An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced b...
详细信息
An identity-based threshold key management scheme without secure channel is proposed for ad hoc network. The master private key, which is shared among all nodes by the Shamir's secret sharing scheme, is produced by all nodes when network is formed. The nodes’ public keys are derived from their identities. In order to get the private key, each node needs to prove their identity to distributed CAs using a zeroknowledge proof protocol to get the share of private key. Compared with former schemes, our scheme doesn’t need any local registration authority(LRA), which is easy to be compromised by adversary. When a node leaves the network, shares of the master private key would be renewed. In the end, we prove our scheme is correct and secure.
Ana\ysis of electromagnetic scattering characteristics from wire antennas using method of moments has been performed over the past decades. In this paper, an efficient technique is adopted to evaluate the potential an...
详细信息
Ana\ysis of electromagnetic scattering characteristics from wire antennas using method of moments has been performed over the past decades. In this paper, an efficient technique is adopted to evaluate the potential and reaction integrals arising in radar cross section (RCS) computation of cylindrical antenna by method of moments. The singularity of potential and reaction integrals is extracted through the semi-analytical method. The induced current on the surface and RCS of cylindrical antenna are calculated. Numerical examples are presented to illustrate the computational accuracy and efficiency of the proposed technique.
A new incident source with different angles was constructed for dealing with wide-angle scattering problems. Considering the impendence matrix in method of moments (MOM) is independent from incident angles, the equiva...
详细信息
Inferring protein functions from different data sources is a challenging task in the post-genomic era, as a large number of crude protein structures from structural genomics project are now solved without their bioche...
详细信息
Inferring protein functions from different data sources is a challenging task in the post-genomic era, as a large number of crude protein structures from structural genomics project are now solved without their biochemical functions characterized. Recently, many different methods have been used to predict protein functions including those based on Protein-Protein Interaction (PPI), structure, sequence relationship, gene expression data, etc. Among these approaches, methods based on protein interaction data are very promising. In this paper, we studied a network-based method using locally linear embedding (LLE). LLE is a robust learning algorithm that manipulates dimensionality reduction, neighborhood-preserving embedding for high-dimensional data. We first embed both annotated and unannotated proteins in a low dimensional Euclidean space;then, we apply semi-supervised learning techniques to classify unannotated proteins into different functional groups. Finally, we made predictions to the unknown functional proteins in yeast. 5-fold cross validation is then applied to the GO terms to compare the performance of different approaches, and the proposed method performs significantly better than the others.
As more and more high-throughput protein-protein interactions data are collected, a large fraction of newly discovered proteins have an unknown functional role. A challenge to the scientific community is to assign the...
详细信息
As more and more high-throughput protein-protein interactions data are collected, a large fraction of newly discovered proteins have an unknown functional role. A challenge to the scientific community is to assign these newly proteins with a biological function that can be verified by experiment. On the basis of thorough analysis of existing protein function prediction, we take double direction enumeration method combined with the distance constrains to find protein pathway, and propose a new predicting model based on topological structural of protein-protein interaction (PPI) network and protein pathway, which greatly increases the speed of the algorithm. To validate the method, the Yeast Saccharomyces cerevisiae protein-protein interaction network and corresponding protein pathways are analyzed. Comparing with other methods, our results can substantially improve the accuracy and robustness of functional annotation.
The high-order finite-difference time-domain (HO-FDTD) technique is used in the simulation of ground-penetrating radar modeling in three dimensions (3-D), which can improve accuracy and reduce the error caused by nume...
详细信息
The high-order finite-difference time-domain (HO-FDTD) technique is used in the simulation of ground-penetrating radar modeling in three dimensions (3-D), which can improve accuracy and reduce the error caused by numerical dispersion effectively. To absorb waves reflected from edges we implement convolutional perfectly matched layer (CPML) absorbing boundaries. It can efficiently absorb the reflections and greatly increase the computation efficiency. The surface-based reflection and cross-hole GPR modeling are simulated, and numerical results show the efficiency of the method.
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of th...
详细信息
Digital image processing is an interdisciplinary course, which needs students have a strong background in mathematics. To help them change from passive learning to active learning, teaching reform and innovation of the course "Digital Image processing Experiments" is discussed in this paper. The combined platform of experiments includes TI DSP experimental box and three different kinds of programming languages. The six experimental projects cover the basic theories of digital image processing. The result can offer a significant reference for the teaching innovations in the other related specialties.
In this paper we review the major approaches to non-rigid object reconstruction based on multi-view images. It tries to reflect the profile of this area by focusing more on those subjects that have been given more imp...
详细信息
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate...
详细信息
ISBN:
(纸本)9781424472352
In this paper, we propose a distributed group signature scheme with traceable signers for mobile Ad hoc networks. In such scheme, there isn't a trusted center, and all members of Ad hoc group cooperate to generate all system parameters and all private/public keys. Any ' members in Ad hoc group can collaboratively generate the group signature with the help of a designated clerk, where the signer respectively generates the partial signature by using his private key and the clerk can check the correctness of the partial signature. Furthermore, anyone can verify the validity of the group signature by the group public key and trace back to find the identities of signers from the warrant created by the clerk. What's more, it can dynamically increase the parameter values of ~t and ~n, according to the actual security needs of mobile Ad hoc networks, but the private and public keys of the whole Ad hoc group still are not changed for relatively long-term stability.
Particle swarm optimization (PSO) is a recently proposed population-based random search algorithm, which performs well in some optimization problems. In this paper, we proposed an improved PSO algorithm to solve portf...
详细信息
ISBN:
(纸本)9781424476534
Particle swarm optimization (PSO) is a recently proposed population-based random search algorithm, which performs well in some optimization problems. In this paper, we proposed an improved PSO algorithm to solve portfolio selection problems. The proposed approach IPSO employs an opposite mutation operator to enhance the performance of the standard PSO. In order to verify the performance of IPSO, we test it on five well-known benchmark function optimization problems. At last, we use IPSO to solve a classical portfolio selection problem. The results show that the proposed approach is effective and achieves better results than standard PSO.
暂无评论