首页 > 最新文献

2013 5th International Conference on Intelligent Networking and Collaborative Systems最新文献

英文 中文
Public Key Encryption with Ranked Multi-keyword Search 公钥加密与排名多关键字搜索
Chengyu Hu, Pengtao Liu
It is necessary for the cloud server to allow multi-keyword query and provide result ranking to effectively retrieve data from the large number of encrypted data stored in the cloud storage. A related work that support privacy preserving ranked multi-keyword search over encrypted cloud data (MRSE) is not in public-key model. In this paper, the definition of an extension of PEKS called Public-Key Encryption with Ranked Multi-Keyword Search(PERMKS) is proposed, which means that the receiver could query any subset of keywords and the number of queried keywords appearing in the data can be provided which evaluate the similarity ranking of the data to the search query. Then, a construction of public-key encryption with ranked multikeyword search scheme with sub-linear cipher texts based on anonymous hierarchical identity-based encryption (AHIBE) is put forward and its security is analyzed.
为了从存储在云存储中的大量加密数据中有效检索数据,云服务器必须支持多关键字查询并提供结果排序。一项支持在加密云数据(MRSE)上保持隐私的排序多关键字搜索的相关工作没有采用公钥模型。本文提出了PEKS的一种扩展,即PERMKS (Public-Key Encryption with ranking Multi-Keyword Search),即接收方可以查询任意关键字子集,并提供数据中出现的被查询关键字的个数,以评估数据与搜索查询的相似度排序。然后,提出了一种基于匿名分层身份加密(AHIBE)的亚线性密文分级多关键字搜索方案的公钥加密构造,并对其安全性进行了分析。
{"title":"Public Key Encryption with Ranked Multi-keyword Search","authors":"Chengyu Hu, Pengtao Liu","doi":"10.1109/INCoS.2013.24","DOIUrl":"https://doi.org/10.1109/INCoS.2013.24","url":null,"abstract":"It is necessary for the cloud server to allow multi-keyword query and provide result ranking to effectively retrieve data from the large number of encrypted data stored in the cloud storage. A related work that support privacy preserving ranked multi-keyword search over encrypted cloud data (MRSE) is not in public-key model. In this paper, the definition of an extension of PEKS called Public-Key Encryption with Ranked Multi-Keyword Search(PERMKS) is proposed, which means that the receiver could query any subset of keywords and the number of queried keywords appearing in the data can be provided which evaluate the similarity ranking of the data to the search query. Then, a construction of public-key encryption with ranked multikeyword search scheme with sub-linear cipher texts based on anonymous hierarchical identity-based encryption (AHIBE) is put forward and its security is analyzed.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131753032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Research of Space Robot Autonomous Operation Architecture 空间机器人自主操作体系结构研究
Hang Yin, Yongming Gao, Guoqiang Zeng, Chao Wang
Space robot has important economic and applied value, and the autonomous operation of the space robot is an important development direction in the application of the space robot. We proposed the multi-level architecture of autonomous operation for the space robot. Design the modeling language and frame in operation planning to make the autonomous control easier to implement. The various elements such as relationships, constraints and actions in the autonomous operation are described and modeled. The method of planning and scheduling is put up based on the case reasoning and planning scheduling of the object. So that to reduce the burden of the operator and reinforce the space robot operation task.
空间机器人具有重要的经济和应用价值,空间机器人的自主操作是空间机器人应用中的一个重要发展方向。提出了空间机器人自主操作的多层次体系结构。设计了运行规划中的建模语言和框架,使自主控制更容易实现。描述和建模自治操作中的各种元素,如关系、约束和操作。提出了基于案例推理和对象规划调度的规划调度方法。从而减轻操作者的负担,强化空间机器人的操作任务。
{"title":"Research of Space Robot Autonomous Operation Architecture","authors":"Hang Yin, Yongming Gao, Guoqiang Zeng, Chao Wang","doi":"10.1109/INCoS.2013.45","DOIUrl":"https://doi.org/10.1109/INCoS.2013.45","url":null,"abstract":"Space robot has important economic and applied value, and the autonomous operation of the space robot is an important development direction in the application of the space robot. We proposed the multi-level architecture of autonomous operation for the space robot. Design the modeling language and frame in operation planning to make the autonomous control easier to implement. The various elements such as relationships, constraints and actions in the autonomous operation are described and modeled. The method of planning and scheduling is put up based on the case reasoning and planning scheduling of the object. So that to reduce the burden of the operator and reinforce the space robot operation task.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130704818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Ultrahigh Speed AES Processor Method Based on FPGA 一种基于FPGA的超高速AES处理器方法
Xin Cai, Rong Sun, Jingwei Liu
The realization of an ultrahigh speed AES processor based on FPGA is proposed in this paper, which can generate secure information at a constant rate of dozens of Gbps. Having compared with some other researches in terms of structure of the processor, speed and latency, we develop ultrahigh speed architectures for a reformulated version of AES algorithm, which shows a greater superiority than other ones currently. The merit comes that: Firstly, the processor is able to process 128 bits data during each clock period, only bringing 10 clock periods latency and saving 4K storage space. Secondly, we used a same and symmetric pipelining structure but different connection order and stored different initial keys in inner register when designing decryption module. Thus, the processor seems to be an asymmetrical system. Thirdly, the method that data involved in multiplication in Galois field was stored in ROM is used as the key to guarantee the safety of data and prohibit tampering.
