The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the challenging issue of target detecting and pose estimation in Forward Looking Infrared (FLIR) sequences. Target detecting and pose estimation are formulated as one process. Specifically, a new mixture of Gaussians model is proposed to detect target appearances. A probability based method is used to estimate the target position and size, where the detected appearance plays an...
VANET is very important for improving traffic safety and efficiency. So the messages in VANET must be trustworthy and disseminated very fast. In this paper, an efficient and secure scheme is proposed for VANET messages authentication, group signature is used for the messages from private vehicles and identity-based signature for public vehicles and RSU, further more, it employs batch message-processing...
The estimation of membership functions from data is an important step in many applications of fuzzy theory. In this paper, a new scheme is proposed to generate fuzzy membership functions with unsupervised learning using self-organizing feature map. Comparing with some previous literature, in which the self-organizing feature map applies unsupervised learning, is often considered to be a clustering...
The complexity of developing and deploying context-aware pervasive-computing applications calls for distributed software infrastructures that unobtrusively support to contextual data collecting, information sharing and security privacy controlling. In this paper, we motivate a human-centric design for such an infrastructure to support context-aware applications. A novel peer to peer based semantic...
In this paper, we propose a (2, n) secret image sharing scheme with precise reconstruction for binary, grayscale and color image. In sharing phase, XOR-based secret sharing scheme is utilized and each participant is required to hold a certain number of shares, each having the same size as the secret image. In revealing phase, each two participants can recover the original secret image precisely by...
A simple and efficient energy based robust video hash algorithm is presented. The energy relationships of transform coefficients are extracted with secrete keys for hash construction. Experimental results show that the algorithm outperforms state-of-the-art ones in terms of robustness. Hash comparisons also show that the algorithm is collision resistant.
The risk assessment is an important means to obtain the status of system security and an important basis to develop security solutions as well. Taking the integrated navigation system as the research object, this article proposes an evaluation model which can apply to the system of risk assessment taken by the neural network and the fuzzy theory. The model use the fuzzy evaluation method to quantize...
Traditionally user authentication is based on a username and password. However, a logged station is still vulnerable to imposters when the user leaves her computer without logging-off. Keystroke dynamics methods can be useful for continuously verifying a user once the authentication process has successfully ended. However, current methods require long sessions and significant amounts of keystrokes...
The Ate pairing can be computed efficiently on ordinary elliptic curves with small value of the trace of Frobenius t. The Ate pairing generalizes the Ate pairing, and can possibly shorten the Miller loop to be as small as r 1/φ(k) on some special pairing-friendly curves with large value of Frobenius t. However, not all pairing-friendly curves have this property. In this paper, we generalize the Ate...
Anonymity of user is an important property in the cryptographic protocol, to protect the privacy of the participants. In this paper, we propose a new primitive, fully anonymous signcryption, which provide anonymity of both sender and receiver along with the advantage of traditional ring signcryption (only provides anonymity of sender) scheme. We also construct a fully anonymous identity-based signcryption...
Based on China AVS standard, this paper proposed a method of built-in video watermark technology. Authentication information was generated from I frame as the watermark, and is embedded into selected positions of later P-, B-frames. An algorithm was designed and introduced in this paper to verify the video modification status via abstracted watermark. Dependent on feature of credible encoding/decoding...
Multiplication of a point is the main operation in elliptic curves cryptography system. It is well-known this operation be expensive in time-consuming. we try to improve the computing efficiency of multiple point which will increase the efficiency of elliptic curves cryptography. In order to reach this goal, on the basis of addition-subtraction method, we adopt recursive formula of double point to...
Proxy re-encryption (PRE) allows a ciphertext computed under Alice's public key to be transformed to those which can be decrypted by Bob. In PKC'08, Libert and Vergnaud proposed the first unidirectional RCCA-secure PRE scheme in the standard model. They left the open problem of constructing unidirectional CCA-secure PRE scheme in the standard model open. Until recently, this open problem was solved...
To solve the two-class classification problem existing in semantic-based image understanding, a novel classification method based on double manifold learning is proposed, which can transform the classification problem from a high-dimensional data space to a feature space with lower dimensionality. Two manifolds with different intrinsic dimensionalities will be first established separately, according...
With the intrinsic properties of the Resource-Constrained Project Scheduling Problem(RCPSP) in mind, we integrate the multi-agent systems, social acquaintance net and evolutionary algorithms to form a new algorithm, a multi-agent social evolutionary algorithm for resource-constrained project scheduling problem (MASEA-RCPSP). In this algorithm, all agents live in lattice-like environment. Making use...
In this paper, we study the following general Complementarity problem, We use Poineare-Bohn's homotopy invariance theorem of degree to derive an alternative theorem. Based on this result, a sufficiently condition is established to assure the existence and boundedness of solution curve.
In this paper, a new swarm intelligence algorithm called SIA for global optimization is proposed. Each individual in population is firstly projected onto the boundary of the search space in order to extend the region of the global search. Secondly, a probability of generating new individual is computed based on the function values of the individual, its corresponding boundary point and the best individual...
A hybrid genetic algorithm is proposed for multi-objective flexible job-shop scheduling problem, where the time, cost and equipment utilization rate are used as objective functions. First, the scheduling model for this problem is set up. Second, the matrix chromosome based on job-scheduling encode is adopted and it makes the decode and the use of belief operator much easier. Third, The objective functions...
In many evolutionary algorithms, it is very important way to use penalty function as a fitness function in order to solve many integer optimization problems. In this paper, we first define a new objective penalty function and give its some properties for integer constrained optimization problems. Then, we present an algorithm with global convergence for integer constrained optimization problems in...
This paper proposed an algorithm of collision detection based on a hybrid model which was different from other collision detection model. In this model, different box was used according to different occasion. And the algorithm of intersection calculation between bounding boxes was analyzed and finally the optimization of collision detection based on the hybrid model was gained.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.