A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TC...
详细信息
A trusted cryptography module (TCM) is introduced into vehicular electronic systems to solve security issues of a mobile terminal in the Internet of vehicles, such as authentication, integrity assessment and so on. TCM has many security features, including integrity measure, integrity report and trusted storage, which can make a vehicular electronic system achieve a trusted boot process and encrypt data and information for storage protection, thereby improving the privacy and security of vehicular platform information. Referring to the TNC(trusted network connect)architecture, we design a kind of vehicular terminal access model compatible with the TNC to authenticate and authorize the trusted vehicular platform with TCM to access Internet of vehicles. The vehicular terminal access model proposed will improve the credibility and security of the Internet of vehicles.
A new method for simulating the folding pathway of RNA secondary structure using the modified ant colony algorithmis *** a given RNA sequence,the set of all possible stems is obtained and the energy of each stem iscal...
详细信息
A new method for simulating the folding pathway of RNA secondary structure using the modified ant colony algorithmis *** a given RNA sequence,the set of all possible stems is obtained and the energy of each stem iscalculated and stored at the initial ***,a more realistic formula is used to compute the energy ofmulti-branch loop in the following *** a folding pathway is simulated,including such processes as constructionof the heuristic information,the rule of initializing the pheromone,the mechanism of choosing the initial andnext stem and the strategy of updating the pheromone between two different *** by testing RNA sequences withknown secondary structures from the public databases,we analyze the experimental data to select appropriate values *** measure indexes show that our procedure is more consistent with phylogenetically proven structures thansoftware RNAstructure sometimes and more effective than the standard Genetic Algorithm.
For the low accuracy and imprecise of contour detection evaluation algorithm for a natural image with Ground Truth, we proposed a neighborhood matching algorithm, which had been combined with the original algorithm, a...
详细信息
For the low accuracy and imprecise of contour detection evaluation algorithm for a natural image with Ground Truth, we proposed a neighborhood matching algorithm, which had been combined with the original algorithm, and then modified the accuracy of the formula, at last we got the contour detection evaluation algorithm of this paper. Through assessing the contour detection images processed by Canny operator, compared with the original algorithm, The algorithm improved the accuracy value of assessment of contour detection.
In this paper, a novel approach for surveillance video cropping is presented. The basic idea is to obtain a trajectory that a small sub-window can take through the video, selecting the most important regions of the vi...
详细信息
In this paper, a novel approach for surveillance video cropping is presented. The basic idea is to obtain a trajectory that a small sub-window can take through the video, selecting the most important regions of the video for display on a smaller monitor. In this framework, the video content is firstly modeled by whether image frames change at each pixel. Then a shortest path algorithm is used to find the globally optimal trajectory for a cropping window. After that a second shortest path formulation is employed to find good cuts from one trajectory to another, improving the coverage of interesting events in the video content. Finally, additional techniques are demonstrated to improve the quality and efficiency of the algorithm, and results are shown on surveillance videos from PETS 2006.
To represent and reason with interval-value information of applications in description logic, based on interval-fuzzy set the classical des cription logic ALCN is extended to the fuzzy description logic IFALCN. Its...
详细信息
The satisfiability(SAT) problem is an important problem of automated reasoning. In the past decades, many methods of SAT are proposed, such as method based on resolution, method based on tableau and method based on ex...
详细信息
In recent years, with the development of the wireless sensor networks, the localization method receives the attention of many researchers. However, due to the network cost and characteristics of sensor nodes, most of ...
详细信息
Essential graph is a graphical representation for Markov equivalence classes of Bayesian networks. Learning essential graph can avoid some problems in traditional Bayesian networks learning algorithms: (1) the number ...
详细信息
We propose a fast and simple application system of 3D model reconstruction. We acquire range images by using a combination of a regular camera and a depth sensor. The reconstruction of a 3D model consists of four key ...
详细信息
The quantitative understanding of human behavior is a central question of modern science. Because of the complexity of human behavior, it is almost impossible to seek regularities in human dynamics. It is assumed that...
详细信息
The quantitative understanding of human behavior is a central question of modern science. Because of the complexity of human behavior, it is almost impossible to seek regularities in human dynamics. It is assumed that human actions are randomly distributed in time in current models for human dynamics. While the characteristics of human behavior combined with the queue model are considered as model for human dynamics based on habit to explain bursts and heavy tails in human dynamics more exactly. Normal distribution is used to simulate intervals of succession of events, and random parameters are set as unexpected events disturbing habit behaviors. Moreover, duration of events are proposed to imitate continual attention to some events in human behaviors.
暂无评论