The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present a framework for describing and analyzing security protocols. It simplifies the applied pi calculus of Abadi and Fournet by moving away the infinite processes and the capability of transmitting channels in order to make the framework fit for describing practical protocols. An alternative operational semantics is given to make the framework more efficient when analyzing protocols. The semantics...
Certificateless public key cryptography is a recently proposed attractive paradigm which combines advantages of both certificate-based and ID-based public key cryptosystems as it avoids usage of certificates and does not suffer from key escrow. Since it was firstly introduced by Al-Ryiami and Pater-son in Asiacrypt 2003, numerous certificateless encryption and signature schemes with additional properties...
There are two aspects for locating precision of weed recognition system based on binocular vision. One is extraction of the feature points, and the other is distortion of camera lens used for image collecting. Some improvement has been made for these problems in this paper. Improving Harris operator makes the precision of feature point reach sub-pixel and rectifies image-distortion before calibrating...
We consider the problem of group key agreement among n parties communicating over an insecure ad hoc network. Firstly, we analyze the state and the problem of existing group key management schemes, and then present a secure, efficient and contributory group key management scheme, which is based on elliptic curve cryptosystems (ECC). The security of our scheme relies on the hardness of elliptic curve...
To rapidly and accurately search the corresponding points along scan-lines, rectification of stereo pairs are performed so that corresponding epipolar lines are parallel to the horizontal scan-lines and the difference in vertical direction is zero. In this paper, the method to rectify image pairs could be divided into three steps including projective transformation, affine transformation and shearing...
Numerical simulation results of fKdV equation are illustrated in the forms of waterfall with Matlab. Matlab can solve many complicated engineering problem and the numerical results can be showed by its excellent graphics. The forced Kortewege-de Vries (fKdV) equation was regarded as a classical nonlinear model when the resonant flow was happened. Which involves a balance between non-linearity and...
The crucial problem in the animation for textiles is how to solve the motion differential equations. This paper mainly analyses some common integration methods in this field. A quantificational comparison of the efficiency of these methods is made by experiment as viewed from accuracy, numerical stability and computation time. Finally it gives the universal rules for choosing integration methods according...
Text categorization is an important research field within text mining. The initial objective of text categorization is to recognize, understand and organize various volumes of texts or documents. The general procedures of categorization are treated as supervised learning, from which the similarity can be inferred from a collection of categorized texts for training purpose. Obviously, the typical approaches...
This paper presents a Kalman-filter-based method, to track the direction-of-arrival (DOA) of a moving target using antenna array in mobile communications. There are two major new features about the proposed scheme. Firstly, traditional Kalman filter needs measurement transformed. However, it is difficult and costly to be obtained. And our method could work without this message. Secondly, the traditional...
The 3D standard k - ?? model coupled with the volume of fluid (VOF) method of water-air two-phase flow is established in long-distance diversion tunnel with free flow. The method of wall functions which considers the roughness of the walls is utilized near the walls, and the method of pressure-implicit with splitting of operators (PISO) is applied to solve the unsteady water-air two-phase flow field...
The special mold temperature control (MTC) foundry numerical computational software MFNS was developed based on software engineering theory. The researches on mathematical models of MTC foundry process including heat transfer equation and finite element numerical model were done. In software requirement analysis, the system logic model was established by the data flow diagram and data dictionary....
The traditional security enforcement approach of network is employing cryptography and authentication scheme. However, we consider that the conventional view of security based on cryptography alone is not sufficient for the wireless LAN and Third-generation (3G) integration networks against malicious or non-malicious insertion of data from internal adversaries or faulty nodes. In this paper, we propose...
Sensor scheduling for target tracking in a sensor network is a research hotspot for its effectiveness in improving performance of the network. If numbers of targets and sensors are very large, the scale of the problem may be too large to solve using traditional methods. A method based on modified particle swarm optimization algorithm (MPSO) is proposed to solve the problem. Firstly, extended Kalman...
Modelica is a new object-oriented language for modeling of large, complex, and heterogeneous physical systems. It is designed to allow for convenient and efficient modeling and simulation of the differential-algebraic equations (DAEs) systems. However, in many engineering fields, partial differential equations (PDEs) are applied. So it is necessary to be able to handle PDE models in Modelica. In this...
With the advent of the grid, task scheduling in heterogeneous environments becomes more and more important. The model of grid scheduling is analyzed in this paper. The optimal objective is to minimize the total completing time. This paper presents an improved particle swarm optimization (PSO) algorithm with discrete coding rule for grid scheduling problem. The improved PSO algorithm can keep all the...
In the paper, we propose phase type (PH) distribution service time working vacation scheme cyclic polling system for WDM. This system consists of multi-queues (terminals). Using the decomposition approach, each queue is analyzed as a single server queue with PH distribution service time working vacation scheme which works at a different rate rather than completely stops during the vacation polling...
A threshold secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Threshold secret sharing is useful in management of cryptographic keys. Based on Birkhoff interpolation, Tassa has proposed an ideal hierarchical threshold secret sharing scheme. Then based on Sure interpolation and participants' identity,...
In view of importance of teaching quality evaluation, the process and results are fully concentrated on considering entirety and dynamics. A method of teaching quality evaluation calculation is proposed on the basis of grey relation analysis and implemented by way of VB program. The no-strictness and no-accuracy results of conventional calculating methods are analyzed. Discusses how to calculate the...
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
3D reconstruction has a long history, few workable reconstruction systems are available although many magnificent theories and algorithms are reported in literature. In this paper, a 3D reconstruction system for indoor scenes with a rotating platform is reported, including its key components such as system calibration, feature matching and 3D reconstruction. Experimental results show that this system...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.