The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Although ciphertext-policy attribute-based encryption (CP-ABE) is promising for realizing fine-grained attribute-based data sharing, attribute privacy protection issues remain to be solved. In this paper, we propose an anonymous CP-ABE scheme (ANON-CP-ABE) and prove its security under the Decisional Modified Bilinear Diffie-Hellman assumption. In the proposed scheme, the sensitive attribute values...
Data deduplication has been widely used in backups to save storage space and network bandwidth. In order to improve efficiency and security of the current deduplication schemes, this paper proposes a secure deduplication scheme. The proposed scheme supports cloud storage servers to eliminate deduplicate data before users' encryption operations, which can reduce computation overheads. Our scheme realizes...
As a promising cryptographic primitive, attributebased encryption (ABE) is adopted to protect outsourced data. However, there are some issues in existing attribute-based encryption schemes. First, the attribute authority manages attributes of users, so it may cause the leakage of users' privacy information. Second, because the access structures are directed along with the ciphertexts and may violate...
Public key encryption with keyword search applies only to the certain circumstances that keyword ciphertext can only be retrieved by a specific user and only supports single-keyword matching. In the existing searchable encryption schemes, either the communication mode is one-to-one, or only single-keyword search is supported. This paper proposes a searchable encryption that is based on attributes...
Decentralized multi-authority attribute-based encryption (ABE) has been adopted to protect outsourced data. However, there are some security issues. Firstly, the user's attributes information is leaked to the authorities and secondly, the access structure being sent along with ciphertext violates its privacy. To address these issues, an efficient decentralized attribute-based encryption scheme with...
A new supervised genetic learning control for maintaining voltage profiles after an emergency in power systems is proposed in this study. Search efficiency is improved after introducing system knowledge into the search process of genetic learning. The optimization of the coordinated voltage control is considered a multi-objective optimal problem. Thus, a set of effective controls can be found, and...
This paper develops two blind estimation algorithms based on the tensor for the time-variant channel of uplink relaying cooperative system. Compared with the traditional blind estimation of matrix-based, the proposed adaptive tracking parallel factor (PARAFAC) decomposition based on the high order tensor model not only has the characteristics of simple calculation and the flexible parameter selection,...
According to the present situation of the wireless communication technology in the mine underground, the article makes a compare and analysis of the present of widely use of IrDA, RFID, Bluetooth, UWB and ZigBee etc. Short distance wireless communication, and designs the mine underground personnel positioning system using RFID technology based on the research of transmission characteristics of radio...
The distributed nature of cooperative networks may result in asynchronous received signals, which overshadows the diversity gains promised by cooperative communications. In this paper we propose a new blind cooperative diversity receiver, which ensures the gains of cooperative transmission diversity with a large delay. In the proposed scheme, multiple asynchronous signals are reconstructed at the...
In attribute-based encryption (ABE) systems, the revocation issue is essential and difficult, since users may change their attributes frequently in practice and each attribute is conceivably shared by multiple users. To our knowledge, all the existing ABE schemes fail to support flexible and direct revocation due to the burdensome update of attribute secret keys and cipher texts. Aiming at tackling...
Cloud computing has achieved rapid development. The cloud server even provides unlimited storage and powerful computing capability as services. A lot of attribute-based schemes have been constructed for cloud computing to come into practical applications. To our knowledge, there seems no flexible key policy attribute-based proxy re-encryption (KP-AB-PRE) scheme in the literature, which is a promising...
In this paper, an on-line training PIDNN controller using an improved DEPSO algorithm for trajectory tracking of the ball and plate system is proposed. Since the ball and plate system is a typical under-actuated system with inherent nonlinearity and coupling between its parameters, the accurate mathematical model is difficult to be derived, so that a lot of nonlinear control and intelligent control...
Aiming at multiple input uncertainty high-order nonlinear ball and plate system, a control strategy of cascade control with multiple auto-disturbance-rejection controls is proposed. To improve the adaptive ability of the ADRC, RBF neural network is used in the parameters optimization. The simulation experiments show that the proposed control method can effectively solve the problems of coupling and...
The nonuniform illumination QR code image would present all white or all black error areas after global binarization processing. Pseudo-boundary would appear in the processing of local binarization, and the calculation would take long time. This paper puts forward an improved background gray-level based binarization algorithm for the nonuniform illumination QR code image. Firstly, doing sub-block...
The public transportation query system is a distributed system based on fixed platforms, which does not meet users anytime, anywhere on the move process of getting the desired information. This article combines public transportation query results and the latest technology to design a new query system. Server-side uses resource-oriented Rest style Web-Services framework to facilitate the access of...
Shift - share method (SSM) is an important method in the analysis of economic structure of a region or city, and also a scientific method in the assessment of tourism market .The change of the tourism market structure has a great influence on the sustainable development of the tourist destination. This article used the SSM method to analyze the tourism market ,on the base of the inbound tourist of...
In this paper, the author studies the tourism development in Shenyang City by SWOT method from the perspective of modern tourism services. The strengths are: the rapid development of modern service industry in Shenyang city, an obvious advantage in tourism zone, perfect urban tourism infrastructure facilities and excellent modern tourism environment. The weakness are: tourism products are not converted...
In this paper, an infinite dimensional Lie algebra is studied and the infinite dimensional of Lie algebras appear in the fields of conformal theory, mathematical physics, statistic mechanics and Hamilton operator. The infinite dimensional Lie is popularized of Virasoro-like Lie algebra. Isomorphisms, morphisms, ideal of the infinite dimensional Lie algebra are studied.
Amplification studies of a Ka-band harmonic multiplying gyrotron traveling wave tube are reported. Coupled cavity and the precise control of focusing magnet field were used to improve the coupling between the fundamental and the harmonic and to adapt the sensitivity of the effect of focusing magnet field on the beam-wave interaction in the tube with a high order mode operation. Some experimental phenomena...
Short-term load forecasting is a part of power dispatching automation system. Accurate load forecasting can ensure and stable operation of power system, and reduce the cost of power generation. The load of different industries was influenced by different factors; the impact of special factors will be considered respectively when the loads were separated into different industries. Thus, the result...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.