首页 > 最新文献

Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)最新文献

英文 中文
Research of Real-time Forecast Technology in Fault of Missile Guidance System Based on Grey Model and Data Fusion 基于灰色模型和数据融合的导弹制导系统故障实时预测技术研究
Xinguo Wang, Aihua Li, Xiaoping Zhou, Hualong Xu
To solve fault forecast in missile guidance system, a new fault forecast method was presented, in which the grey system and multiple-sensor data fusion were used. Grey Model (GM) forecast is invalid when the data sequence is zero-mean random process, to overcome the drawback, present an improved GM method. The simulation results show the fault forecast method has better performance in missile guidance systems.
针对导弹制导系统故障预测问题,提出了一种基于灰色系统和多传感器数据融合的故障预测方法。针对数据序列为零均值随机过程时灰色模型预测无效的缺点,提出了一种改进的灰色模型预测方法。仿真结果表明,该方法在导弹制导系统中具有较好的故障预测效果。
{"title":"Research of Real-time Forecast Technology in Fault of Missile Guidance System Based on Grey Model and Data Fusion","authors":"Xinguo Wang, Aihua Li, Xiaoping Zhou, Hualong Xu","doi":"10.1109/SNPD.2007.18","DOIUrl":"https://doi.org/10.1109/SNPD.2007.18","url":null,"abstract":"To solve fault forecast in missile guidance system, a new fault forecast method was presented, in which the grey system and multiple-sensor data fusion were used. Grey Model (GM) forecast is invalid when the data sequence is zero-mean random process, to overcome the drawback, present an improved GM method. The simulation results show the fault forecast method has better performance in missile guidance systems.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123556977","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids 基于自适应复制的网格安全容错作业调度
Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao
Most of the existing job scheduling algorithms for grids have ignored the security problem with a handful of exceptions. Moreover, existing algorithms using fixed- number job replications will consume excessive resources when grid security level changes dynamically. In this paper, a security aware and fault tolerant scheduling (SAFTS) algorithm based on adaptive replication is proposed which schedules the jobs by matching the user security demand and resource trust level and the number of the job replications changes adaptively with the dynamic of grid security. In experiments on RSBSME (remote sensing based soil moisture extraction) workload in a real grid environment, the average job scheduling success rate is 97%, and average grid utilization is 74%. Experiment results show that performance of SAFTS is better than non-security-aware and fixed-number job replication scheduling algorithms and SAFTS is fault-tolerant and scalable.
现有的网格作业调度算法大多忽略了安全问题,只有少数例外。此外,当网格安全级别发生动态变化时,使用固定数量作业副本的现有算法会消耗过多的资源。本文提出了一种基于自适应复制的安全感知容错调度算法,该算法通过匹配用户安全需求和资源信任级别来调度作业,并且作业复制的数量随网格安全的动态变化而自适应变化。在真实网格环境下RSBSME(遥感土壤水分提取)工作负载的实验中,平均作业调度成功率为97%,平均网格利用率为74%。实验结果表明,该调度算法的性能优于非安全感知和固定数量的作业复制调度算法,具有容错性和可扩展性。
{"title":"Adaptive Replication Based Security Aware and Fault Tolerant Job Scheduling for Grids","authors":"Congfeng Jiang, Cheng Wang, Xiaohu Liu, Yinghui Zhao","doi":"10.1109/SNPD.2007.292","DOIUrl":"https://doi.org/10.1109/SNPD.2007.292","url":null,"abstract":"Most of the existing job scheduling algorithms for grids have ignored the security problem with a handful of exceptions. Moreover, existing algorithms using fixed- number job replications will consume excessive resources when grid security level changes dynamically. In this paper, a security aware and fault tolerant scheduling (SAFTS) algorithm based on adaptive replication is proposed which schedules the jobs by matching the user security demand and resource trust level and the number of the job replications changes adaptively with the dynamic of grid security. In experiments on RSBSME (remote sensing based soil moisture extraction) workload in a real grid environment, the average job scheduling success rate is 97%, and average grid utilization is 74%. Experiment results show that performance of SAFTS is better than non-security-aware and fixed-number job replication scheduling algorithms and SAFTS is fault-tolerant and scalable.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"21 7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123584480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Quantum Information Security Protocols and Quantum Coding Theory 量子信息安全协议和量子编码理论
Xin Lü, Zhi Ma
Quantum computation has important impacts on information security and modern cryptography. In 1994, Shor demonstrated that the problem of finding the prim factors of an integer, and the so called "discrete logarithm problem" could be solved efficiently on a quantum computer. Quantum information can also be proved to devise unconditionally secure cryptography protocols. In this paper, we introduce the most recent research progress in quantum information security and quantum coding theory and review several quantum quantum cryptography protocols that we have proposed.
