Without modified cover text, zero-watermarking technology makes steganalysis technology is completely ineffective. However, as far as the resilient of active attack, there's no deep study currently. In this paper,...
详细信息
Piece in Hand method is a security enhancement method for Multivariate Public key Cryptosystems (MPKCs). Since 2004, many types of this method have been proposed. In this paper, we consider the 2-layer nonlinear Piece...
详细信息
This paper presents a hybrid navigation and control method for intelligent wheelchair. A robust and semi-supervised vision tracking method using Microsoft Kinect and obstacle avoidance navigation approach are integrat...
详细信息
This paper presents a hybrid navigation and control method for intelligent wheelchair. A robust and semi-supervised vision tracking method using Microsoft Kinect and obstacle avoidance navigation approach are integrated into a two-level control system. Then, position tracking control considering nonholonomic constraints are adopted for the motion control of wheelchairs. An indoor environment is set up for evaluating the application of the proposed approaches. The experimental results show that the proposed method is effective and can be used as a hands-free controller for the intelligent wheelchair.
In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of...
详细信息
In this paper, we explore network architecture anal key technologies for content-centric networking (CCN), an emerging networking technology in the big-data era. We descrihe the structure anti operation mechanism of tl CCN node. Then we discuss mobility management, routing strategy, and caching policy in CCN. For better network performance, we propose a probability cache replacement policy that is based on cotent popularity. We also propose and evaluate a probability cache with evicted copy-up decision policy.
By introducing partial divided differences and partial inverse differences, bivariate symmetry associated continued fractions blending rational interpolation is constructed. We discuss the recursive algorithm, interpo...
详细信息
We have measured the gamma-ray emission spectrum of the Moon using the data collected by the Large Area Telescope onboard the Fermi satellite during its first seven years of operation, in the energy range from 30 MeV ...
详细信息
We have measured the gamma-ray emission spectrum of the Moon using the data collected by the Large Area Telescope onboard the Fermi satellite during its first seven years of operation, in the energy range from 30 MeV up to a few GeV. We have also studied the time evolution of the flux, finding a correlation with the solar activity. We have developed a full Monte Carlo simulation describing the interactions of cosmic rays with the lunar surface. The results of the present analysis can be explained in the framework of this model, where the production of gamma rays is due to the interactions of cosmic-ray proton and helium nuclei with the surface of the Moon. Finally, we have used our simulation to derive the cosmic-ray proton and helium spectra near Earth from the Moon gamma-ray data.
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overhead than signing and encrypting separately. Recen...
详细信息
Signcryption is a cryptographic primitive that performs digital signature and public key encryption simultaneously, at lower computational costs and communication overhead than signing and encrypting separately. Recently, Chung et al. proposed an anonymous ECC-based signcryption scheme. We show that their scheme is not secure even against a chosen-plaintext attack.
The paper presents the electromyogram (EMG)-based neural network control of an upper-limb power-assist exoskeleton robot, which is proposed to control the robot in accordance with the user's motion intention. The ...
详细信息
暂无评论