Mining frequent itemsets is a core problem in many data mining tasks, most existing works on mining frequent itemsets can only capture the long-term and static frequency itemsets, they do not suit the task whose frequ...
详细信息
K-means median filter algorithm and recursive K-means median filter algorithm are designed to solve the defects of standard median filter. At first, the sample composed by the current pixel and its neighbors are divid...
详细信息
Put forward the refuge chamber system composed by permanent refuge chamber, temporary refuge chamber and rescue capsule, which are mutually independent and tightly-coupled, to cost-effectively radiate all the areas wi...
详细信息
Put forward the refuge chamber system composed by permanent refuge chamber, temporary refuge chamber and rescue capsule, which are mutually independent and tightly-coupled, to cost-effectively radiate all the areas with mining activities and protect personnel in mine. In addition, in order to promote the development of refuge chamber system in Chinese coal mine, propose some basically design principles of refuge chamber system and describe the arrangement principles and structure characteristics of three kinds of refuge space in the process of underground refuge chamber system design and construction. It is a significant reference for coal mine refuge chamber system construction in China.
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentia...
详细信息
An authenticated encryption scheme (AE scheme) allows the signer to generate a valid authenticated ciphertext on a message such that the designated recipient can recover the message. AE schemes can achieve confidentiality and authenticity when message is transmitted over an insecure channel. The previous AE scheme only can allow one signer to generate the authenticated ciphertext. Recently, Chung et al. proposed a (t, n) threshold authenticated encryption scheme (TAE scheme) in which any t or more signers cooperate to produce a signature for a message and no one except the designated verifier can obtain the message from the ciphertext and verify the authenticity and integrity of the message. The scheme is based on elliptic curve cryptosystem. Moreover, the scheme applies a division-of-labour signature technique to reduce the load of every signer. In other words, every signer only needs to sign a message block assigned to it. Therefore, the (t, n) TAE scheme is more efficient than other AE schemes. However, some flaws of the scheme are found in this paper. Several security defects of the scheme are elaborated: (i) It suffers from conspiracy attack. (ii) It does not hold robustness. (iii) It is insecure against insider attacks. In addition, there exist some design defects in the TAE scheme. Some measures to remove these weaknesses are given in this paper.
Ant colony optimization (ACO) is an optimization algorithm inspired by the natural collective behavior of ant species. The ACO technique is exploited in this paper to develop a novel image edge detection approach. The...
详细信息
This work considers the communication scenario where multiple sources transmit information to one or more receivers and these receivers request the information from all the sources. We construct a secret and reliable ...
详细信息
In the multi-sensor measurement system, background subtraction is very important to improve both the accuracy and the sensitivity of the system. As the prerequisite, the performance of background noise estimation is c...
详细信息
In the multi-sensor measurement system, background subtraction is very important to improve both the accuracy and the sensitivity of the system. As the prerequisite, the performance of background noise estimation is considered as the foundation and also a hot topic. In this paper, a novel adaptive background noise estimation method based on spatial-temporal correlation is proposed. Firstly, a feature zero-crossing rate extracted from the raw data is chosen to describe the background noise degree, and then the model of background noise estimation based on the correlation of the space and the time in multi-sensor measurement system is proposed. Applying the model, using zero-crossing rate as the input, we can get the real-time weight of each sensor, which is used for estimating the adaptive background noise. Finally, seismic background noise estimation experiments are operated. The comparison between several other methods in the sensor failure situation shows that, the proposed method is more effective and more stable.
This paper proposes a novel image sequences based approach for event foreground detection in wild scenes with strong environment noises, which bases on PSO parameter optimization and region partition. First of all, ba...
详细信息
This paper proposes a novel image sequences based approach for event foreground detection in wild scenes with strong environment noises, which bases on PSO parameter optimization and region partition. First of all, base on variance vectors of row and column of difference image, the background model is partitioned into estimated event region covering real event foreground and estimated background region. Then, specific optimal Kalman filters for background modeling are designed for the two regions respectively. At last, event foreground is detected by utilizing adaptive threshold based segmentation method based on the optimal background model. Experimental results demonstrate that the proposed approach could achieve a better performance, while it detects a more accurate event foreground with extremely low false results, by strengthening the event foreground and inhibiting the environment noises.
This paper is based on identification and extraction of topic elements for Chinese interactive text. A topic segmentation method based on time sequence is achieved. Then a novel identification and extraction algorithm...
详细信息
Enterprises outsourcing their databases to the cloud and authorizing multiple users for access represents a typical use scenario of cloud storage services. In such a case of database outsourcing, data encryption is a ...
详细信息
暂无评论