Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Blockchain, widely known as one of the disruptive technologies emerged in recent years, is experiencing rapid development and has the full potential of revolutionizing the increasingly centralized intelligent transportation systems (ITS) in applications. Blockchain can be utilized to establish a secured, trusted and decentralized autonomous ITS ecosystem, creating better usage of the legacy ITS infrastructure...
Trajectory planning of robot is to control the robot in order to accurately follow the target track. And the target trajectory is always high-order and nonlinear. But RBF neural network can be achieved from the input to the output of arbitrary nonlinear mapping, through network learning and training to achieve the nonlinear function. This paper establishes a RBF neural network model firstly, and carries...
In this paper, Shih's weighted fractional Fourier transform is generalized to contain two 4D vector parameters IfrRfr, Rfr isin Zopf4, which is denoted by generalized weighted fractional Fourier transform (GWFRFT). The proposed GWFRFT is shown to possess all of the desired properties for Shih's FRFT. In fact, the GWFRFT will reduce to Shih's FRFT when both IfrRfr, Rfr are zero vectors. The eigenvalue...
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
To solve the problem of the abuse in electronic payment protocols, a new abuse-free fair electronic payment protocol is proposed in this paper. The proposed protocol solves the problems in Parks' protocol and furthermore it solves the abuse using off-line trusted third party (TTP). The security and fairness are also possessed in the protocol.
A novel image encryption technique is proposed associated with the generalized Hilbert transform in this paper. Two schemes of this technique are presented in generating real encrypted image and recovering the original image. The encrypted image is real-valued without data expanding, which can benefit the digital processing of images by electronic computers where speed of computation is important...
Topology mismatching problem between peer-to-peer overlay network and physical underlying network brings great stress to Internet infrastructure. This paper proposes a traffic localizing strategy (TLS), it keeps scalability property of current DHT algorithms and improves system routing performance by partitioning DHT key space associating with local physical information. Experiments based on CAN model...
The emergence of mobile payment, a new direction of electronic payment, releases paying from all fetters in space. However, the security issue of mobile payment has been created. A program of mobile payment based-on J2ME is designed in this paper, and the process of payment take use of digital signature technology to ensure information to be secure. Calculation, storing and communicating are transferred...
A novel method of digital image encryption is presented. Image encryption and decryption are performed based on the continuously increasing decorrelation property and the real-valuedness of the reality-preserving fractional Fourier transform. The input and encrypted data are respectively in the spatial domain and the reality-preserving fractional Fourier transformed domain determined by encryption...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.