Localization is one of the key technologies in wireless sensor networks, and the mobile beacon assisted localization method is promising to reduce the cost. The methods with only one beacon introduce collinearity prob...
详细信息
In Database-as-a-Service (DBaaS), a large number of tenants share DBaaS resources (CPU, I/O and Memory). While the DBaaS provider runs DBaaS to "share" resources across the entire tenant population to maximi...
详细信息
It is a significant challenges to deal with the noise data in data mining and knowledge discovery applications. Most of previous works on data cleansing and correction have been focused on addressing class noise or at...
详细信息
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neu...
详细信息
ISBN:
(纸本)9780769542966
This paper presents the Neuron Self-adaptive PID control of Brushless DC (BLDC) Motor. It is difficult to tune the parameters and get satisfied control characteristics by using normal PID controller. As the single neuron has the ability of self-learning, the simple structure and it is easy for computing, In order to control the BLDC motor, a single neuron self-adaptive PID controller is designed as the controller of the BLDC motor. The experimental results verify that a single neuron self-adaptive PID controller has better control performance than the normal PID controller.
The algorithm applied to video watermark based on HVS is rare recently , but adaptively selecting the embedding position and the embedding strength according to the host(such as videos, images etc.) is necessary, whic...
详细信息
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative wa...
详细信息
Incomplete preferences of agents may render service selection ineffective. We address this problem by proposing a set of collaborative approaches to complementing agents' incomplete preferences in a qualitative way. For an agent, the approaches first find its similar agents, and then base the similar agents' qualitative preferences to complement this agent's missing preferences. We analyze and compare these approaches and provide experimental results to justify our arguments. We also compare our approach with the classic collaborative filtering and show the competitive advantages of our approach in service selection. Our work thus serves as an important step towards effective service selection.
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a station...
详细信息
DDoS detection has been the research focus in the field of information security. Existing detecting methods such as Hurst parameter method and Markov model must ensure that the network traffic signal f(t) is a stationary signal. But its stability is just a regular assumption and has no strict mathematical proof. Therefore methods mentioned above lack of reliable theoretical support. This article introduces Hilbert-HuangTtransformation(HHT) . HHT does not need to be based on signal stability,but it monitors the similarity between Hilbert marginal spectrums of adjacent observation sequences so as to realize DDoS detection. The method is experimented on DARPA 1999 data and simulating data respectively. Experimental results show that the method behaves better than existing Hurst parameter method in distinguishing both the normal and the attacked traffic.
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box...
详细信息
A new security test for substitution boxes(S-boxes),the nonlinearity profile test,is presented,together with its results over the S-boxes of DES and *** test can be used to measure the global nonlinearity for an S-box effectively,which overcomes the disadvantage of existing methods that cannot evaluate the nonlinear capacity of an S-box against attacks which keep some input bits constant.
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes ...
详细信息
It is one of the important factors in iterative block ciphers design that proper rounds are used to resist differential analysis, linear analysis and many other kinds of attack. Block ciphers usually adopt loop codes in software and repetition structures in hardware in order to reduce complexity and cost. This paper presents an effective fault-electromagnetic attack which can change the rounds of block ciphers in running process, by inducing appropriate fault to the cryptographic chip. The executing rounds of the attacked block cipher can be detected from the electromagnetic radiation track of cryptographic chip. Then the secret key can be deduced directly or with simple mathematical analysis. The simulation result of lightweight block cipher PRESENT shows that the suggested attack is feasible and efficient, when it is implemented with single chip microcomputer. Furthermore, countermeasures are given to resist this kind of attack.
暂无评论