The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, digital signature schemes are widely used in electronic commerce. Thus, various digital signature schemes are proposed to make the electronic transactions more convenient. In 2007, Chung et al. proposed an ID-based digital signature scheme on elliptic curve cryptosystem (ECC). They claimed that their scheme is secure because it is based upon the difficulty of elliptic curve discrete logarithm...
Mobile agent technology is going to play an important role in the future electronic commerce due to the characteristics of mobility and autonomy of the agents. Therefore, security issues should be solved before we use this new technology. However, privacy protection of customers is seldom considered. In this paper, we focus on the privacy protection of customers. Moreover, we improve our scheme more...
The National Institute of Standards and Technology give the following definition: "Digital rights management is a system of information technology components and services along with corresponding law, policies and business models which strives to distribute and control intellectual property and its right." However, most existing DRM systems are designed for powerful protection. The portability...
DSA and ECDSA are two standard signatures, which have been fully discussed and well accepted. However, they both lack functionality of proxy signature. On the other hand, most of the proxy signature schemes, which have been proposed prior to this date, are seldom based on standard signatures. Consequently, most proxy signature schemes have been considered infeasible due to obvious security weaknesses...
Enhancing transactional performance for XML metadata knowledge bases (XMKBs) is crucial, as XML is widely used to describe metadata in knowledge bases for data integration. In XMKBs, XML elements, attributes, and texts illustrate knowledge entities' types and contents, while the parent/child and ID/IDREF(s) relationships state the associations among knowledge entities. XML documents in XMKBs exhibit...
Perceptual audio hashing has been applied in audio content identification, retrieval and indexing for its accuracy and perceptual robustness. Security issue becomes important when perceptual hashing is applied in audio content authentication. A key-dependent compressed domain perceptual audio hashing algorithm for audio content authentication is proposed. A randomization scheme controlled by a random...
With the development of pervasive computing, location information remains a crucial component of context-aware. The ability to provide multimedia service according to users' locations would be attractive for intelligent tourism, shopping guide, etc. In this paper, we present a prototype system for location-based multimedia service as a guideline to design such application systems. Based on this prototype...
Support vector regression (SVR) is now a well-established method for non-stationary series forecasting, because of its good generalization ability and guaranteeing global minima. However, only using SVR hardly get satisfied accuracy for complicated frequency spectrum prediction in frequency monitor system (FMS) of high frequency radar. Empirical mode decomposition (EMD) is perfectly suitable for nonlinear...
The problem of the synchronous drive for gantry-moving milling machines is researched in the paper. Two same linear motors are used as drive mechanisms of synchronous feed. The dynamic compensated method is adopted, effectively limiting the falling of the system's performance which is produced by the changing of the equivalent inertia. At the same time, puting the fuzzy PID controller in the velocity...
A new particle swarm optimization characterized by sensation is presented to improve the limited capability of regular particle swarm optimization in exploiting history experience (iwPSO). It guides individuals to behave reasonably with the capability of self-adaptation in activities of self-cognition according to the sensation model. Considering the complexity of a swarm intelligent system at the...
In this paper, a new class of factorial calculus systems is proposed. Based upon the latter, simpler algorithms and electronic systems aiming at permutations generation, are developed.
The paper develops an inexact penalty function method to solve a bi-level multi-commodity optimal tolls problem. After reducing the original problem to a single-level one by solving an auxiliary linear or quadratic programming problem, the said mathematical program's objective function is penalized and treated as an unconstrained minimization problem. Convergence of the proposed algorithm is also...
The paper describes a version of the inexact Newton algorithm to solve nonlinear complementarity problems (NCP). New classes of NCP are specified for which the inexact Newton method globally converges at the superlinear rate. Moreover, an inner step accuracy control technique is developed and applied to the inexact Newton method to optimize the total computational cost. Finally, two forms of implementation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.