本文提出了一种基于FPGA的超高速AES处理器的实现,该处理器能够以数十Gbps的恒定速率生成安全信息。在处理器结构、速度和延迟等方面与其他研究进行比较后,我们开发了一种改进型AES算法的超高速架构,显示出比目前其他研究更大的优势。优点在于:首先,处理器能够在每个时钟周期内处理128位数据,只带来10个时钟周期的延迟,节省4K的存储空间。其次,在设计解密模块时,采用了相同对称的管道结构,但连接顺序不同,并且在内部寄存器中存储了不同的初始密钥。因此,处理器似乎是一个不对称的系统。第三,采用伽罗瓦域中涉及乘法的数据存储在ROM中的方法作为保证数据安全、防止篡改的关键。
{"title":"An Ultrahigh Speed AES Processor Method Based on FPGA","authors":"Xin Cai, Rong Sun, Jingwei Liu","doi":"10.1109/INCoS.2013.123","DOIUrl":"https://doi.org/10.1109/INCoS.2013.123","url":null,"abstract":"The realization of an ultrahigh speed AES processor based on FPGA is proposed in this paper, which can generate secure information at a constant rate of dozens of Gbps. Having compared with some other researches in terms of structure of the processor, speed and latency, we develop ultrahigh speed architectures for a reformulated version of AES algorithm, which shows a greater superiority than other ones currently. The merit comes that: Firstly, the processor is able to process 128 bits data during each clock period, only bringing 10 clock periods latency and saving 4K storage space. Secondly, we used a same and symmetric pipelining structure but different connection order and stored different initial keys in inner register when designing decryption module. Thus, the processor seems to be an asymmetrical system. Thirdly, the method that data involved in multiplication in Galois field was stored in ROM is used as the key to guarantee the safety of data and prohibit tampering.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Research on Polymorphism in Digital Text Watermarking 数字文本水印中的多态性研究
Yuanyuan Cheng, Jin Zhang, Xiaowei Liu, Qingcheng Li, Zhenlu Chen
Nowadays, the issues such as the thin algorithm, attack sensitivity, narrow applications restrict the development of text watermark technology. This paper purposes to coordinate multi-watermarking algorithms to work collaboratively by polymorphism watermarking algorithm: on the one hand, this paper hopes to seek the positive direction of watermarking development by way of expanding the embedding space, on the other hand, this paper hopes to use polymorphism watermarking to enhance the robustness of the system. At first, we extract the relevant classification characteristics on the basis of summarizing the existing algorithms. Then we discuss the defining polymorphism watermarking algorithm, and focus on the cooperative relations of the watermark information. By algorithm design, implementation and verification, the polymorphism watermarking algorithm proves to be effective to solve the issues including both limitation of the watermark embedding space and the attack sensitivity of a single algorithm.