量子计算对信息安全和现代密码学有着重要的影响。1994年,肖尔证明了找到整数的质数因子的问题,以及所谓的“离散对数问题”可以在量子计算机上有效地解决。量子信息也可以用来设计无条件安全的密码协议。本文介绍了量子信息安全和量子编码理论的最新研究进展,并对我们提出的几种量子量子密码协议进行了综述。
{"title":"Quantum Information Security Protocols and Quantum Coding Theory","authors":"Xin Lü, Zhi Ma","doi":"10.1109/SNPD.2007.476","DOIUrl":"https://doi.org/10.1109/SNPD.2007.476","url":null,"abstract":"Quantum computation has important impacts on information security and modern cryptography. In 1994, Shor demonstrated that the problem of finding the prim factors of an integer, and the so called \"discrete logarithm problem\" could be solved efficiently on a quantum computer. Quantum information can also be proved to devise unconditionally secure cryptography protocols. In this paper, we introduce the most recent research progress in quantum information security and quantum coding theory and review several quantum quantum cryptography protocols that we have proposed.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125273181","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Risk Control Model of Cooperatively Technical Innovation based on Wavelet and Nerve Network 基于小波和神经网络的协同技术创新风险控制模型研究
Changhui Yang
Innovation is the impetus and source of enterprise development, and the cooperatively technical innovation is become a main innovation method. It is necessary to take measure to prevent and indemnify the loss that the risk may bring. Because of the existence of the complex non-linear function mechanism between the risk factors, so the non-linear method can be used to research the keeping way and controlling mechanism of cooperatively technical innovation. At first, this paper analyzed the seeking method of enterprise cooperatively technical innovation risk, and the steps of seeking risks are presented. And then the concept of controlling risk regulation gradient is put forward, and the method of calculating risk regulation gradient is expatiated in detail. The nerve network is suitable for recognizing and simulating nonlinear system, and the wavelet transformation or the decomposition displays the good time frequency localization characteristic and the multi-criteria function, therefore the wavelet nerve network based on the wavelet decomposition and the nerve network has the good fault-tolerant ability and the non-linearity approaching performance. And based on this, a complete controlling risk model of cooperatively technical innovation is brought forward, and the algorithm of risk control model is discussed.
创新是企业发展的动力和源泉,合作技术创新已成为企业发展的主要创新方式。有必要采取措施预防和赔偿风险可能带来的损失。由于风险因素之间存在着复杂的非线性作用机制,因此可以采用非线性方法研究合作技术创新的保持方式和控制机制。本文首先分析了企业合作技术创新风险的寻踪方法,提出了企业合作技术创新风险寻踪的步骤。然后提出了控制风险调节梯度的概念,并详细阐述了风险调节梯度的计算方法。神经网络适合于识别和模拟非线性系统,而小波变换或分解具有良好的时频局部化特性和多准则函数,因此基于小波分解和神经网络的小波神经网络具有良好的容错能力和非线性逼近性能。在此基础上,提出了一个完整的合作技术创新风险控制模型,并讨论了风险控制模型的算法。
{"title":"Research on Risk Control Model of Cooperatively Technical Innovation based on Wavelet and Nerve Network","authors":"Changhui Yang","doi":"10.1109/SNPD.2007.498","DOIUrl":"https://doi.org/10.1109/SNPD.2007.498","url":null,"abstract":"Innovation is the impetus and source of enterprise development, and the cooperatively technical innovation is become a main innovation method. It is necessary to take measure to prevent and indemnify the loss that the risk may bring. Because of the existence of the complex non-linear function mechanism between the risk factors, so the non-linear method can be used to research the keeping way and controlling mechanism of cooperatively technical innovation. At first, this paper analyzed the seeking method of enterprise cooperatively technical innovation risk, and the steps of seeking risks are presented. And then the concept of controlling risk regulation gradient is put forward, and the method of calculating risk regulation gradient is expatiated in detail. The nerve network is suitable for recognizing and simulating nonlinear system, and the wavelet transformation or the decomposition displays the good time frequency localization characteristic and the multi-criteria function, therefore the wavelet nerve network based on the wavelet decomposition and the nerve network has the good fault-tolerant ability and the non-linearity approaching performance. And based on this, a complete controlling risk model of cooperatively technical innovation is brought forward, and the algorithm of risk control model is discussed.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122371452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code 影响基于Turbo码的分布式视频编解码器解码复杂度的因素
Sheng Fang, Yongquan Liang, Shenyuan Li
