OOV translations, including new words, collocations, as well as phrases, are the key flesh of a human language while an obstacle to machine translation. Some researchers manually compose the dictionary for OOV transla...
详细信息
Enhancement of light extraction in a GaN light-emitting diode (LED) employing a binary blazed grating reflector (BBGR) is presented. The BBGR consists of asymmetrically periodic structure etched on the GaN layer. Rigo...
详细信息
In this article, the fabrication process of annular photonic crystals on silicon-on-insulator wafers was addressed for the first time. A self-alignment procedure for nanofabrication using atomic layer deposition and s...
详细信息
Support vector machine is kind of novel machine learning method, based on statistical learning theory, which becomes the hotspot of machine learning because of its excellent learning performance. The method of support...
详细信息
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-t...
详细信息
Signcryption is a cryptographic primitive that fulfills both the functions of digital signature and public key encryption simultaneously, at a cost significantly lower than that required by the traditional signature-then-encryption approach. In this paper, we address a question whether it is possible to construct a hybrid signcryption scheme in identity-based setting. This question seems to have never been addressed in the literature. We answer the question positively in this paper. In particular, we extend the concept of signcryption key encapsulation mechanism to the identity-based setting. We show that an identity-based signcryption scheme can be constructed by combining an identity-based signcryption key encapsulation mechanism with a data encapsulation mechanism. We also give an example of identity-based signcryption key encapsulation mechanism.
By analyzing the characteristics of off-road images, a new and computationally efficient algorithm of road segmentation and road type identification for autonomous land vehicle (ALV) navigation system based on the pro...
详细信息
By analyzing the characteristics of off-road images, a new and computationally efficient algorithm of road segmentation and road type identification for autonomous land vehicle (ALV) navigation system based on the proposed new-type histogram calculation was established. The new-type histogram is a new image, not a curve. It is also directional. It makes a statistic of the pixels under some special direction. With the histogram images, each pixel in the original image is given a threshold separately, thus the road images are correctly segmented. Moreover, the new-type histogram image could be used to identify road type. It avoids the deficiency that road images are wrongly segmented by reason that the preset road model does not fit in the real scene in the conventional methods. The proposed method does not need any extraction of the relevant information in the image (texture of the road, shadows, road edges, etc.). The method is evaluated on thousands of the cross-country road images under various lighting conditions. The experimental results demonstrate the method's accuracy, feasibility and robustness. It increases the segmentation accuracy to an extent. This would be a potentially significant contribution to the active area of road segmentation in the ALV navigation system.
Optimal path selection (OPS) with unique or multiple constraints is one of key issues in the dynamic networks, in which arc' weight metric is an interval number. Firstly, some existing solutions for this problem a...
详细信息
The paper presents a novel approach for contour-based shape retrieval. The contour is firstly sampled and smoothed by a Gaussian filter. Then, the sampled points are classified into salient (convex or concave) or smoo...
详细信息
The paper presents a novel approach for contour-based shape retrieval. The contour is firstly sampled and smoothed by a Gaussian filter. Then, the sampled points are classified into salient (convex or concave) or smooth type points by their internal angles. In addition to distance histograms (DH), two new descriptors named relative address distribution (RAD) and relative unit entropy (RUE) are introduced to describe the correlation of each type of contour points. These descriptors have powerful descriptive ability for contour with more spatial information. Comparisons are conducted between the proposed method and several other feature descriptors. The results show that the new method is efficient and it provides noticeable improvement to the performance of shape retrieval.
A (t, n) threshold proxy signcryption scheme allows t or more proxy signcrypters from a designated group of n proxy signcrypters to signcrypt messages on behalf of an original signcrypter. In this paper, a new identit...
详细信息
In group key management systems adopting lazy updating, the overhead of key updating might be amortized. In this paper, a Dynamic-tree based Lazy group key updating scheme (DT-LGKU) is presented, which consists of fou...
详细信息
In group key management systems adopting lazy updating, the overhead of key updating might be amortized. In this paper, a Dynamic-tree based Lazy group key updating scheme (DT-LGKU) is presented, which consists of four algorithms Init, Update, Derive and Extract. DT-LGKU supports lazy join events and lazy leave events with unbounded number of time intervals, and provides the forward secrecy and the backward secrecy. DT-LGKU is secure if both the Large Integer Factoring problem and RSA problem are hard. The performance evaluation shows that the worst-case complexity of the cryptographic operations used in the Extract algorithms is logarithmic in the number of time intervals, and those of Init, Update, Derive are constant.
暂无评论