目前,文本水印技术的发展受到瘦算法、攻击敏感性、应用范围狭窄等问题的制约。本文旨在通过多态水印算法来协调多种水印算法协同工作,一方面希望通过扩展嵌入空间来寻求水印发展的积极方向,另一方面希望利用多态水印来增强系统的鲁棒性。首先,我们在总结现有算法的基础上提取出相关的分类特征。然后讨论了多态水印算法的定义,重点讨论了水印信息之间的协作关系。通过算法的设计、实现和验证,证明了多态水印算法能够有效地解决水印嵌入空间的限制和单一算法攻击灵敏度的问题。
{"title":"Research on Polymorphism in Digital Text Watermarking","authors":"Yuanyuan Cheng, Jin Zhang, Xiaowei Liu, Qingcheng Li, Zhenlu Chen","doi":"10.1109/INCoS.2013.33","DOIUrl":"https://doi.org/10.1109/INCoS.2013.33","url":null,"abstract":"Nowadays, the issues such as the thin algorithm, attack sensitivity, narrow applications restrict the development of text watermark technology. This paper purposes to coordinate multi-watermarking algorithms to work collaboratively by polymorphism watermarking algorithm: on the one hand, this paper hopes to seek the positive direction of watermarking development by way of expanding the embedding space, on the other hand, this paper hopes to use polymorphism watermarking to enhance the robustness of the system. At first, we extract the relevant classification characteristics on the basis of summarizing the existing algorithms. Then we discuss the defining polymorphism watermarking algorithm, and focus on the cooperative relations of the watermark information. By algorithm design, implementation and verification, the polymorphism watermarking algorithm proves to be effective to solve the issues including both limitation of the watermark embedding space and the attack sensitivity of a single algorithm.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Combined Predictor for Item-Based Collaborative Filtering 基于项目协同过滤的组合预测器
Zhonghuo Wu, Jun Zheng, Su Wang, Hongfeng Feng
Collaborative filtering is one of most important technologies in the field of recommender systems, the process of making predictions about user preferences for products or services by learning known user-item relationships. In this paper, slope one and item-based nearest neighbor collaborative filtering algorithms are analyzed on the Movie Lens dataset. In order to obtain better accuracy and rationality, a new combined approach is proposed that takes advantages of slope one and item-based nearest neighbor model. In addition, simple gradient descent and bias effects are used further to improve performance. Finally, some experiments are implemented on the dataset, and the experimental results show that the proposed final solution achieves great improvement of prediction accuracy when compared to the method of using slope one or item-based nearest neighbor model alone.
协同过滤是推荐系统中最重要的技术之一,它通过学习已知的用户-物品关系来预测用户对产品或服务的偏好。本文在Movie Lens数据集上分析了斜率1和基于项目的最近邻协同过滤算法。为了获得更好的准确性和合理性,提出了一种新的结合斜率1和基于项目的最近邻模型的组合方法。此外,还使用了简单的梯度下降和偏置效应来进一步提高性能。最后,在数据集上进行了实验,实验结果表明,与单独使用斜率1或基于项的最近邻模型的方法相比,所提出的最终解决方案的预测精度有很大提高。
{"title":"A Combined Predictor for Item-Based Collaborative Filtering","authors":"Zhonghuo Wu, Jun Zheng, Su Wang, Hongfeng Feng","doi":"10.1109/INCoS.2013.46","DOIUrl":"https://doi.org/10.1109/INCoS.2013.46","url":null,"abstract":"Collaborative filtering is one of most important technologies in the field of recommender systems, the process of making predictions about user preferences for products or services by learning known user-item relationships. In this paper, slope one and item-based nearest neighbor collaborative filtering algorithms are analyzed on the Movie Lens dataset. In order to obtain better accuracy and rationality, a new combined approach is proposed that takes advantages of slope one and item-based nearest neighbor model. In addition, simple gradient descent and bias effects are used further to improve performance. Finally, some experiments are implemented on the dataset, and the experimental results show that the proposed final solution achieves great improvement of prediction accuracy when compared to the method of using slope one or item-based nearest neighbor model alone.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation 基于结构张量和全变分的纹理图像去噪算法
Caixia Li, Chanjuan Liu, Yilei Wang
For the existing problems of staircase effect, edge blur and uncertainty of parameter selection in the process of image denoising and recovery of variational partial differential equations, a novel total variation restoration model based on image structure tensor(STTV) is proposed. We introduce image structure tensor to construct the image structure control function instead of using Lagrange multiplier and local structure information to control Diffusion process, which has the performance of adjusting the balance of regular item and fidelity item in TV model according to different local structure information and keeping better detail features. Theoretical analysis and experiment comparing with other methods illustrate that STTV model is able to describe the image edges, textures and smooth areas more accurately and subtly, which has overcome staircase and over-smoothing effects brought by other TV models and removed the noise while preserving significant image details and important characteristics. the value of peak signal to noise ratio(PSNR) is also improved.
