The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
PRINT cipher is a lightweight block ciphers dedicated to integrated circuit (IC) printing, proposed by Lars Knudsen et al. at CHES 2010. Interestingly, PRINT cipher discards the key schedule part and keeps all its round keys identical. This unconventional design guarantees its modest space requirement. In this paper, however, we will show how to make use of its identical round key to mount a terrifically...
Traditional VaR method has many defects in measuring portfolio risk, this paper modifies BDSS model and gets revised BDSS model -- La-VaR model based on relative price. For fitting the sequences of the rate of return and relative price, this paper adopts Gaussian-kernel function with good smoothness and Copula-kernel model to portray marginal distribution and correlation structure. Afterwards sequence...
We consider the eigenvalue problem of a class of non-compact linear operators given as the sum of a multiplication and a integral operators. A product integration method is used to approximation based on numerical integration of the weakly singular kernel integral operator. It is shown that entries of the corresponding matrix of this method can be evaluated exactly. The convergence of the method is...
In this paper, improved Logistic models are given, which are called Logarithm Logistic Models. Based on U.S. Census data, the parameters of the models were estimated by applying the Least Squares Method. The experiments show that the prediction value of the new models is much closer to the actual value than the classical Logistic model. Finally, through analyzing the rationality of the maximum population...
Radio Frequency Identification (RFID) poses multiple advantages over traditional barcodes, such as hands-off detection, longer read range and more data storage. In addition, the declining cost of RFID systems along with improved sensitivity and durability nowadays has increased its usage potential in a variety of domains such as logistical, planning and supply chain process. However, the deployment...
The unidirectional logistics distribution vehicle routing problem with no time windows is considered. It contains the vehicle capacity restriction, the longest distance restriction and the full loaded vehicle. The solution must ensure the non-full loaded factor is the least and the total distance is the shortest. A multi-objective optimization mathematical model for the problem is established. And...
We present several types of fault based attacks on the new lightweight block cipher Piccolo. The cipher is a variant of a generalized Feistel network (GFN) while the round keys are not involved in the F-function. This leads to an interesting principle which can be used to simplify our attacks. We describe our results from the simplest fault model to more realistic one. Simulation results show that...
In real application, many important physical phenomena are sufficiently localized that adaptive finite element analysis methods are necessary. In the numerical solution of practical problems in engineering and physics such as in electromagnetic mechanics, the overall accuracy of numerical approximations often deteriorates due to local singularities like those arising from re-entrant corners of domains,...
In this paper, a kind of nonlinear and non-convex optimization problems under the constraints expressed by a system of mixed fuzzy relation equations with max-min and max-average composition is investigated. First, some properties of this kind of optimization problem are obtained. Then, a polynomial-time algorithm for this optimization problem is given based on these properties. Furthermore, we show...
In order to study the interval multiple attribute decision making problem with triangular fussy number and uncertain weight, this paper presents a new method based on cosines similar degree. The detailed procedure of the proposed algorithm and numerical experiment are given. The proposed algorithm is also compared with an existed algorithm. Compared results show that the proposed algorithm are effective...
Real-time motion detection is a key technology in the intelligent video surveillance and traffic video flow. Widely used methods based on monocular vision are sensitive to light and have problems of black hole and shadow. To solve these problems, we proposed a motion detection method based on binocular vision. The segmentation of move object is based on the distinctive of depth information which is...
In many application fields, an appropriate high-quality fast image up sampling method is required. Although many interpolation-based up sampling methods have been proposed, the quality of result images is not satisfactory. Some of them are very fast, but produce poor quality images, the others can produce high quality images, but the methods in them are slow. In our paper, we proposed a fast statistical...
This paper focuses on two integration algorithms used for pseudo-dynamic test, explicit New mark algorithm and implicit alpha-C algorithm. The comparison study between the test and simulation results shows that: the non-uniform distribution of mass, restoring force characteristics and higher frequency vibration modality are simulated more accurately using the alpha-C algorithm than using explicit...
The paper presents a hybrid algorithm for solving nonlinear system of equations through combining Artificial Bee Colony algorithm and Particle Swarm Optimization algorithm together. Numerical computations show that the hybrid algorithm has feasibility and validity in solving nonlinear system of equations.
In last decades, text-independent speaker recognition is a hot research topic attracted many researchers. In this paper, we proposed to apply the Fisher discrimination dictionary learning method to identify the text-independent speaker recognition. The feature used in classification is the Gaussian Mixture Model super vector. The proposed method is evaluated with public ally available dataset TIMIT...
Accurate forecast of urban water consumption is the basis of urban water supply network planning and design, and provides a scientific basis for water production and scheduling. Because the convergence speed of RBF neural network and accuracy of urban water consumption forecast based on RBF neural network are too low, we proposed a new forecast method based on QPSO-RBF neural network. In this method,...
A method for the computation of local magnetic force in suspension system is proposed. Precise calculation of magnetic force in electromagnet is significant to structure design. Therefore, on the basis of finite element method (FEM) and local virtual work method, a mathematical model is built according to the principle of virtual work equivalent, so as to calculate the magnetic force. Application...
When denoising with the method of Weickert's an isotropic diffusion equation, the textures and details will be compromised. A fidelity term is added into Weickert's equation. The coefficient of fidelity term will vary adaptively with the instant image, which makes that the diffusion term and the fidelity term come to a better compromise. Otherwise, when deciding the edge directions, because of the...
In this paper, we firstly analyze the requirement of building fault model libraries and then clarify programs for building fault model libraries in Simulink. Additionally, we present an ontology-base method for reuse of the fault model libraries. The libraries and its reuse are hopeful to enhance the quality and efficiency of safety analysis of critical systems developed with model-based method.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.