The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As an important nonlinear filter theory, the particle filter(PF) is a heated issue in domestic and foreign researches. The option of importance density and resampling are the key steps of particle filter algorithm. The application of UKF algorithm based on SSUT to create the importance probability density function(PDF), with the particle swarm optimization(PSO), can form a new algorithm of particle...
A medical image retrieval system combined of the low-level image feature and high-level semantic is used in the paper witch includes two main parts: image preprocessing and the machine learning. In the first part, feature tree structure is presented to reduce the semantic gap and in the latter part, a novel machine learning method based on SVM is presented to optimize the Network parameters by which...
Differential Power Analysis (DPA) is a powerful Side-Channel Attack (SCA) targeting as well symmetric as asymmetric ciphers. Its principle is based on a statistical treatment of power consumption measurements monitored on an Integrated Circuit (IC) computing cryptographic operations. A lot of works have proposed improvements of the attack, but no one focuses on ordering measurements. Our proposal...
For decentralized control problems with quadratically invariant information constraints, the optimal controller may be found efficiently. In this paper, we show that there are systems which are not quadratically invariant but reduce to systems that are. We call the requisite property internal quadratic invariance. We present an associated reduction procedure, and illustrate our method with examples.
Z Formal method not only can improve correctness and reliability of software, but also improve development efficiency. Although Z specifications have been widely studied in literatures, very little work is involved in definition and use of variables. This paper discussed on definition and use of variables by an example. Finally, it is applied to data flow analysis and data dependent analysis.
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
This paper proposes a new token structure for efficient handling of identity access management for online composite software services. With the requirement of ??Single Sign-On (SSO)?? for atomic services in a given composite service, this token structure binds service attributes, including workflow, providers, users, operator permission, and operation environment, together in its creation process...
Service-oriented computing advocates the development of new software or services on the basis of existing services. This paradigm shows a great potential of achieving high productivity and low cost, but it faces a challenge in efficiently and correctly using existing services in producing a new application and ensuring its reliability. Building a formal model using a formal specification language...
The IEEE 802.11e and the IEEE 802.11n focus on quality of service (QoS) and enhancements for high throughput respectively. Modern wireless LAN (WLAN) products should integrate both features. This paper presents a design of a high throughput MAC with QoS guarantee which combines the hybrid coordination function (HCF) of the 802.11e with the frame aggregation technique in the 802.11n. The basic idea...
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access rights as an attribute of a graph node, and the use of a resource as a predicate on an edge of the graph. We also propose to model cloud computation semantically as a set of paths in a subgraph of the cloud such that every edge...
Nowadays, how to efficiently compose Web services has become a hotspot. In this paper, we introduce a method of recommending an optimal service sequence based on the original service sequence for a composite service. This method uses a Bayesian-based approach and selects the service sequence that has the largest probability as the best choice. Compared with existing methods, this method has two advantages:...
The present paper considers distributed consensus algorithms for agents evolving on a connected compact homogeneous (CCH) manifold. The agents track no external reference and communicate their relative state according to an interconnection graph. The paper first formalizes the consensus problem for synchronization (i.e. maximizing the consensus) and balancing (i.e. minimizing the consensus); it thereby...
This paper studies the ISS (input-to-state stability) for a class of HDS (hybrid dynamical systems). By using the concept of hybrid time for HDS, two kinds of ISS notions are proposed. They are called the first ISS property and the second ISS property of HDS. By employing the ISS properties on continuous and/or discrete dynamics in the HDS, the first and second ISS properties for the whole HDS are...
We present a Chu spaces semantics of typical control flow of BPEL including fault handling and link semantics. BPELcf is proposed as a simplification of this subset of BPEL. For the compositional modeling of BPEL, we present a Chu spaces process algebra consisting of seven operators. These operators allow faults to be thrown at any point of execution and take link-based synchronization into consideration...
In recent decade, DRM (digital rights management) has focused on security techniques for solving the issues as the malicious copy, free dissemination and unrestricted abuse of digital contents or assets. Whereas some increasingly enhanced security policies, which were implemented at contents provider-side or user-side, have not brought about optimal utilities for participants in the contents value...
Despite its simplicity (two controllers and otherwise LQG), Witsenhausen's counterexample is one of the long-standing open problems in stochastic distributed control. Recently, it was proved that an asymptotic vector ??relaxation?? can be solved to within a constant factor of the optimal cost. A parallel result is shown here for the original scalar problem. Between linear strategies and explicit-signalling-based...
In the analysis of optimal control problems with state constraints, a key step (establishing `metric regularity') is to show that an arbitrary state trajectory can be approximated by a feasible state trajectory, whose distance from the original state trajectory is linearly related to the state constraint violation. It is then possible, for example, to give conditions for the state constraint maximum...
In this note, the novel representation is proposed for a linear periodic continuous-time system with T-periodic real-valued coefficients. We prove that a T-periodic real-valued factor and two real-valued matrix exponential functions can be extracted from a state transition matrix, while, in the well-known Floquet representation theorem, a 2T-periodic real-valued factor and a real-valued matrix exponential...
In this paper, the problem of feedback equivalence to a passive system is studied for a class of nonlinear stochastic systems. Based on a nonlinear stochastic KYP lemma, we investigate the relationship between a passive system and the corresponding zero-output system, which sustains a different result from the deterministic case. Following the stochastic passivity theory, a sufficient condition is...
We consider generalized noncooperative Nash games with ??shared constraints?? in which there is a common constraint that players' strategies are required to satisfy. We address two shortcomings that the associated generalized Nash equilibrium (GNE) is known to have: (a) shared constraint games usually have a large number (often a manifold) of GNEs and (b) the GNE may not be the appropriate solution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.