Special physical character and strictly limited resources in tags make RFID systems being confronted with many security problems, mobile reader brings higher design requirements for RFID protocols. In this paper, a li...
详细信息
Special physical character and strictly limited resources in tags make RFID systems being confronted with many security problems, mobile reader brings higher design requirements for RFID protocols. In this paper, a lightweight RFID authentication protocol for mobile reader is proposed, this protocol only requires O(1) work to identify and authenticate a tag in the server and is suitable for the low-cost RFID systems. The security and performance of the proposed protocol are analyzed as well.
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function and f(u)...
详细信息
In this paper, one-dimensional (1D) nonlinear beam equations of the form utt - uxx + uxxxx + mu = f (u) with Dirichlet boundary conditions are considered, where the nonlinearity f is an analytic, odd function and f(u) = O(u3). It is proved that for all m ∈ (0, M*] R (M* is a fixed large number), but a set of small Lebesgue measure, the above equations admit small-amplitude quasi-periodic solutions corresponding to finite dimensional invariant tori for an associated infinite dimensional dynamical system. The proof is based on an infinite dimensional KAM theory and a partial Birkhoff normal form technique.
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting,tracking and *** Otsu scheme,a widely used image thresholding...
详细信息
ISBN:
(纸本)9781627483766
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting,tracking and *** Otsu scheme,a widely used image thresholding technique,provides approving results for segmenting a gray level image with only one modal distribution in gray level ***,it provides poor results if the histogram of a gray level is *** enhancing the performance of the Otsu algorithm further,in this work,an improved median-based Otsu image thresholding algorithm is *** extensive tests are performed and the experiments show that our method obtain more satisfactory results than the original Otsu thresholding algorithm.
The increasing availability of GPS-embedded mobile devices has given rise to a new spectrum of location-based services, which have accumulated a huge collection of location trajectories. In practice, a large portion o...
详细信息
ISBN:
(纸本)9781467300421
The increasing availability of GPS-embedded mobile devices has given rise to a new spectrum of location-based services, which have accumulated a huge collection of location trajectories. In practice, a large portion of these trajectories are of low-sampling-rate. For instance, the time interval between consecutive GPS points of some trajectories can be several minutes or even hours. With such a low sampling rate, most details of their movement are lost, which makes them difficult to process effectively. In this work, we investigate how to reduce the uncertainty in such kind of trajectories. Specifically, given a low-sampling-rate trajectory, we aim to infer its possible routes. The methodology adopted in our work is to take full advantage of the rich information extracted from the historical trajectories. We propose a systematic solution, History based Route Inference System (HRIS), which covers a series of novel algorithms that can derive the travel pattern from historical data and incorporate it into the route inference process. To validate the effectiveness of the system, we apply our solution to the map-matching problem which is an important application scenario of this work, and conduct extensive experiments on a real taxi trajectory dataset. The experiment results demonstrate that HRIS can achieve higher accuracy than the existing map-matching algorithms for low-sampling-rate trajectories.
With the rapid development of Internet, information provided by the Internet has shown explosive growth. In the face of massive and constantly updated information on the Internet, how the user can fast access to more ...
详细信息
Meshed surfaces are ubiquitous in digital geometry processing and computer graphics. The set of attributes associated with each vertex such as the vertex locations, curvature, temperature, pressure or saliency, can be...
详细信息
Meshed surfaces are ubiquitous in digital geometry processing and computer graphics. The set of attributes associated with each vertex such as the vertex locations, curvature, temperature, pressure or saliency, can be recognized as data living on mani- fold surfaces. So interpolation and approximation for these data are of general interest. This paper presents two approaches for mani- fold data interpolation and approximation through the properties of Laplace-Beltrami operator (Laplace operator defined on a mani- fold surface). The first one is to use Laplace operator minimizing the membrane energy of a scalar function defined on a manifold. The second one is to use bi-Laplace operator minimizing the thin plate energy of a scalar function defined on a manifold. These two approaches can process data living on high genus meshed surfaces. The approach based on Laplace operator is more suitable for manifold data approximation and can be applied manifold data smoothing, while the one based on bi-Laplace operator is more suit- able for manifold data interpolation and can be applied image extremal envelope computation. All the application examples demon- strate that our procedures are robust and efficient.
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting, tracking and recognizing. The Otsu scheme, a widely used ima...
详细信息
Robust and automatic thresholding of gray level images has been commonly used in the field of pattern recognition and computer vision for objects detecting, tracking and recognizing. The Otsu scheme, a widely used image thresholding technique, provides approving results for segmenting a gray level image with only one modal distribution in gray level histogram. However, it provides poor results if the histogram of a gray level is non-bimodal. For enhancing the performance of the Otsu algorithm further, in this work, an improved median-based Otsu image thresholding algorithm is presented. Finally extensive tests are performed and the experiments show that our method obtain more satisfactory results than the original Otsu thresholding algorithm.
The utilization of expert knowledge to construct Bayesian Network (BN) is one of the key issues of uncertain inference. In this paper the learning procedure of BN is simplified by applying data dependencies in relatio...
详细信息
The utilization of expert knowledge to construct Bayesian Network (BN) is one of the key issues of uncertain inference. In this paper the learning procedure of BN is simplified by applying data dependencies in relational database, which help to remove extraneous attributes and build the initial network structure. The final classification model named FM-NB inherits the simplicity of Naive Bayes (NB) and the ability to maintain inter-dependencies among attributes of Tree augmented NB(TAN). The inter-dependencies are expressed by Functional dependencies (FDs) and Local Multivalued dependencies (LMVDs), which relaxed the precondition about attribute sets of Multivalued dependency (MVD) and solved the problem related to conditional independence of Embedded Multivalued dependencies (EMVDs). Experimental results are presented to show the effectiveness and efficiency of the proposed approach.
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a...
详细信息
In this paper, a new security requirement about RFID protocols is proposed firstly, it is lightweight encryption function structure protection. Subsequently, a lightweight RFID authentication protocol is proposed as a case study, this protocol only requires O(1) work to identify and authenticate a tag in the server and only one-way hash function, XOR operation are needed in tags. In addition, we give formal reasoning for this protocol by using GNY logic;the security properties of this protocol are analyzed as well by comparing with the related RFID protocols.
In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance,...
详细信息
In formal verification, the first step is to build a formal model. Most of the academic tools represent the designs in BLIF or BLIF-MV network, while cannot directly take Verilog source code as an input. For instance, VIS depends on the translator vl2mv to compile Verilog into the intermediate format BLIF-MV first, and then extracts the FSM (Finite State Models) from it instead of the direct Verilog source code. However, Verilog and VHDL are the most common used hardware description languages for large scale integrated circuits. It is necessary if the source code could be used directly, rather than an intermediate format. We notice that synthesizable Verilog is well-structured which can be represented in SSA (Static Single Assignment) form. In this paper, we describe a method that extracts formal model directly from Verilog source code by converting the code to SSA form. With this method, we have implemented a prototype system that extracts formal model of Verilog programs. We also prove the conversion function-preserving by translating SSA back to Verilog and checking its equivalence with the primary design. To ensure correctness and robustness, we have tested our system with ISCAS and picoJava-II, a specification of microprocessor, and the experimental results on these realistic circuits show that the conversion procedure is function-preserving. Moreover, we take it as the front-end of CEC (Combinational Equivalence Checking) and demonstrate the formal model extracted with our method can be exploited efficiently in CEC.
暂无评论