The distributed video coding (DVC) is a new coming video compression technology that utilizes a different computing complexity mode from the traditional video codec. As a new paradigm there are some fundamental and hard questions in DVC that are not sufficiently addressed, for example the complexity balance between DVC encoder and decoder. This will be an important factor for some promising real time applications. In this context, this paper studies the factors which affect the decoding complexities of turbo code based DVC, especially focuses on quantization, side information and turbo code bit rates. Analyzing and simulation results show that precise side information will decrease the turbo decoding complexity, large reductions in computations can be traded against relatively small increases in bit rate, and uniform quantizer possesses the advantage than the non-uniform quantizer in computation load at a expense of a little decrease in rate distortion performance.
分布式视频编码(DVC)是一种新兴的视频压缩技术,它采用了一种不同于传统视频编解码器的计算复杂度模式。DVC作为一种新的编码范式,存在着一些基础性和难点性的问题,如编码器和解码器之间的复杂性平衡问题,目前还没有得到充分的解决。对于一些有前途的实时应用程序来说,这将是一个重要的因素。在此背景下,本文研究了影响基于DVC的turbo码译码复杂度的因素,重点研究了量化、侧信息和turbo码比特率。分析和仿真结果表明,精确的侧信息可以降低turbo解码的复杂度,大大减少计算量可以换来相对较小的比特率增加,均匀量化器比非均匀量化器在计算量方面具有优势,但速率失真性能略有下降。
{"title":"What Affects Decoding Complexity of Distributed Video Codec Based on Turbo Code","authors":"Sheng Fang, Yongquan Liang, Shenyuan Li","doi":"10.1109/SNPD.2007.139","DOIUrl":"https://doi.org/10.1109/SNPD.2007.139","url":null,"abstract":"The distributed video coding (DVC) is a new coming video compression technology that utilizes a different computing complexity mode from the traditional video codec. As a new paradigm there are some fundamental and hard questions in DVC that are not sufficiently addressed, for example the complexity balance between DVC encoder and decoder. This will be an important factor for some promising real time applications. In this context, this paper studies the factors which affect the decoding complexities of turbo code based DVC, especially focuses on quantization, side information and turbo code bit rates. Analyzing and simulation results show that precise side information will decrease the turbo decoding complexity, large reductions in computations can be traded against relatively small increases in bit rate, and uniform quantizer possesses the advantage than the non-uniform quantizer in computation load at a expense of a little decrease in rate distortion performance.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Encryption solution in Digital Trunking System 数字集群系统中的一种加密解决方案
Wei Chongyu, Wang Chengjin, Zhou Chunlin
An encryption solution completed in a DTS is introduced. This solution consists of system management for cipher key and E2EE. For cipher key management, a server is used in the system. The E2EE is designed on the basis of a platform using OMAP5910 as a primary processor. Interface for information exchange is depicted in brief.
介绍了一种在DTS中完成的加密解决方案。该方案由密钥系统管理和E2EE两部分组成。对于密码密钥管理,系统中使用服务器。E2EE是在使用OMAP5910为主处理器的平台上设计的。简要描述了信息交换接口。
{"title":"An Encryption solution in Digital Trunking System","authors":"Wei Chongyu, Wang Chengjin, Zhou Chunlin","doi":"10.1109/SNPD.2007.149","DOIUrl":"https://doi.org/10.1109/SNPD.2007.149","url":null,"abstract":"An encryption solution completed in a DTS is introduced. This solution consists of system management for cipher key and E2EE. For cipher key management, a server is used in the system. The E2EE is designed on the basis of a platform using OMAP5910 as a primary processor. Interface for information exchange is depicted in brief.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"270 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122720161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research on the Construct Technology of the Test System Based on the Network 基于网络的考试系统构建技术研究
Q. Feng, Meng Chen
This paper analyses completely the general network models and network structure patterns currently and discusses their characteristics and implementation approaches. The paper also summarizes similarities and differences of these network models and their merits and disadvantages. Based on the above research, the paper puts forward the thought of system design for test system based on network .The test system has changed from the previous concentrative mode to the distributive mode which is on the network and it should develop into the system with the qualities of openness, inter-operability, networking. The networking test nodes should possess the qualities as extensibility and communality. This paper also discusses the software design of the test system model based on the network and puts forward a kind of design plan for the structure of the networked test system that adopts the hierarchy plus the functional interface. The software design of networked test system closely encompasses the thought of modularization, generalization and standardization.
