Classroom attendance,as an indispensable part of teaching activities,plays a very important role in classroom *** attendance can effectively supervise students to attend classes on time and ensure the quality of class...
详细信息
Classroom attendance,as an indispensable part of teaching activities,plays a very important role in classroom *** attendance can effectively supervise students to attend classes on time and ensure the quality of classroom ***,the current classroom attendance is mainly achieved by the way of teacher's namecalling,which will cause a lot of waste of classroom *** paper presents a classroom attendance system based on video face recognition *** system uses a camera installed in the classroom to obtain classroom video *** the collected video information,it is first divided into a frame of static pictures,and from the pictures,several pictures with clear face and better light are selected for face recognition,and finally the recognition results are aggregated and *** order to solve the influence of the location of the camera on the recognition results,the system can be combined with the platform control system to control the rotation and focusing of the camera through the platform,and further improve the recognition accuracy.
In order to enhance the security of the IoV (Internet of Vehicles), a novel bi-directional authentication scheme is presented in this paper. By use of the elliptic curve en-cryption algorithm and the bilinear pair map...
详细信息
To enhance the controllability and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-...
详细信息
To enhance the controllability and trustworthiness of the Internet, a new network control architecture has been presented with control task extracted to the intra-domain control node and executed in distributed multi-domain cooperative style. The study on control task assigning approach plays a central role in this network control pattern and shares some features with virtual network mapping problem. Different from the previous heuristics-based algorithms, we designs a baseline assigning algorithm which tests if the control task request can be mapped to a sub-graph of substrate control network or not without control task migration. Subsequently, an extend version is described under task migration considered. Our experiment evaluations show the impact of parameters on the runtime and assigning accuracy rate.
Despite the importance of the secure data propagation in the edge-cloud orchestrated computing paradigms, to the best of our knowledge, there is lack of systematic and comprehensive review on this research topic. The ...
详细信息
Despite the importance of the secure data propagation in the edge-cloud orchestrated computing paradigms, to the best of our knowledge, there is lack of systematic and comprehensive review on this research topic. The purpose of this article is to provide a systematic literature survey on secure data propagation in edge-cloud orchestrated computing environment to examine the current technical achievements published between 2010 and February 2020. The brief contributions of the paper are as follows: (1)providing a comprehensive literature review of the secure data propagation approaches in the edge-cloud orchestrated computing paradigms, (2) designing a methodology for document retrieval and selection, (3) presenting analysis and comparison for main technique methods of secure data propagation in hybrid edge-cloud environment.
Crypto-currency is a decentralized digital currency which can be used as a medium of exchange. As it does not have any central authority, it is unregulated and a volatile asset. Globally the crypto market is worth a f...
Crypto-currency is a decentralized digital currency which can be used as a medium of exchange. As it does not have any central authority, it is unregulated and a volatile asset. Globally the crypto market is worth a few trillion dollars. The Indian crypto market suffered a lot due to a ban imposed by the Reserve Bank of India (RBI), an Indian regulatory agency, which lasted for around two years. Even after the ban and cautions issued by the RBI, the crypto market in India touched a billion dollar mark in no time. Currently, the crypto market has more than 10 million Indian investors which is growing fast as the number of exchange apps in the Indian market increase with the ease of trading in crypto. In the current research work Comparative Analysis of Crypto App in India (CACAI) has been performed and results exceed the expectations.
Multi-user Gaussian MIMO wiretap channel is considered under interference power constraints (IPC), in addition to the total transmit power constraint (TPC). Algorithms for global maximization of its secrecy rate are p...
详细信息
Data security is vital for medical cyber physical system(MCPS).The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third...
Data security is vital for medical cyber physical system(MCPS).The decentralization feature of blockchain is helpful to solve the problem that the secure authentication process is highly dependent on the trusted third party and implement data security *** this paper,the blockchain technology is used to describe the security requirements in authentication process.A network model of MCPS based on blockchain is *** analysis of medical data storage architecture,data was ensured not to be tampered and *** security threat was eliminated by bilinear mapping in the authentication process of medical data providers and *** credibility problem of the trusted third party was avoided and the two-way authentication was realized between the hospital and blockchain *** security analysis and performance test were carried out to verify the security and related performance of the authentication *** results show that the MCPS based on blockchain realizes medical treatment data sharing,and meets safety requirements in the security authentication phase.
Bipartite graph embedding has recently attracted much attention due to the fact that bipartite graphs are widely used in various application domains. Most previous methods, which adopt random walk-based or reconstruct...
详细信息
Recent years have witnessed a boom of connected medical devices, which brings security issues in the meantime. Medical imaging devices, an essential part of medical cyberphysical systems, play a vital role in modern h...
详细信息
The supply chain network is a complex network with the risk of cascading *** study the cascading failure in it,an accurate supply chain network model needs to be *** this paper,we construct a layered supply chain netw...
详细信息
The supply chain network is a complex network with the risk of cascading *** study the cascading failure in it,an accurate supply chain network model needs to be *** this paper,we construct a layered supply chain network model according to the types of companies in real supply chain *** first define the similarity between companies in the same layer by studying real-world scenarios in supply chain ***,considering both the node degree and the similarity between nodes in the same layer,we propose preferential attachment probability formulas for the new nodes to join the exist ***,the evolution steps of the model are *** analyze the structural characteristics of the new *** results show that the new model has scale-free property and small-world property,which conform to the structural characteristics of the known supply chain *** with the other network models,it is found that the new model can better describe the actual supply chain network.
暂无评论