A program obfuscator is a compiling algorithm that takes a program/circuit as input and generates a new garbled circuit to implement the same functionality as before while obtaining hard-to-understand in some sense, t...
详细信息
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invo...
详细信息
The paper mainly uses a mixed strategy of data and task parallelism to realize parallel extraction date information of *** at the deficiency of ordinary pipeline mode for parallel extraction date information from invoice,we explore a new method of load balanced pipeline based on multiple producers,using parallelism model of mixed data and task provided by TPL(the Task Parallel Library).Finally,it shows this load balanced pipeline program can almost get a linear speedup,which can reach 7.2x in a 8 cores system.
Due to memory limitation, the displaying and processing of the oversized images have been a bottleneck for various applications, which is a hot research spot in the image processing field. The traditional methods are ...
详细信息
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time o...
详细信息
In order to ensure the safeties of high-speed train, a lot of sensors are installed in the train to real-time monitor its operation status. These sensors collect amounts of data which may be several GBs for one time operation of one train. Such big amount data need to be stored and managed with high efficiency. In this paper, a hybrid storage architecture by combine database and file system is proposed, in which the separation on the row and column is performed respectively when storing the raw monitored data. Further, an improved compression algorithm is used to compress double float data in the monitored data. The simulation result shows that the proposed method is effective and feasible.
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection...
详细信息
Electric Vehicle (EV) infrastructure is relatively new in many countries. Due to the recency of an EV infrastructure, it is important to carry out a series of testing programs. Furthermore, authenticity for collection of data is necessary for testing programs in order to provide accurate results. At the same time, user privacy should not cease since tracing one's daily logistic movements or behaviour from the EV testing programs means breaching one's privacy. In this paper, we propose a novel solution PEVTS for enabling both data authenticity and user privacy concurrently. Our proposed system provides great flexibility to the authority to choose any arbitrary set of authenticated users for testing in every time period. At the same time, it provides anonymity for all participating users. Yet it can trace any vehicle within a time period for statistical purpose. We give a detailed description of our system. We also implement the prototype of our system to show its practicality.
A single-channel color image encryption method is proposed based on iterative phase retrieve process in quaternion Fourier transform ***,three components of the plain color image is confused respectively by using cat ...
详细信息
ISBN:
(纸本)9781628415650
A single-channel color image encryption method is proposed based on iterative phase retrieve process in quaternion Fourier transform ***,three components of the plain color image is confused respectively by using cat ***,the confused components are combined into a pure quaternion image,which is encoded to the phase only function by using an iterative phase retrieve ***,the phase only function is encrypted into the gray scale ciphertext with stationary white noise distribution based on the chaotic diffusion,which has camouflage property to some *** corresponding plain color image can be recovered from the ciphertext only with correct keys in the decryption *** results verify the feasibility and effectiveness of the proposed method.
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings t...
详细信息
ISBN:
(纸本)9781479974351
Aiming at the problem of intelligent path guidance in the parking lot, an improved Particle Swarm Optimization Algorithm(PSO) is proposed in this paper to find the optimal path. In order to overcome the shortcomings that standard PSO traps into local optima easily and improve the convergence speed of algorithm, the concept of GA and Multi-thread technology are introduced. The experiment results show that the proposed parallel hybrid PSO algorithm(PHPSO) is relatively steady with faster convergent rate. Especially for multi-nodes, the efficiency is improved obviously. So the proposed PHPSO is well suited for large parking lot.
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the int...
详细信息
User interaction is one of the most important features of online social networks, and is the basis of research of user behavior analysis, information spreading model, etc. However, existing approaches focus on the interactions between adjacent nodes, which do not fully take the interactions and relationship between local region users into consideration as well as the details of interaction process. In this paper, we find that there exists influence transfer effect in the process of user interactions, and present a regional user interaction model to analyze and understand interactions between users in a local region by influence transfer effect. Based on real data from Sina Weibo, we validate the effectiveness of our model by the experiments of user type classification, influential user identification and zombie user identification in online social networks. The experimental results show that our model present better performance than the PageRank based method and machine learning method.
This paper designs the mathematical model of fiber line power, optimization of wireless sensor network node and multi distributed IP, and uses C language to program the model, finally get a new energy-saving mechanism...
详细信息
暂无评论