本文全面分析了目前常用的网络模型和网络结构模式,讨论了它们的特点和实现途径。本文还总结了这些网络模型的异同以及各自的优缺点。在此基础上,本文提出了基于网络的测试系统的系统设计思想,测试系统已由以往的集中式模式转变为基于网络的分布式模式,应向开放、互操作、网络化的系统发展。网络测试节点应具有可扩展性和共通性。本文还讨论了基于网络的测试系统模型的软件设计,提出了一种采用层次结构+功能接口的网络化测试系统结构设计方案。网络化考试系统的软件设计紧密地包含了模块化、通用化和标准化的思想。
{"title":"The Research on the Construct Technology of the Test System Based on the Network","authors":"Q. Feng, Meng Chen","doi":"10.1109/SNPD.2007.423","DOIUrl":"https://doi.org/10.1109/SNPD.2007.423","url":null,"abstract":"This paper analyses completely the general network models and network structure patterns currently and discusses their characteristics and implementation approaches. The paper also summarizes similarities and differences of these network models and their merits and disadvantages. Based on the above research, the paper puts forward the thought of system design for test system based on network .The test system has changed from the previous concentrative mode to the distributive mode which is on the network and it should develop into the system with the qualities of openness, inter-operability, networking. The networking test nodes should possess the qualities as extensibility and communality. This paper also discusses the software design of the test system model based on the network and puts forward a kind of design plan for the structure of the networked test system that adopts the hierarchy plus the functional interface. The software design of networked test system closely encompasses the thought of modularization, generalization and standardization.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122173838","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Advances of Research in Fuzzy Integral for Classifiers' fusion 模糊积分在分类器融合中的研究进展
Z. Kong, Zixing Cai
Fuzzy Integral is compared with other two methods which are hot in studying of classifiers' fusion. The standard model of fuzzy integral and its general solution are introduced. Then, the state of the art and the challenge problems in fuzzy integral research field are discussed. The algorithms for standard and extended fuzzy integral models are briefly analyzed. Finally, the open areas of theoretic and applied research in fuzzy integral are brought forward.
对分类器融合研究中比较热门的另外两种方法进行了比较。介绍了模糊积分的标准模型及其通解。然后讨论了模糊积分研究领域的现状和面临的挑战。简要分析了标准模糊积分模型和扩展模糊积分模型的算法。最后,提出了模糊积分在理论和应用研究方面有待开拓的领域。
{"title":"Advances of Research in Fuzzy Integral for Classifiers' fusion","authors":"Z. Kong, Zixing Cai","doi":"10.1109/SNPD.2007.422","DOIUrl":"https://doi.org/10.1109/SNPD.2007.422","url":null,"abstract":"Fuzzy Integral is compared with other two methods which are hot in studying of classifiers' fusion. The standard model of fuzzy integral and its general solution are introduced. Then, the state of the art and the challenge problems in fuzzy integral research field are discussed. The algorithms for standard and extended fuzzy integral models are briefly analyzed. Finally, the open areas of theoretic and applied research in fuzzy integral are brought forward.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128601931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Phase Unwrapping Algorithm for 3D Reconstruction 三维重建的相位展开算法
Hong Zhang, H. Su, X. Su
Phase unwrapping algorithms play an important role in noncontact optical profilometries such as phase-measuring profilometry. The depth information of the measured object is implicitly defined by certain trigonometric equations derived from image data. The direct solutions to the equations, called the wrapped phases, have a limited range from -pi to pi. The main computational problem is to unwrap the wrapped phases over the entire image. This phase unwrapping process is often hindered by the presence of noises, spots of low intensity modulation, and instability of the solutions. We present a novel approach to the problem by formulating the phase solving and unwrapping as an ill-posed problem. By using the regularization method, we will be able to provide a unified view to address various challenges in the problem. A new fully automated algorithm for phase unwrapping based on this approach is also presented.
