The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, Au et al. proposed a hierarchical identity-based signature scheme and Hu-Huang proposed a proxy key generation protocol. Based on the both schemes, we present a novel identity-based proxy signature scheme. The proposed scheme is provablly secure in the standard model and its security can be reduced to the hardness assumption of the g-strong Diffie-Hellman problem. Compared with all existing...
Let E{inn} = {xk = 1, xi + xj = xk, xi · xj = xk : i, j, k ∈ {1, …, n}}. For a positive integer n, let f (n) denote the smallest non-negative integer b such that for each system S ⊆ En with a solution in non-negative integers x1, …, xn there exists a solution of S in non-negative integers not greater than b. We prove that if a function Γ : ℕ \ {0} → ℕ is computable, then f dominates Γ i.e. there exists...
We study the effect of external infection sources on phase transitions in epidemic processes. In particular, we consider an epidemic spreading on a network via the SIS/SIR dynamics, which in addition is aided by external agents — sources unconstrained by the graph, but possessing a limited infection rate or virulence. Such a model captures many existing models of externally aided epidemics, and finds...
Fault-tolerance is one of the most important factors in designing networks. Failures in networks are sometimes caused by an event occurring in specific geographical regions such as hurricanes, earthquakes, bomb attacks, and Electromagnetic Pulse (EMP) attacks. In INFOCOM 2012, Neumayer et al. introduced geographical variants of max-flow min-cut problems in a circular disk failure model, in which each...
This paper proposes a new elementary operation approach (EOA) to multidimensional (-D) realization and linear fractional representation (LFR) modeling for multi-input and multi-output (MIMO) -D systems, as an extension of the new EOA proposed for the single-input and single-output (SISO) case by the authors recently. It is shown that, due to the substantial differences between the SISO and MIMO...
This paper presents a new kind of non-uniform splines, called non-uniform hyperbolic blending B-splines defined on a given knot sequence T, generated over the space Ωk[T]=span{sinht, cosht, tsinht, tcosht, 1, t, …,tk-5} in which k is an arbitary integer larger than or equal to 5. Non-uniform hyperbolic blending B-splines share most of the properties as those of the traditional B-splines. We give the...
This paper introduces QC2AS which is a newly designed and developed computer algebra system for symbolic quantum chemical computations. With the rapid advancement of computer, the concern with high-level model chemistry has been growing. To handle such models, it is necessary to manipulate huge algebraic formulas. QC2AS has been designed to handle algebraic formulas appeared in quantum chemistry and...
The identification algorithm of correlation analysis is understood easily. But the calculation amount is very large. The optimizing space was selected appropriately. Then the Fibonacci sequence was introduced into the algorithm. Variable step based on modified Fibonacci sequence was used to optimize the model parameters. The result of simulation indicates that the calculation amount is decreased and...
Within the scope of linear theory the transmission of signal or its fragment into the spectral sphere with one of the discrete basis of Fourier-analysis is given, further the signal spectrum of given algorithms transforms into the algebraic polynomial.
This paper studies the difference in computational power between the mesh-connected parallel computers equipped with dynamically reconfigurable bus systems and those with static ones. The mesh with separable buses (MSB) is the mesh-connected computer with dynamically reconfigurable row/column buses. The broadcasting buses of the MSB can be dynamically sectioned into smaller bus segments by program...
In this paper, we show that the singularities of C-Bézier curves can be controlled, and we prove that if a nth degree C-Bézier curve has a singular point, then it can be explicitly computed. It is useful when using C-Bézier curves for curve and surface modeling.
A proposed model for triangular DP surfaces provided in has been found that there is an inappropriate property in its recurrence formulae. That is, it is lack of convexity, i.e., summation of all blending functions for each degree is not equal to one. Although, Later in 2009, A new model of triangular DP surfaces has been proposed, however, this model is still not satisfied linearly independent property...
This article proposes a new algorithm for finding all intersections between two planar curves within a given domain. The algorithm is a hybrid between subdivision and iterative methods. We use a test based on Kantorovich's theorem to detect the starting point where Newton's method converges quadratically and the subdivision scheme to exclude certain regions that do not contain any intersections. Our...
In this paper, we have studied in depth hyperbolic polynomial uniform B-spline model with shape parameters. Based on this model, we have given an example of freedom curve modeling, and analyzed the effect that different shape parameters have on the change of the shape of the curves. We also developed a space freedom surface modeling system (SFSMS) on the Microsoft computer. Through the system, we...
A new model of triangular Ball surface is proposed with its quadratic complexity. It can be constructed from the idea of Wang-Ball univaritate functions and Wang algorithm. The new bivariate basis functions look analogous to the Wang-Ball polynomials. Evaluating points on a curve can be calculated from the new recursive algorithm that is proved to be quadratic, O(n2). Thus, the calculation time is...
A recent proposed model for triangular DP surfaces provided in has been found that there is an inappropriate property in its recurrence formulae. It is lack of convexity, i.e., the summation of blending functions is not equal to one. This paper presents a new triangular DP surfaces that possesses the convexity property and quadratic evaluation complexity. These two characteristics are realized to...
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks. The evaluation method is to corrupt the data of each packet which is produced by a random number generator...
The paper is devoted to problem of spline approximation. A new method of nodes location for curves and surfaces computer construction by means of B-splines and results of simulink-modeling is presented. The advantages of this paper is that we comprise the basic spline with classical polynomials both on accuracy, as well as degree of paralleling calculations are also shown.
Tissue-like P systems with cell division is a computing model in the framework of membrane computing based on the intercellular communication and cooperation between neurons. In such a model, the structure of the devices is a network of elementary cells. Tissue-like P systems with cell division have the ability of increasing the number of cells during the computation. In this paper we exploit this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.