An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b...
详细信息
Strategies for network immunization have been drawing wide interest in the area of complex networks during the past decade. The target strategy, in which degree values are used to determine vaccinating priority, has b...
详细信息
This paper proposes a method of face recognition using the support vector machine (SVM) based on the fuzzy rough set theory (FRST). Firstly, features from human face images are extracted by combining the 2-D wavelet d...
详细信息
Brain-computer interface (BCI) is a specific Human-Computer interface in which the brain wave is employed as the carrier of control information. The ultimate goal of BCI is to build a direct communication pathway betw...
详细信息
This paper describes the compressed sampling using the block wavelet transform which has more flexibility in reconstruction the images. Compressed sampling is considered for signals and images that are sparse in a wav...
详细信息
According to the surface impedance method, the equations of both monofilar mode and bifilar mode of guided electromagnetic waves in mine tunnels were presented, the distribution of synthesized electromagnetic field in...
详细信息
Identification of protein-protein interaction is crucial for nearly all biological process. In this paper, we introduce a new transformation of protein sequence based on sequence order information. We use 5594 interac...
详细信息
Identification of protein-protein interaction is crucial for nearly all biological process. In this paper, we introduce a new transformation of protein sequence based on sequence order information. We use 5594 interacting pairs of yeast organism from DIP core database as training data set, seven types organism as independent data set. The model with a new protein coding scheme obtains 88.927% accuracy, 88.243% sensitivity, 89.468% specificity, 77.864% MCC. The average performance on independent data set is 79.4999%.
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate...
详细信息
This paper is concerned with blind separation of convolutive sources. The main idea is to make an explicit exploitation of block Toeplitz structure and block-inner diagonal structure in autocorrelation matrices of sou...
详细信息
Secure Multi-party Computation (SMC) is a hot point concerning with information security and it is widely used in many fields, such as e-voting, e-auction and e-payment systems et al. This paper mainly discusses a spe...
详细信息
暂无评论