To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to...
详细信息
To protect two party privacy of database's query, known solutions are encrypt the entire database and thus the encryption cost is excessively high. To resolve this problem, we construct a new efficient solution to database's query in semi-honest mode, Based on the assumption of combination commutative encryption and the oblivious transfer protocol. The protocol can safely and efficiently finished database's secure query lack of third-party participation. Furthermore, the correctness, the security and the computational complexity of this scheme are as well analyzed. The results of analysis show that compared with known solutions, the proposed scheme has much less computational complexity.
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite...
详细信息
ISBN:
(纸本)9783642272776
A yield estimation method by remote sensing was used to estimate the yield of winter wheat in Jiangsu province,*** first step of this study was to extract the planting area of winter wheat from environmental satellite images and land-use map of Jiangsu province,meanwhile,correlation analyses were performed by using 8-day of composite Leaf Area Index(LAI)data from Moderate Resolution Imaging Spectroradiometer(MODIS)and statistical yield of corresponding ***,the average LAI was calculated at the optimal growth period,and the statistical yields of wheat for all counties were collected,in which the former was chosen as the independent variable and the latter was the dependent variable,and the regression model was ***,the accuracy and stability of the regression model were validated using the data of another *** results indicated that the yield estimation model at provincial level was reliable,the Root Mean Square Error(RMSE)and the Mean Absolute Error(MAE)of the model was 12.1%and 9.7%,*** addition,the yield estimation system of winter wheat in Jiangsu province was constructed and published based on ArcMap and ArcGIS Server.
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes th...
详细信息
We present two schemes for asymmetric multiparty-controlled teleportation of an arbitrary n-qudit state using different quantum channels between the sender Alice and the controllers, where the first scheme utilizes the generalized Bell states in d-dimensional Hilbert space as the quantum channels and the second scheme takes the generalized multi-particle GHZ maximally entangled states as quantum resources. In addition, Alice shares n generalized Bell states with the receiver Bob in two schemes. In order to avoid performing three-particle or multi-particle joint measurements and consuming more qudits of the multi-particle maximally entangled states, Alice introduces the generalized CNOT gate operations and then obtains higher communication efficiency than the previous schemes based on entanglement swapping.
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, d...
详细信息
In a Bluetooth Low Energy (BTLE) piconet, the master node controls the channel access by a simple polling scheme. Due to an absence of coordination among independent master nodes while accessing the wireless medium, devices will encounter high packet interference if many piconets are simultaneously operating in the same area. In this paper, we propose two schemes in the converged BTLE and cellular network, one is based on bad channel prediction for the BTLE piconets, and the other is based on frequency hopping sequences transformation. We compare the performance of the proposed algorithms with original scheme in the form of channel collision probability and new signaling overhead. The simulation results show that the proposed schemes can reduce channel collision probability significantly and simultaneously the new signaling overhead introduced to the downlink is not large.
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, ...
详细信息
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, Using the Contourlet transform, several polarimetric images can be decomposed into low-frequency coefficients and high-frequency coefficients with multi-scales and multi-directions. For the low-frequency coefficients, the average fusion method is used. For the each directional high frequency sub-band coefficients, the larger value of region variance information measurement is used to select the better coefficients for fusion. At last the fused image can be obtained by utilizing inverse transform for fused contourlet coefficients. Experimental results show that the proposed algorithm works better in preserving the edges and texture information compared with the traditional image fusion algorithms.
A hybrid strategy has been proposed to reduce the wrong clustering on Ambulatory ECG (electrocardiogram). Since Ambulatory ECG is usually composed by 24 hours data, the number of individual ECG waveform can reach to 1...
详细信息
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher p...
详细信息
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher pulse energy and shorter pulse width in 40Gbit/s systems, self-phase modulation(SPM) is significant. The combined effect of GVD and SPM on the propagation pulses are analyzed through Nonlinear Schrödinger Equation(NLSE).
Recently, Gutierrez-Naranjo and Leporati considered performing basic arithmetic operations on a new class of bioinspired computing devices -- spiking neural P systems (for short, SN P systems). However, the binary enc...
详细信息
Recently, Gutierrez-Naranjo and Leporati considered performing basic arithmetic operations on a new class of bioinspired computing devices -- spiking neural P systems (for short, SN P systems). However, the binary encoding mechanism used in their research looks like the encoding approach in electronic circuits, instead of the style of spiking neurons (in usual SN P systems, information are encoded as the time interval between spikes). In this work, three SN P systems are constructed as adder, subtracter and multiplier, respectively. In these devices, a number is inputted to the system as the interval of time elapsed between two spikes received by input neuron, the result of a computation is the time between the moments when the output neuron spikes.
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collected from all points in the imaging grid, and this decreases the efficiency of the algorithm by summing over unnecessary grid points. In order to eliminate the disadvantage, the time-domain backprojection method based on finite beamwidth processing is proposed in the paper. The processing method is designed to be more physically realistic by accounting for the actual antenna pattern. Simulation results show that depending on the width of the effective beam, the number of processing loops can be reduced by up to 50%, while still maintaining good image quality in terms of the reconstructed target response.
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, ...
详细信息
ISBN:
(纸本)9781849195058
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, mm-wave generation is a key technique to realize the convergence network. In this paper, existing optical mm-wave generation technologies are introduced, including direct modulation, optical heterodyning and external modulation. Associated with Shanghai University, a scheme based on Optical Frequency Multiplication employing a dual drive Mach-Zehnder Modulator (DD-MZM) is presented. The novel efficient technique does not require expensive high-frequency electrical equipment. Moreover, no optical filtering is used, which significantly reduces the cost.
暂无评论