verification of the Merkle *** can create and check nodes at the same time in a shorter time without trusted *** the same time,in order to prevent the oversensitivity of hash algorithm,this paper uses the perceptual hash algorithm to generate the hash value of nodes in the Merkle *** performance evaluation and analysis,our algorithm can build a Merkle tree with 2 N-1 nodes only after the N+log2 N times hash *** has better time performance than the traditional tree,whether receiving attacks or *** it is proved that the scheme is secure under the condition that the vehicle live video streaming system is safe.
It is well known that when the fitness function is relatively complex, the optimization time cost of the genetic algorithm will be extremely huge. To address this issue, the surrogate model was employed to predict the...
It is well known that when the fitness function is relatively complex, the optimization time cost of the genetic algorithm will be extremely huge. To address this issue, the surrogate model was employed to predict the fitness value of the optimization problem, to reduce the number of actual calculated fitness values. In this paper, BP neural network, the least square method and support vector machine were fused in the genetic algorithm to evaluate partial individuals' fitness. Sufficient benchmark numerical experiments were conducted, and the results proved that the strategy could reduce the calculating counts of fitness function on similar accuracy basis compared with simple genetic algorithm.
With the burgeoning of IT industry, more and more companies and universities concentrate on the scientific evaluation of science-and-engineering students. Existing evaluation strategies typically lie on grades or scor...
With the burgeoning of IT industry, more and more companies and universities concentrate on the scientific evaluation of science-and-engineering students. Existing evaluation strategies typically lie on grades or scores of the courses taken by students, which have obvious drawbacks nowadays and cannot lead to a proper improvement of education management. This paper proposes an overall student evaluation system architecture that includes three levels, i.e. data collection infrastructure which comprises student data collection and student data transmission, data center which is composed of four sub-levels, and unified portal which defines unified applications and classes of visiting terminals. In the proposed architecture, the main contribution lie in the upper most sub-level of data center, i.e. evaluation services. Four categories of student evaluation services, i.e. moral trait, civic literacy, knowledge level and comprehensive ability,are defined. Furthermore, in order to have a satisfactory feedback in the practical teaching process, the most important comprehensive ability for science-andengineering students is fractionized into four sub-categories and visualized from several different aspects for a good feedback in practical teaching process.
Software Defined Network (SDN) is a new network construction. But due to its construction, SDN is vulnerable to be attacked by Distributed Denial of Service (DDoS) attack. So it is important to detect DDoS attack in S...
详细信息
This paper presents an unmanned aerial vehicle (UAV) pose estimation system based on monocular simultaneous localization and mapping (SLAM) guided by the desired shot. The system enables UAV to automatically adjust th...
This paper presents an unmanned aerial vehicle (UAV) pose estimation system based on monocular simultaneous localization and mapping (SLAM) guided by the desired shot. The system enables UAV to automatically adjust the pose to achieve a shot close to the desired shot provided by the user. The SLAM module in the system includes ORB feature-based visual odometry and Levenberg-Marquardt method-based optimizer. To ensure the reliability of the camera pose estimation result, the bag of words model is used to select an image which has enough good matches with the desired shot. The experimental results prove that the system is valid and effective.
作者:
DONG TianSchool of Mathematics
Key Laboratory of Symbolic Computation and Knowledge Engineering (Ministry of Education) Jilin University
Farr-Gao algorithm is a state-of-the-art algorithm for reduced Gr?bner bases of vanishing ideals of finite points, which has been implemented in Maple as a build-in command. This paper presents a two-dimensional impro...
详细信息
Farr-Gao algorithm is a state-of-the-art algorithm for reduced Gr?bner bases of vanishing ideals of finite points, which has been implemented in Maple as a build-in command. This paper presents a two-dimensional improvement for it that employs a preprocessing strategy for computing reduced Gr?bner bases associated with tower subsets of given point sets. Experimental results show that the preprocessed Farr-Gao algorithm is more efficient than the classical one.
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media *** is...
详细信息
User-specified trust relations are often very sparse and dynamic, making them difficult to accurately predict from online social media. In addition, trust relations are usually unavailable for most social media *** issues pose a great challenge for predicting trust relations and further building trust networks. In this study,we investigate whether we can predict trust relations via a sparse learning model, and propose to build a trust network without trust relations using only pervasively available interaction data and homophily effect in an online world. In particular, we analyze the reliability of predicting trust relations by interaction behaviors, and provide a principled way to mathematically incorporate interaction behaviors and homophily effect in a novel framework,b Trust. Results of experiments on real-world datasets from Epinions and Ciao demonstrated the effectiveness of the proposed framework. Further experiments were conducted to understand the importance of interaction behaviors and homophily effect in building trust networks.
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System(IDS), it proposes a new hybrid method based on the relationship of feature and spatial corr...
详细信息
ISBN:
(纸本)9781509038237;9781509038220
In order to solve the problem of low intrusion detection rate and weak generalization ability of Intrusion Detection System(IDS), it proposes a new hybrid method based on the relationship of feature and spatial correlation for IDS. The proposed IDS reduces the dimension of network data flow by spatial correlation-based dimension reduction method(SCDR). It improves the effectiveness of intrusion detection, and the negative feedback learning method can also improve the generalization ability of IDS. Experiments show that the method in this paper can improve the detection rate notably and also enhance the detection ability of unknown attacks.
暂无评论