Fabrication of microscale and nanoscale silicon waveguide devices requires patterning silicon, but until recently, exploitation of the technology has been restricted by the difficulty of forming ever-small features wi...
详细信息
Fabrication of microscale and nanoscale silicon waveguide devices requires patterning silicon, but until recently, exploitation of the technology has been restricted by the difficulty of forming ever-small features with minimum linewidth fluctuation. A technique was developed for fabricating such devices achieving vertical sidewall profile, smooth sidewall roughness of less than10 nm, and fine features of 40 nm. Subsequently, silicon microring resonator and silicon-grating coupler were realized using this technique.
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a...
详细信息
This paper presents a concrete democratic group signature scheme which holds (t, n)-threshold traceability. In the scheme, the capability of tracing the actual signer is distributed among n group members. It gives a valid democratic group signature such that any subset with more than t members can jointly reconstruct a secret and reveal the identity of the signer. Any active adversary cannot do this even if he can corrupt up to t - 1 group members.
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are workin...
详细信息
An access control policy defines what is authorized, and an access control mechanism implements the policy to ensure that all accesses are in accordance with the underlying policy. Nowadays, many researcher are working for expressing access policies in a formal way. But it is still an open problem. This paper defines a policy language, which is named as PDPL to express access policies and access control properties in PDAC model [1]. This language unifies ldquoBANrdquo logic with past- and future- time temporal logic. We give the syntax and semantics of PDPL, and provided some examples with their English equivalents. This logic language can express belief and authorization in access control model. And it can deal with delegations of decision-making directly. It is easy for us to formulate the properties of interest in distributed systems of PDAC model through PDPL. This logical language is part of a formal system, and it will be used in an automatic model checker in the future.
OOV translations, including new words, collocations, as well as phrases, are the key flesh of a human language while an obstacle to machine translation. Some researchers manually compose the dictionary for OOV transla...
详细信息
Enhancement of light extraction in a GaN light-emitting diode (LED) employing a binary blazed grating reflector (BBGR) is presented. The BBGR consists of asymmetrically periodic structure etched on the GaN layer. Rigo...
详细信息
In this article, the fabrication process of annular photonic crystals on silicon-on-insulator wafers was addressed for the first time. A self-alignment procedure for nanofabrication using atomic layer deposition and s...
详细信息
Support vector machine is kind of novel machine learning method, based on statistical learning theory, which becomes the hotspot of machine learning because of its excellent learning performance. The method of support...
详细信息
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-t...
详细信息
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in identity-based setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In particular, we extend the concept of signcryption key encapsulation mechanism to the identity-based setting. We show that an identity-based signcryption scheme can be constructed by combining an identity-based signcryption key encapsulation mechanism with a data encapsulation mechanism. We also give an example of identity-based signcryption key encapsulation mechanism.
By analyzing the characteristics of off-road images, a new and computationally efficient algorithm of road segmentation and road type identification for autonomous land vehicle (ALV) navigation system based on the pro...
详细信息
By analyzing the characteristics of off-road images, a new and computationally efficient algorithm of road segmentation and road type identification for autonomous land vehicle (ALV) navigation system based on the proposed new-type histogram calculation was established. The new-type histogram is a new image, not a curve. It is also directional. It makes a statistic of the pixels under some special direction. With the histogram images, each pixel in the original image is given a threshold separately, thus the road images are correctly segmented. Moreover, the new-type histogram image could be used to identify road type. It avoids the deficiency that road images are wrongly segmented by reason that the preset road model does not fit in the real scene in the conventional methods. The proposed method does not need any extraction of the relevant information in the image (texture of the road, shadows, road edges, etc.). The method is evaluated on thousands of the cross-country road images under various lighting conditions. The experimental results demonstrate the method's accuracy, feasibility and robustness. It increases the segmentation accuracy to an extent. This would be a potentially significant contribution to the active area of road segmentation in the ALV navigation system.
Optimal path selection (OPS) with unique or multiple constraints is one of key issues in the dynamic networks, in which arc' weight metric is an interval number. Firstly, some existing solutions for this problem a...
详细信息
暂无评论