To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced ...
详细信息
To enhance the privacy of messages in Internet of Vehicles (IoVs), it is critical to preserve the communication security between Road Side Unit (RSU) and numerous vehicles. The primitive of signcryption is introduced to guarantee the confidentiality, integrity and unforgeability of transmitted messages. Nevertheless, the existing signcryption schemes fail to achieve a balance between security and efficiency. In this paper, we construct a Chinese remainder theorem (CRT) empowered certificateless aggregate signcryption scheme with key agreement (CASKA-CRT). As the vehicle joins and leaves dynamically, the proposed scheme can ensure the dynamic security via one modulo division operation. Besides, the certificateless aggregate signcryption and key agreement mechanisms are embedded. The former idea can both address the certificate management and key escrow problems, while the latter technology can create authentication as a premise of secure communication. Based on this construction, the hash-to-group operation and bilinear pairing are avoided, to realize a faster verification with the increased number of messages. Moreover, the security of proposed scheme is proved under the random oracle model. Finally, the performance analysis demonstrates the advantage of CASKA-CRT in terms of security and reliability over related works. IEEE
Ensuring the consistency of electrode structure in proton-exchange-membrane fuel cells is highly desired yet challenging because of wide-existing and unguided cracks in the microporous layer(MPL). The first thing is t...
详细信息
Ensuring the consistency of electrode structure in proton-exchange-membrane fuel cells is highly desired yet challenging because of wide-existing and unguided cracks in the microporous layer(MPL). The first thing is to evaluate the homogeneity of MPL with cracks quantitatively. This paper proposes the homogeneity index of a full-scale MPL with an area of 50 cm~2, which is yet to be reported in the literature to our knowledge. Besides, the effects of the carbon material and surfactant on the ink and resulting MPL structure have been studied. The ink with a high network development degree produces an MPL with low crack density, but the ink with high PDI produces an MPL with low crack homogeneity. The polarity of the surfactant and the non-polarity of polytetrafluoroethylene(PTFE) are not mutually soluble,resulting in the heterogeneous PTFE distribution. The findings of this study provide guidelines for MPL fabrication.
In recent years,automatic program repair approaches have developed rapidly in the field of software ***,the existing program repair techniques based on genetic programming suffer from requiring verification of a large...
详细信息
In recent years,automatic program repair approaches have developed rapidly in the field of software ***,the existing program repair techniques based on genetic programming suffer from requiring verification of a large number of candidate patches,which consume a lot of computational *** this paper,we propose a random search and code similarity based automatic program repair(RSCSRepair).First,to reduce the verification computation effort for candidate patches,we introduce test filtering to reduce the number of test cases and use test case prioritization techniques to reconstruct a new set of test ***,we use a combination of code similarity and random search for patch ***,we use a patch overfitting detection method to improve the quality of *** order to verify the performance of our approach,we conducted the experiments on the Defects4J *** experimental results show that RSCSRepair correctly repairs up to 54 bugs,with improvements of 14.3%,8.5%,14.3%and 10.3%for our approach compared with jKali,Nopol,CapGen and Sim Fix,respectively.
For the firefly algorithm in the solution of complex functions are prone to low accuracy and "premature" phenomenon. In this paper, we propose a tolerance-based elite mutation firefly algorithm (MOFA-TEM). T...
详细信息
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the s...
详细信息
On the transmission line,the invasion of foreign objects such as kites,plastic bags,and balloons and the damage to electronic components are common transmission line *** these faults is of great significance for the safe operation of power ***,a YOLOv5 target detection method based on a deep convolution neural network is *** this paper,Mobilenetv2 is used to replace Cross Stage Partial(CSP)-Darknet53 as the *** structure uses depth-wise separable convolution to reduce the amount of calculation and parameters;improve the detection *** the same time,to compensate for the detection accuracy,the Squeeze-and-Excitation Networks(SENet)attention model is fused into the algorithm framework and a new detection scale suitable for small targets is added to improve the significance of the fault target area in the *** pictures of foreign matters such as kites,plastic bags,balloons,and insulator defects of transmission lines,and sort theminto a data *** experimental results on datasets show that themean Accuracy Precision(mAP)and recall rate of the algorithm can reach 92.1%and 92.4%,*** the same time,by comparison,the detection accuracy of the proposed algorithm is higher than that of other methods.
Diabetic retinopathy (DR) is a serious eye condition induced by diabetes that can result in eyesight. In order to overcome the vision impairment of diabetes mellitus patients, it is essential for early age prevention ...
详细信息
After the global pandemic,DaaS(desktop as a service)has become the first choice of many companies’remote working *** the desktops are usually deployed in the public cloud when using DaaS,customers are more cost-sensi...
