The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A conference-key protocol is used to establish a common conference key K such that a group of people can communicate securely over a public network. To improve the implementation efficiency of Tzeng??s conference-key agreement protocol, an efficient conference-key agreement protocol is proposed under the authenticated broadcast channel. First, the improved protocol is round-efficient, and relaxes...
Only a few ID-based ring signature schemes need a constant number of paring operations so far. In this paper, we present an ID-based ring signature (IDRS) scheme which needs only two pairing operations. Using the new IDRS scheme, we propose an ID-based ring signcryption (IDRSC) scheme. Our IDRS scheme and IDRSC scheme enjoy not only a low computational cost, but also a short ciphertext size. We give...
The idea of threshold cryptography is to distribute secret information and computation among multi parties in order to prevent a single point of failure or abuse. Certificateless public key cryptography(CL-PKC) does not require certificates to guarantee the authority of public keys while avoids the inherent key escrow of identity-based cryptography(IBC). In this paper, we propose a certificateless...
Signature, encryption and key exchange are some of the most important and foundational cryptographical tool. In most cases, they are all needed to provide different secure functions. There exist called authenticated encryption scheme and signcryption schemes that is the integration of signature and encryption. On the other hand, there are also some proposals on the efficient combination of signature...
The comparison principle for general continuous time nonlinear Markov jump system is established. Later, using the comparison principle, we obtain some stability criterion, including stability in probability, uniformly stability in probability, asymptotic stability in probability, uniformly asymptotic stability in probability, pth moment stability, pth moment uniformly stability, pth moment asymptotic...
Collaborative filtering (CF) is one of the most promising techniques in recommender systems, providing personalized recommendations to users based on their previously expressed preferences in the form of ratings and those of other similar users. In practice, a large number of ratings from similar users are not available, due to the sparsity inherent to rating data. Consequently, recommendation quality...
Named entity recognition (NER) is one of the key techniques in natural language processing tasks such as information extraction, text summarization and so on. Chinese NER is more complicated and difficult than other languages because of its characteristics. This paper investigates Chinese named entity recognition based on CRFs, and implements three main named entities, person, location, and organization...
Traditional SVM (support vector machine) multi-class classification methods are mainly based on one-to-one and one-to-multi, which both have disadvantages in applications: slow computational speed and low classification precision. This paper introduces a new method based on error correcting code to reduce the training time and improve the classification precision. In view of the relations among the...
Experts use natural language in the unstructured decision-making problems, when they are establishing weights by pairwise comparison. In this paper, attribute hierarchical model (AHM) is utilized to establish weights. And grey fuzzy number is introduced, which can fully express experts?? will and make experts?? scoring more scientific. Then a new grey fuzzy unstructured decision-making model is proposed...
With Web service technology widely accepted, Web service has become the standard of resources package in the Internet. The approach of exchanging information and transaction is also from a single device to the collaboration in the worldwide network. To face the challenges posed by today??s changing and uncertain business environment, traditional business system integration approaches are not sufficient...
Chaotic Immune evolutionary algorithm (CIEA) is proposed on the shortage of current algorithms training artificial neural network, biological immune mechanism and the characteristics of evolution. A novel artificial neural network based on chaotic immune evolutionary algorithm (CIEANN) is presented in this paper. The algorithm has the merits of chaos, immunity and evolutionary algorithm. It can ensure...
Multiple description coding (MDC) has emerged as an attractive approach for video applications where retransmission is unacceptable or infeasible. Considering that in a video sequence not one but many scene are joined together, we make the coder work on when scene are changing, and some methods are designed for this condition. The experimental results exhibit better performance of the proposed scheme...
Recently video surveillance techniques have been widely applied to intelligent transportation systems. Tracking of moving objects such as vehicles has become a major topic in video surveillance applications. This paper presents a multi-feature fusion model based on a particle filter for moving object tracking. The particle filter combines color and edge orientation information by a stochastic fusion...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.