Partial bandgap characteristics of parallelogram lattice photonic crystals are proposed to suppress the radiation modes in a compact dielectric waveguide taper so as to obtain high transmittance in a large wavelength ...
详细信息
Partial bandgap characteristics of parallelogram lattice photonic crystals are proposed to suppress the radiation modes in a compact dielectric waveguide taper so as to obtain high transmittance in a large wavelength range. Band structure of the photonic crystals shows that there exists a partial bandgap, The photonie crystals with partial bandgap are then used as the cladding of a waveguide taper to reduce the radiation loss efficiently. In comparison with the conventional dielectric taper and the complete bandgap photonic crystal taper, the partial bandgap photonic crystal taper has a high transmittance of above 85% with a wide band of 170 nm.
McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI att...
详细信息
McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI attack). In this paper, we give a formal treatment of key compromise impersonation (KCI) attack and define the security notion against it. Then an variant of McCullagh-Barreto protocol is presented with only one more Hash operation. The improved protocol preserves perfect forward security and KGC forward security, and furthermore is proved to be secure against KCI attack under k-Gap-BCAA1 assumption.
A new variant of 5-round distinguisher of meet-in-the-middle attack on AES was constructed by exploiting the properties of the round transform of AES. Based on the variant of distinguisher, meet-in-the-middle attacks ...
详细信息
A new variant of 5-round distinguisher of meet-in-the-middle attack on AES was constructed by exploiting the properties of the round transform of AES. Based on the variant of distinguisher, meet-in-the-middle attacks on 7-round AES-192 and 8-round AES-256 were presented by using the time-memory tradeoff approach. It is shown that the new results are better than the cryptanalytic results presented at FSE2008 on reduced AES in terms of the time complexity and the memory complexity.
A simple method for determining the threshold of irregular LDPC codes over the binary erasure channel (BEC) under message-passing decoding is proposed. An exact formula for calculating the threshold of irregular LDPC ...
详细信息
A simple method for determining the threshold of irregular LDPC codes over the binary erasure channel (BEC) under message-passing decoding is proposed. An exact formula for calculating the threshold of irregular LDPC codes over the BEC is proved. This generalizes the known result on the threshold of regular LDPC codes to irregular LDPC codes. Moreover, our new method can avoid the computation of the inverse of the degree distribution function for irregular LDPC codes. Numerical results demonstrate the correctness of our proposed method.
Corner detection is a main concern in many computer vision applications like object recognition or image matching. Furthermore, detection is usually performed over the contour of the objects. This paper presents a nov...
详细信息
A novel microring resonator accelerometer is proposed. It is realized by a suspended straight waveguide coupled with a microring resonator. Under the external acceleration, the coupling coefficient is a function of ga...
详细信息
A novel microring resonator accelerometer is proposed. It is realized by a suspended straight waveguide coupled with a microring resonator. Under the external acceleration, the coupling coefficient is a function of gap spacing between the two waveguides. The mathematical model of the sensing element is established. Both the finite element method and coupled mode theory are adopted to analyze and optimize the proposed structure. Simulation results show that the mechanical sensitivity is 0.015 μm/g with the working frequency below 500 Hz and cross-axis sensitivity less than 0.001%, which is promising in seismic related applications.
The direction chain code has been widely used in image coding and recognition for its simplicity and low storage requirement. However, the researches on how to use chain code for shape retrieval are few. The tradition...
详细信息
The center-symmetric local binary pattern (CS-LBP) is an effective extension to local binary pattern (LBP) operator. However, it discards some important texture information because of the ignorance of the center pixel...
详细信息
Designing reliability differentiated services for missions with different reliability requirements has become a hot topic in wireless sensor *** with a location-based routing mechanism,a quantified model without full ...
详细信息
Designing reliability differentiated services for missions with different reliability requirements has become a hot topic in wireless sensor *** with a location-based routing mechanism,a quantified model without full network topology is proposed to evaluate *** introducing a virtual reference point,the data transfer is limited in a specified *** reliability function of the area is given.A detailed analysis shows that the function increases quadratically with the distance between the source node and the reference node.A reliability differentiated service mechanism is then *** simulation results show the efficiency of the proposed mechanism.
Now, autonomous tasks planning and allocating (TPA) in Multi Agent System (MAS) has been one key and fundamental problem to promote the intelligent level of such system. Autonomous TPA means that, all tasks should be ...
详细信息
暂无评论