详细信息
After the global pandemic,DaaS(desktop as a service)has become the first choice of many companies’remote working *** the desktops are usually deployed in the public cloud when using DaaS,customers are more cost-sensitive which boosts the requirement of proactive power *** researches in this area focus on virtual desktop infrastructure(VDI)session logon behavior modeling,but for the remote desktop service host(RDSH)-shared desktop pools,logoff optimization is also *** systems place sessions by round-robin or in a pre-defined order without considering their logoff ***,these approaches usually suffer from the situation that few left sessions prevent RDSH servers from being powered-off which introduces cost *** this paper,we propose session placement via adaptive user logoff prediction(SODA),an innovative compound model towards proactive RDSH session ***,an ensemble machine learning model that can predict session logoff time is combined with a statistical session placement bucket model to place RDSH sessions with similar logoff time in a more centralized manner on RDSH ***,the infrastructure cost-saving can be improved by reducing the resource waste introduced by those RDSH hosts with very few hanging sessions left for a long *** on real RDSH pool data demonstrate the effectiveness of the proposed proactive session placement approach against existing static placement techniques.
作者:
Chen, YiweiPan, YuDong, DaoyiZhejiang University
Institute of Cyber-Systems and Control College of Control Science and Engineering Hangzhou310027 China Zhejiang University
State Key Laboratory of Industrial Control Technology Institute of Cyber-Systems and Control College of Control Science and Engineering Hangzhou310027 China University of New South Wales
School of Engineering and Information Technology CanberraACT2600 Australia
States of quantum many-body systems are defined in a high-dimensional Hilbert space, where rich and complex interactions among subsystems can be modeled. In machine learning, complex multiple multilinear correlations ...
详细信息
Data privacy is an important issue in control systems,especially when datasets contain sensitive information about *** this paper,the authors are concerned with the differentially private distributed parameter estimat...
详细信息
Data privacy is an important issue in control systems,especially when datasets contain sensitive information about *** this paper,the authors are concerned with the differentially private distributed parameter estimation problem,that is,we estimate an unknown parameter while protecting the sensitive information of each ***,the authors propose a distributed stochastic approximation estimation algorithm in the form of the differentially private consensus+innovations(DP-CI),and establish the privacy and convergence property of the proposed ***,it is shown that the proposed algorithm asymptotically unbiased converges in mean-square to the unknown parameter while differential privacy-preserving holds for finite number of ***,the exponentially damping step-size and privacy noise for DP-CI algorithm is *** estimate approximately converges to the unknown parameter with an error proportional to the step-size parameter while differential privacy-preserving holds for all *** tradeoff between accuracy and privacy of the algorithm is effectively ***,a simulation example is provided to verify the effectiveness of the proposed algorithm.
The developing advances of microresonator-based Ker cavity solitons have enabled versatile applications ranging from communication,signal processing to high-precision *** dispersion is the key factor determining the K...
详细信息
The developing advances of microresonator-based Ker cavity solitons have enabled versatile applications ranging from communication,signal processing to high-precision *** dispersion is the key factor determining the Kerr comb *** the zero group-velocity-dispersion(GVD)regime,low-noise and broadband microcomb sources are achievable,which is crucial to the application of the Kerr *** the GVD is almost vanished,higher-order dispersion can significantly affect the Kerr comb *** many studies have investigated the Kerr comb dynamics near the zero-dispersion regime in microresonator or fiber ring system,limited by dispersion profles and dispersion perturbations,the near-zero-dispersion soliton structure pumped in the anomalous dispersion side is still elusive so ***,we theoretically and experimentally investigate the microcomb dynamics in fiber-based Fabry-Perot microresonator with ultra-small anomalous *** obtain 2/3-octave-spaning microcombs with~10 GHz spacing,>84 THz span,and>8400 comb lines in the modulational instability(MI)state,without any external nonlinear spectral *** widely-spanned Ml combs are also able to enter the soliton ***,we report the first observation of anomalous-dispersion based near-zero-dispersion solitons,which exhibits a local repetition rate up to 8.6 THz,an individual pulse duration<100 fs,a span>32 THz and>3200 comb *** two distinct comb states have their own *** broadband MI combs possess high conversion efficiency and wide existing range,while the near-zero-dispersion soliton exhibits relatively low phase noise and ultra-high local repetition *** work complements the dynamics of Kerr cavity soliton near the zero-dispersion regime,and may stimulate cross-disciplinary inspirations ranging from dispersion-controlled microresonators to broadband coherent comb devices.
暂无评论