The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Perceptual audio hashing, which summarizes big audio data into compact and robust digest, provides a useful tool for the identification, retrieval, authentication, and other information processing of multimedia contents. This paper proposes a perceptual audio hashing algorithm based on Radon transform in wavelet domain. The wavelet approximate coefficients are mapped into a two dimensional matrix...
The security situation of the Internet of Things (IoT) is constantly changing. Traditional passive management strategies for IoT can not adapt to the complicated environment of IoT. To solve the above problem, a dynamic defense architecture for the security of IoT is proposed. It is made up of six security defense segments which include active defense, threat detection, security warning, security...
Dynamic password technology is widely utilized for identity authentication, which depends on using hash functions, such as SM3. And SM3 hash algorithm is based on the mixing of different group operations, such as XOR and addition modulo 232. In this paper, we present two original first-order differential power analysis attacks on dynamic password token based on SM3 algorithm. The two proposed DPA...
In this paper, we consider digital forensics in the context of Web services based infrastructures. We propose a built in forensics aware framework called (Fi4SOA). Fi4SOA uses Sherwood Applied Business Security (SABSA) methodology to merge forensics properties with business requirements at service design phase, and a reasoning machine over a new proposed ontology to define forensics properties and...
He HMAC algorithm involves a hash function with a secret key. And SM3 is the only standard hash algorithm of China. HMAC-SM3 algorithm is based on the mixing of different algebraic operations, such as XOR and addition modulo 232, thus the classical side-channel attacks on it are mainly against these basic group operations and need to exploit multiple leakage models. Therefore, the attack procedures...
Bilevel programming has a nested structure consisting of two optimization problems, in which the constraint region of upper level's problem is determined by the solution set of the lower level's problem. Multiobjective bilevel programming problems are a special case of bilevel programming in which the upper and lower level have many objectives to be optimized simultaneously. In this paper, the lower...
Hardware trojan detection is paid more and more attention in recent years due to the great potential threat imposed by hardware trojan to the whole integrated circuit industry. In this paper, ring oscillator network based hardware trojan detection method is tactfully implemented in FPGA and a novel corresponding detection algorithm is proposed. Incremental compilation technique is applied to design...
Dictionary learning method based on sparse coding has been widely used in visual tracking, since it has good performance in terms of encoding target appearance. Currently, most of the visual tracking algorithms based on dictionary learning update the dictionary with tracking results in tracking process. Consequently, the total error accumulated over time, and even cause the failure of tracking. In...
In this paper, a new proportion entropy function is proposed as an objective function to obtain a well-diversified portfolio. Secondly, a new fuzzy multi-objective portfolio selection model based on the proposed entropy function is presented. By using the model, we can find tradeoffs between risk, return and the diversification degree of portfolio. Thirdly, a new multi-objective evolutionary algorithm...
In this paper, a hybrid optimization algorithm, consisting of a central force optimization and a gradient-based method, is constructed. The central force optimization is used to locate decent points for previously converged local minima. The combined algorithm balance explores and exploits.
Heterogeneous networks (Het Net) is the development trend of future wireless networks, but the additive small base stations (BSs) make existing BS planning models unavailable. This paper builds a new BS planning model in which takes signal coverage, system capacity and cost as objective functions and takes interference as a very important constraint. Since these issues are conflicting, the optimization...
In pattern classification or machine learning, instance-based learning (IBL) has gained much attention and can yield superior performance in many domains. In IBL, however, the storage requirement is proportional to the number of training instances. Furthermore, it usually takes too much time to classify a new, unseen instance because all training instances need to be considered in determining the...
This paper presents an efficient hybrid heuristic search method based on electromagnetism-like algorithm and chaos searching technique to solve the nonlinear bilevel programming problem. In order to increase the population diversity, chaotic opposition-based population initialization is first applied to generate initial population. Considering the structure and characteristic of the bilevel programming...
Based on Lyapunov-krasovskii funvtiona lmethod, delay ideological division. Delay first by constructing a new Lyapunov function, and then use the system range segmentation method is divided into N parts range, and introducing free weighting matrices, a class of delay Uncertain Nonlinear Delay Systems.
Accurate network traffic classification is significant to numerous network activities, such as QoS and network management etc. While port-based or payload-based classification methods are becoming more and more difficult, Machine Learning methods are promising in many aspects. In this paper, we improve the standard Random Forest by setting the variable selection probability according to the importance...
Cooperative co-evolution framework is widely used in large scale optimization problems. Usually, the large scale problem is divided into smaller sub groups using black-box decomposition methods based on variable interactions. However these black-box decomposition methods have limitations in finding correct variable interactions. In this paper, a white-box decomposition method named formula based grouping...
In allusion to the problem that traditional flash translation layer cannot meet the requirement of the multichannel structure Solid-State Drive, considering the four-level parallelism existed in it, a region-based page level address mapping algorithm is proposed. The algorithm assigns continuous logical pages to different channels and divides the logical address into three different levels including...
Large Average Sub matrices (LAS) is one of the biclustering algorithms, which can capture large average sub matrices within a high dimensional data matrix. It has gained increasing popularity in many fields such as biological data analysis and financial forecasting. However, due to urgent requirements for high performance in large scale data processing applications, high performance parallel solutions...
Based on Xilinx's Virtex-II Pro series device XC2VP30 FPGA (Field Programmable Gate Array) chip, we have designed the system to implement remote high-precision time data acquisition, control and processing using TCP/IP communication protocol. This paper describes the design and implement of the FPGA-based hardware platform and software, and the design of ethernet human-computer interaction interface...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.