The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In real-time imaging applications, the auto-focus algorithm and hardware structure must be adapted to the limited resources for fast and accurate real-time auto-focusing. In this paper, to obtain more precision, a new clarity evaluation function base on image's edge energy is proposed. Then, we present the corresponding FPGA hardware implementation which has simple structure. Additionally, utilizing...
Occupational differentiation of farmers has important significance for promoting the development of agricultural modernization and the modernization of the State. Occupational differentiation of individual farmers in China is different in degree, and farmers ' occupational differentiation in this article is divided into three types -- the professional farmers (undifferentiated ones), part-time farmers...
This paper investigates the problem of acquiring planar object maps of indoor household environments in particular kitchens. The objects modeled in these maps include tables, walls and ceilings. Our segmentation approach is based on 3D point cloud data representations. In order to solve the segmentation problem in complicated environment, a variable model is used in this paper. It is applied in 3D...
Image segmentation is an important component of image processing. The improvements of the segmentation efficiency and quality are the two significant issues for each segmentation algorithm. This paper proposed a segmentation algorithm based on the negative selection mechanism of the artificial immune system. The algorithm can extract the occluded target in an infrared image by using a template constructed...
The paper puts forward a new algorithm to estimate mixing-matrix according to the underdetermined blind signal separation of 3 observed signals and 4 sources. According to the geometric meaning of the SCA model, the paper analyzes the numerical feature of the observed signal and proves that the inner product under Euclidean space can be used to classify the observed signal in the situation. Besides,...
Constrained optimization problems (COPs) are converted into a bi-objective optimization problem first, and a novel fitness function based on achievement scalarizing function (ASF) is presented. The fitness function adopts the valuable properties of ASF and can measure the merits of individuals by the weighting distance from the ndividuals to the reference point, where the reference point and the weighting...
The unidirectional logistics distribution vehicle routing problem with no time windows is considered. It contains the vehicle capacity restriction, the longest distance restriction and the full loaded vehicle. The solution must ensure the non-full loaded factor is the least and the total distance is the shortest. A multi-objective optimization mathematical model for the problem is established. And...
An optimization design method of the integrated signal in modern radar and jammer integration system is presented based on improved chaos genetic algorithm. The bi-phase sequences are generated based on the spatiotemporal chaos system and the optimization model of bi-phase sequences of chaos is constituted based on the design principles of the integrated signal. Then, the improved chaos genetic algorithm...
At Eurocrypt'02, Horwitz and Lynn first introduced the concept of HIBS. Till now, many HIBS schemes have been proposed. Recently (2011), Yang et al.'s proposed a hierarchical identity based signature (HIBS) scheme based on computational Diffie-Hellman (CDH) assumption in the standard model. They claimed that their scheme has more secure and more efficient than the existing HIBS schemes. However, we...
This paper proposes a practical public key encryption scheme which is provable chosen cipher text(CCA) secure based on the gap computational linear Diffie-Hellman assumption in the standard model. This is the first CCA secure scheme based on the gap computational linear Diffie-Hellman assumption. This scheme is efficient and the proof of the security is tight. We also reduce the size of the public...
A rotation resistant image watermarking algorithm is proposed to solve digital image watermarking extracting difficultly when rotating with any angle. The algorithm firstly deal watermarking with binary serialization, and then divide the source image into several circle area with the center point of the image, segment the circle area according to length of the binary watermarking sequences with certain...
We present a more efficient differential fault analysis (DFA) attack on SOSEMANUK, a new synchronous software-oriented stream cipher, which is contained in the current eSTREAM Portfolio. In the previous study, it is required around 6144 faults, 248 SOSEMANUK iterations and 238.17 bytes storage to recovers the secret inner state of the cipher. We offer an improved attack and show that only around 4608...
This paper presents a one-round tripartite authenticated key agreement protocol based on certification from Weil pairing. 27 different authenticated keys can be shared in a single run of the protocol. Their properties of security and efficiency are discussed.
The SMS4 is the first commercial block cipher published by Chinese government. It's a 32-round block cipher encrypted by 128-bit keys. By analyzing the changes of the difference between input and output pairs in each round, this paper presents a new impossible differential path of the 14- round SMS4. Using this path, a new method is submitted to crypt analyze an 18-round SMS4. The time complexity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.