Environmental indices (EI) are used as a communication tool to describe overall status of the environmental systems. Due to the uncertainty in the process of determination of EI, a fuzzy evidential method is proposed ...
详细信息
Environmental indices (EI) are used as a communication tool to describe overall status of the environmental systems. Due to the uncertainty in the process of determination of EI, a fuzzy evidential method is proposed in this paper. First, the data collected from different sources are modeled as fuzzy numbers. Second, a method to transform fuzzy variables into basic probability assignments is developed based on the similarity measure between generalized fuzzy numbers. Then *** data is *** combined based on the distance measure of evidences. At last, a real example to determine water quality indices is used to illustrate the *** of the proposed method.
Ant colony optimization (ACO) is an optimization algorithm inspired by the natural collective behavior of ant species. The ACO technique is exploited in this paper to develop a novel image edge detection approach. The...
详细信息
An image hidden information algorithm inspired by chaotic neural networks, referred as DiaHao, is presented. The secret information of digital image is XOR en- crypted by chaotic stream cipher sequence that is generat...
详细信息
Evidence theory is widely used in many application systems such as information fusion and decision making under uncertainty environment. However, the classical Dempster combination rule is not efficient to deal with h...
详细信息
A group of decision-makers may differ in their choice of alternatives while making a decision. As a result, how to aggregate opinions of different experts is still an open issue. Due to the uncertainty in the process ...
详细信息
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to messa...
详细信息
This paper shows several security weaknesses of a threshold authenticated encryption scheme. A new threshold authenticated encryption scheme using labor-division signature is proposed without redundancy added to message blocks. On the assumptions of EDDH problems, the proposed scheme is secure against chosen-ciphertext attacks and existentially unforgeable against the chosen- message attacks in the random oracle model.
The properties and known constructions of orthomorphic permutations were investigated. On this basis, a new recursive method to construct an n-variable orthomorphic permutations from two (n-2)-variable ones is present...
详细信息
The properties and known constructions of orthomorphic permutations were investigated. On this basis, a new recursive method to construct an n-variable orthomorphic permutations from two (n-2)-variable ones is presented. Furthermore, the new constructed orthomorphic permutations are different from the known ones. In addition, the constructed orthomorphic permutations are pair-wise different. Finally, combining the known orthomorphic permutations and a special class of orthomorphic permutations, the number of the new constructed orthomorphic permuta-tions is proposed.
Risk analysis plays an important role in many application systems. The current researches prefer to use fuzzy set theory for risk analysis. In this paper, we present a new fuzzy risk analysis method based on generaliz...
详细信息
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the ...
详细信息
To safeguard the interests of transacting parties,non-repudiation mechanisms need to assure fairness and *** non-repudiation service currently implemented usually does not consider the requirement of fairness and the fair non-repudiation protocols to date can not be suitably applied in real environment due to its complex *** paper discusses the transaction-oriented non-repudiation requirement for Web services transaction,analyzes the constraints of the traditional model for the available fair non-repudiation protocols and designs a new Online-TTP fair non-repudiation *** new protocol provides a fair non-repudiation solution to secure Web services transactions and can be embedded into a single Web service *** protocol adopts evidence chained to decreasing the overhead of evidence verification and management and alleviates the overhead of certificate revocation checking and time-stamp generation for *** protocol has strong fairness,timeliness,efficiency and practicability.
The degree of similarity between fuzzy numbers plays an important role in fuzzy information fusion. In this paper, improved ROG-based similarity measure developed from the current ROG method is presented. It is shown ...
详细信息
暂无评论