When a role in the classic hierarchy rBAC model gets more inherited permissions than the anticipant permissions of the administrator, there is the issue of excessive inheritance. This issue is addressed and a multiple...
详细信息
X86 emulation on heterogeneous processor platform suffers from low performance and other problems, to solve these problems, a kind of high performance IO architecture was presented. This paperdescribes the design and...
详细信息
In heterogeneous wireless network, its open and interconnected characteristic challenges current secure mechanisms, To enhance the security andreduce the redundant identifiers of users, An access authentication schem...
详细信息
In heterogeneous wireless network, its open and interconnected characteristic challenges current secure mechanisms, To enhance the security andreduce the redundant identifiers of users, An access authentication scheme based on the nonredundant identifier is proposed. The scheme is to realize identifier authentication, through using identity separating storage, substitute transmission and identifier updating mechanisms, user privacy protection is enhanced. This paper also improves AKA algorithm to enhance the security of access authentication. Finally, security and communication performance of the proposed protocol are analyzed. The result showed that the proposed scheme is efficient and secure met users’ requirements in access security.
In this paper,a new data structure called variable length counting Bloom filter is proposed for membership queries. This data structure uses variable length counters instead of fixed length counters in Bloom filter. r...
详细信息
In this paper,a new data structure called variable length counting Bloom filter is proposed for membership queries. This data structure uses variable length counters instead of fixed length counters in Bloom filter. rules for the operations of the filter are defined. The size of the new data structure is analyzed. Both the analysis and the simulation show that it is about 1.7 times of that of the standard Bloom filter,which is much less than that of the traditional counting Bloom filter. The application range of the new filter is as wide as the counting Bloom filter.
due to the use of variable length coding(VLC), the MPEG-2 code is very sensitive to channel disturbances. A single bit error in I frame may propagate up to the rest of the slice until the next resynchronization point ...
详细信息
due to the use of variable length coding(VLC), the MPEG-2 code is very sensitive to channel disturbances. A single bit error in I frame may propagate up to the rest of the slice until the next resynchronization point is reached and may also propagate into temporal domain because of interframe coding. As a result,it leads to noticeable degradation of the decoded video quality. To prevent error propagation, an error correction algorithm to I frame is presented in this paper:moving window error correction *** different from error concealment (EC) methods, it can partly correct some random and outburst errors in the corrupteddiscrete cosine transform (dCT) regions and can recover the original *** methods are used only when the correction algorithm fails. The performance of the proposed scheme proves to be satisfactory and surpasses the only use of EC methods under study.
作者:
Ming Hua ShiaoCheng-Chung JaingYu-Jia HuangChien-Ying SuChih-Jung Lumhshiao@itrc.org.tw
Instrument Technology Research Center National Applied Research Laboratories Planning & Promotion Division 20 R&D Road VI Hsinchu Science Park Hsinchu 300 Taiwan Hsinchu N/A 300 Taiwan +886-3-5779911 ext. 555 +886-3-5773947 ccjaing@must.edu.tw
Ming Hsin University of Science & Technology Department of Optoelectronic System Engineering No. 1 Hsin Hsin Road Hsin Feng Hsinchu N/A 304 Taiwan 080look@yahoo.com.tw
Ming Hsin University of Science & Technology Department of Electronic Engineering No. 1 Hsin Hsin Road Hsin Feng Hsinchu N/A 304 Taiwan sujames@itrc.org.tw
Instrument Technology Research Center National Applied Research Laboratories Vacuum Technology Division 20 R&D Road VI Hsinchu Science Park Hsinchu N/A 300 Taiwan d9266010@mail.nchu.edu.tw
National Chung Hsing University Department of Materials Engineering 250 Kuo Kuang Rd. Taichung N/A 402 Taiwan
Sc-doped ZnO thin films were deposited on Corning 1737 glasses by using rF magnetron co-sputtering system with Sc2O3 and ZnO targets. different sputtering powers of Sc2O3 target and post annealing of 550°C for 2 ...
详细信息
Sc-doped ZnO thin films were deposited on Corning 1737 glasses by using rF magnetron co-sputtering system with Sc2O3 and ZnO targets. different sputtering powers of Sc2O3 target and post annealing of 550°C for 2 hr were investigated to understand the effect on microstructural, optical and electrical properties of Sc-doped ZnO thin films. From X-ray diffraction (Xrd) results, the Sc-doped films have (002) preferred orientation. Cross-sectional scanning electron microscope (SEM) show that the Sc-doped ZnO thin films have columnar structure before and after annealing procedure. Atomic force microscopy (AFM) surface measurement also shows that the surface roughness of the films was smoother when the Sc2O3 sputtering power increased. The optical transmission of as deposited Sc-doped films in the visible region all exceeded 80%, and increased about 3% after samples annealed. Electrical resistivity measurement reveals that the as-deposited Sc-doped ZnO thin films had lowest resistivity of 0.97 Ω cm when the Sc2O3 sputtering power was 125W. After annealing the lowest resistivity decreased to 9.85 × 10−2 Ω cm in which 200W of the Sc2O3 sputtering power was applied.
The integration of various wireless networks brings some new access security challenges in heterogeneous wireless networks (HWNs). Transaction of the mobile host with an unknown network is more a norm than an exceptio...
详细信息
ISBN:
(纸本)9781424465972;9780769540115
The integration of various wireless networks brings some new access security challenges in heterogeneous wireless networks (HWNs). Transaction of the mobile host with an unknown network is more a norm than an exception. This paper proposes a trust management mechanism and a fuzzy set baseddynamic trust model (FBdTM) to evaluate the trustworthiness of the network in HWNs. In the model, trust is a measure of information imprecision which can be measured by membership degrees to different fuzzy sets. The evaluation incorporates direct trust, recommendation trust, reputation of recommenders and time stamp. direct andrecommendation trusts reflect how well the network has fulfilled the service agreement in the past. By introducing reputation of recommenders, malicious behaviors of the dishonest entities are restrained effectively. Time stamp makes the evaluation pay much attention to the most recent performance records. Based on the trustworthiness, the mechanism helps mobile host make a decision on the access network selection. The simulation results show the FBdTM model can accurately evaluate the trustworthiness of the network and effectively restrain the acts of slander and co-fraud.
An efficient Call Admission Control (CAC) arithmetic is essential to guarantee QoS for enhancing the utilization of radio resource in multitraffic CdMA systems. This paper presents a Multi-Class Services dynamic Mixed...
详细信息
An efficient Call Admission Control (CAC) arithmetic is essential to guarantee QoS for enhancing the utilization of radio resource in multitraffic CdMA systems. This paper presents a Multi-Class Services dynamic Mixed Judgment CAC arithmetic. This arithmetic judges a new coming call whether to accept or not based on the remaining resource, the priority of all services and the resource reservation for high priority. When self-similar service is coming, it uses probabilistic access. The results show that this arithmetic can keep better performance.
According to the characteristics of fax paper, a method of content-based fax retrieval is put forward. The wavelet decomposition is used in the fax image de-noising, and the wavelet coefficients are used forregional ...
详细信息
According to the characteristics of fax paper, a method of content-based fax retrieval is put forward. The wavelet decomposition is used in the fax image de-noising, and the wavelet coefficients are used forregional division, and then combined with optical characterrecognition technology to extract the semantic features of the text region and the shape features of the logo for the fax retrieval. The accuracy of retrieval is improved notably. At the same time, the algorithm of features fusion forretrieval is given. Experiments show that the method has high precision andrecall, which is more effective than retrieval methods based on manual annotated semantic.
暂无评论