相位展开算法在相位测量等非接触式光学轮廓测量中起着重要的作用。被测物体的深度信息由图像数据导出的三角方程隐式定义。方程的直接解,称为包裹相,在-到之间有一个有限的范围。主要的计算问题是在整个图像上展开被包裹的相位。这种相位展开过程经常受到噪声、低强度调制点和溶液不稳定性的阻碍。我们提出了一种新的方法来解决这个问题,将阶段求解和展开表述为一个不适定问题。通过使用正则化方法,我们将能够提供一个统一的视图来解决问题中的各种挑战。在此基础上提出了一种新的全自动相位展开算法。
{"title":"Phase Unwrapping Algorithm for 3D Reconstruction","authors":"Hong Zhang, H. Su, X. Su","doi":"10.1109/SNPD.2007.283","DOIUrl":"https://doi.org/10.1109/SNPD.2007.283","url":null,"abstract":"Phase unwrapping algorithms play an important role in noncontact optical profilometries such as phase-measuring profilometry. The depth information of the measured object is implicitly defined by certain trigonometric equations derived from image data. The direct solutions to the equations, called the wrapped phases, have a limited range from -pi to pi. The main computational problem is to unwrap the wrapped phases over the entire image. This phase unwrapping process is often hindered by the presence of noises, spots of low intensity modulation, and instability of the solutions. We present a novel approach to the problem by formulating the phase solving and unwrapping as an ill-posed problem. By using the regularization method, we will be able to provide a unified view to address various challenges in the problem. A new fully automated algorithm for phase unwrapping based on this approach is also presented.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130617428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A Strong RSA Signature Scheme and Its Application 一个强RSA签名方案及其应用
Zhengjun Cao, Lihua Liu
We present an efficient improvement of the strong RSA signature scheme [1], which is very similar to Fischlin sig nature [2]. Both two signatures are based on strong RSA assumption. In the original scheme, the signer has to choose a prime with prescribed length in signing phase. Except that, three generators of QRn should be chosen in the set-up phase. Our scheme removes or relaxes these restrictions. It only needs to choose two generators of QRn and an odd. Our scheme saves about 1/2 computational cost of the original scheme. Moreover, we propose a blind signature scheme and a partially blind signature scheme based on the basic scheme. To the best of our knowledge, it's the first time to propose such a blind signature scheme and a partially blind signature scheme based on strong RSA assumption.
我们提出了一种有效改进的强RSA签名方案[1],它与Fischlin签名性质[2]非常相似。这两种签名都基于强RSA假设。在原方案中,签名者必须在签名阶段选择一个规定长度的素数。除此之外,在设置阶段应选择三个QRn发生器。我们的方案取消或放宽了这些限制。它只需要选择两个QRn和一个奇数的生成器。本方案比原方案节省约1/2的计算量。在此基础上,提出了一种盲签名方案和一种部分盲签名方案。据我们所知,这是第一次提出这样的盲签名方案和基于强RSA假设的部分盲签名方案。
{"title":"A Strong RSA Signature Scheme and Its Application","authors":"Zhengjun Cao, Lihua Liu","doi":"10.1109/SNPD.2007.33","DOIUrl":"https://doi.org/10.1109/SNPD.2007.33","url":null,"abstract":"We present an efficient improvement of the strong RSA signature scheme [1], which is very similar to Fischlin sig nature [2]. Both two signatures are based on strong RSA assumption. In the original scheme, the signer has to choose a prime with prescribed length in signing phase. Except that, three generators of QRn should be chosen in the set-up phase. Our scheme removes or relaxes these restrictions. It only needs to choose two generators of QRn and an odd. Our scheme saves about 1/2 computational cost of the original scheme. Moreover, we propose a blind signature scheme and a partially blind signature scheme based on the basic scheme. To the best of our knowledge, it's the first time to propose such a blind signature scheme and a partially blind signature scheme based on strong RSA assumption.","PeriodicalId":197058,"journal":{"name":"Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123507285","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1