In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time o...
详细信息
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time operation of one train. Such big amount data need to be stored and managed with high efficiency. In this paper, a hybrid storage architecture by combine database and file system is proposed, in which the separation on the row and column is performed respectively when storing the raw monitored data. Further, an improved compression algorithm is used to compress double float data in the monitored data. The simulation result shows that the proposed method is effective and feasible.
Due to memory limitation, the displaying and processing of the oversized images have been a bottleneck for various applications, which is a hot research spot in the image processing field. The traditional methods are ...
详细信息
Photo typesetting belongs to the rectangular packing problems, currently the algorithms of rectangular packing problems can be divided into two categories: heuristic methods and modern intelligent based methods. For b...
详细信息
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party c...
详细信息
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party computation and function sharing schemes. On the other hand, cheating problem in (k,n) secret sharing is an important issue, such that cheaters (dishonest players) submit forged shares during secret reconstruction to fool honest players. During decades of research on cheating prevention, vast (k,n) secret sharing schemes against cheating have been proposed. However, most of these schemes are not linear schemes since it contains redundant information in their shares to achieve cheating detection. Since linear (k,n) secret sharing is an important primitive in threshold cryptography, linear (k,n) secret sharing scheme with the capability of cheating detection is also worthwhile to be discussed. In this paper, we propose a linear (k,n) secret sharing scheme against cheating based on Shamir's original scheme, which possesses the following merits: (1) Our scheme is just combination of two Shamir's schemes. Therefore, our scheme can be used in other threshold cryptographic systems which are based on Shamir's scheme. (2) The size of share in proposed scheme almost reaches its theoretic lower bound in (k,n) secret sharing with cheating detection. (3) In the phase of cheating detection, only one honest player can detect the cheating from other k-1 cheaters, which achieves a stronger detection effective than the previous linear secret sharing schemes against cheating.
To enjoy the property of error tolerance in the biometric identities extraction,the fuzzy identitybased signature has been initialized to issue a signature on behalf of a descriptive attributes setωinstead of a singl...
详细信息
To enjoy the property of error tolerance in the biometric identities extraction,the fuzzy identitybased signature has been initialized to issue a signature on behalf of a descriptive attributes setωinstead of a single *** attributes setω′can be used to verify the validity of the signature in case the distance betweenωandω′is less than a pre-defined ***,Wang re-formalized the notion of fuzzy identitybased signature and proposed a concrete pairing-based construction along with the efficiency analysis and formal security ***,by giving concrete attack,we indicate that Wang’s scheme is not secure against forgery *** also present an improved scheme to prevent this attack.
In order to make the sensing data in the monitoring equipment’s sensor nodes reach to the monitoring center as soon as possible and deal with the equipment which has some problems, the network time delay should be gu...
详细信息
In this paper, we consider the CRT problem for real numbers with noisy remainders that follow wrapped Gaussian distributions. We propose the maximum likelihood (ML) estimation based CRT when the remainder noises may n...
详细信息
ISBN:
(纸本)9781479919499
In this paper, we consider the CRT problem for real numbers with noisy remainders that follow wrapped Gaussian distributions. We propose the maximum likelihood (ML) estimation based CRT when the remainder noises may not necessarily have the same variances. The proposed algorithm only needs to search for the solution among L elements, where L is the number of remainders. We compare the performances of the newly proposed algorithm and the existing algorithm in term of numerical simulations. The results demonstrate that the proposed algorithm not only has a better performance when the remainders have different error levels/variances, but also has a much lower computational complexity.
This paper presents a survey about the existing web-based information management system for volunteer services. Based on the survey results the paper highlights the new features and functions of the next generation of...
详细信息
ISBN:
(纸本)9781510817982
This paper presents a survey about the existing web-based information management system for volunteer services. Based on the survey results the paper highlights the new features and functions of the next generation of the volunteer service system. A prototype system incorporating these features and functions has also been implemented and presented.
The quickly development of many online applications benefit our daily life. But on the other hand, user usually holds several aliases in different online applications. The aliases across multi-online applications dete...
详细信息
ISBN:
(纸本)9781467379533
The quickly development of many online applications benefit our daily life. But on the other hand, user usually holds several aliases in different online applications. The aliases across multi-online applications detection are becoming more and more important for E-marketing and user's behavior monitoring. In this paper, we propose a method for detecting aliases across multi-online applications. Firstly, we employ the active and positive methods to collect the user's alias and behavior information from several famous applications, including Email, RenRen and etc. Then we analyzed the user's behavior characteristics in specific applications, and some interesting findings are proposed. Finally, we perform the alias detection based on user's behavior profiles, including the similarity of the ID and the number of appearance in specific IP address. According to user's behavior habit, the aliases belong to the same physical users are usually similar with each other. Furthermore, one specific user usually use the same computer to login into different applications, thus the IP addresses used for accessing those applications usually same with each other. Based on those assumptions we employ the Bayesian network to perform alias detection. Empirical results based on actual data verify the efficiency and correctness of the proposed methods.
According to the broadcast encryption scheme with wide applications in the real world, a fully secure predicate-based broadcast encryption was proposed by combining with Waters dual system encryption, predicate encryp...
详细信息
暂无评论