The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Life cycle cost is the total cost incurred in the life cycle of a product, including design, development, production, operation, maintenance, support and disposal. Life cycle cost analysis can help engineers to identify equipment and process selection not on the initial purchase cost but rather on the total cost. A reasonable life cycle cost model can lead to a reliable design. In this paper, several...
In this paper, we investigate the problem of increasing the threshold value of the Shamirpsilas (t, n)-threshold scheme without the dealerpsilas helps, and present a new secret sharing scheme with the threshold value increasing. In this scheme, the dealer needs not to pre-compute or publish any information in advance, all participants cooperate to take on the dealerpsilas role and to complete the...
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the group and all members, and exists a designated clerk, which creates a warrant recording the identities of the signers and other import information. Any t members can collaboratively generate...
In real world, there are many important applications for the secret sharing with the quasi-threshold multipartite access structure. But there was still not a very efficient scheme proposed in the past. In this paper, we combine the multi-secret sharing and the quasi-threshold multipartite access structure, and present an efficient multi-secret sharing scheme with the quasi-threshold multipartite access...
Many systems are required to perform a series of missions with finite breaks or limited maintenance resources between successive missions. In such cases, one of the most widely used maintenance policies is a selective maintenance in which a subset of feasible maintenance actions is chosen to satisfy the subsequent mission requirements. Traditional selective maintenance optimization problems reported...
Micro-Doppler caused by micro-motion structures contains movement and structure information which is useful for radar target recognition. The micro-motion modulation in high range resolution profile (HRRP) for stepped-frequency radar (SFR) is quite different forms that in spectrum for Doppler radar. Taking the basic micro-motion, rotation, as an example, this paper deduces its signal model for stepped...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.