针对变分偏微分方程图像去噪恢复过程中存在的阶梯效应、边缘模糊和参数选择不确定等问题,提出了一种基于图像结构张量(STTV)的全变分恢复模型。我们引入图像结构张量来构造图像结构控制函数,而不是使用拉格朗日乘法器和局部结构信息来控制扩散过程,这样可以根据不同的局部结构信息来调整电视模型中规则项和保真项的平衡,保持更好的细节特征。理论分析和实验对比表明,STTV模型能够更准确、更精细地描述图像边缘、纹理和平滑区域,克服了其他TV模型带来的阶梯效应和过度平滑效应,在保留图像重要细节和重要特征的同时去噪。峰值信噪比(PSNR)也得到了提高。
{"title":"Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation","authors":"Caixia Li, Chanjuan Liu, Yilei Wang","doi":"10.1109/INCoS.2013.132","DOIUrl":"https://doi.org/10.1109/INCoS.2013.132","url":null,"abstract":"For the existing problems of staircase effect, edge blur and uncertainty of parameter selection in the process of image denoising and recovery of variational partial differential equations, a novel total variation restoration model based on image structure tensor(STTV) is proposed. We introduce image structure tensor to construct the image structure control function instead of using Lagrange multiplier and local structure information to control Diffusion process, which has the performance of adjusting the balance of regular item and fidelity item in TV model according to different local structure information and keeping better detail features. Theoretical analysis and experiment comparing with other methods illustrate that STTV model is able to describe the image edges, textures and smooth areas more accurately and subtly, which has overcome staircase and over-smoothing effects brought by other TV models and removed the noise while preserving significant image details and important characteristics. the value of peak signal to noise ratio(PSNR) is also improved.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"23 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Proactive Secret Sharing without a Trusted Party 没有可信方的主动秘密共享
Xiuqun Wang, Changlu Lin, Yong Li
A (t + 1, n) proactive secret sharing is to protect a secret in long-lived system by distributing it to a group of n participants and refreshing their shares periodically in this fixed group, while any t + 1 and more than t + 1 shares can reconstruct the secret. In this paper, we propose a proactive secret sharing scheme without a trusted party, who generates and distributes shares among the participants. Our scheme is uniformly efficient and tolerates t Byzantine faults in any single time interval, where the number of participants n>=3t + 1. We also prove that the proposed scheme is secure under the discrete logarithm intractability assumption.
(t + 1, n)主动秘密共享是通过将秘密分配给n个参与者的组,并定期刷新他们在该固定组中的份额来保护长寿命系统中的秘密,而任何t + 1和t + 1以上的共享都可以重构该秘密。在本文中,我们提出了一种没有可信方的主动秘密共享方案,由可信方在参与者之间生成和分配股份。我们的方案是一致有效的,并且在任何单个时间间隔内容忍t个拜占庭错误,其中参与者的数量n>=3t + 1。在离散对数难处理假设下,证明了该方案的安全性。
{"title":"Proactive Secret Sharing without a Trusted Party","authors":"Xiuqun Wang, Changlu Lin, Yong Li","doi":"10.1109/INCoS.2013.96","DOIUrl":"https://doi.org/10.1109/INCoS.2013.96","url":null,"abstract":"A (t + 1, n) proactive secret sharing is to protect a secret in long-lived system by distributing it to a group of n participants and refreshing their shares periodically in this fixed group, while any t + 1 and more than t + 1 shares can reconstruct the secret. In this paper, we propose a proactive secret sharing scheme without a trusted party, who generates and distributes shares among the participants. Our scheme is uniformly efficient and tolerates t Byzantine faults in any single time interval, where the number of participants n>=3t + 1. We also prove that the proposed scheme is secure under the discrete logarithm intractability assumption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Efficient Data Gathering in Intermittent Connected Mobile Sensor Networks 间歇连接移动传感器网络中的高效数据采集
Yongping Xiong, Shizhong Wu, Zhang Tao, Yubo Deng, Shiwu Chen
Intermittent Connected Mobile Sensor Networks (ICMSN) have emerged in recent studies, e.g. underwater sensor networks, wildlife tracking and human-oriented flu virus monitoring. In these networks, conventional routing protocols in WSN are not suitable for data gathering application in ICMSN since packets will be dropped when no complete route to the sink is available. In this paper, we propose an efficient data gathering scheme for ICMSN, which is composed of forwarding protocol and buffer management. Message forwarding makes decision on which sensors are qualified for next hop based on nodal delivery probability, which signifies the likelihood that the sensor can deliver the message to the sink successfully based on the nodal mobility pattern and residual energy. Buffer management consists of two related components: queuing mechanism and purging mechanism. The former determines priority of messages to transmit based on the importance factor, which indicates importance of the messages and QoS requirement of transmission. The latter utilizes a death vector generated by the sink to purge useless messages that have been delivered from the network. Our experimental results show that the proposed data gathering scheme supports the different transmission requirement of messages and achieves the good performance tradeoff between delivery ratio, delay and resource consumption.
间歇性连接移动传感器网络(ICMSN)在最近的研究中出现,例如水下传感器网络、野生动物跟踪和以人为本的流感病毒监测。在这些网络中,传统的WSN路由协议不适合ICMSN的数据采集应用,因为当没有完整的路由到sink时,数据包将被丢弃。本文提出了一种高效的ICMSN数据采集方案,该方案由转发协议和缓冲区管理两部分组成。消息转发根据节点传递概率来决定哪些传感器有资格进入下一跳,节点传递概率表示传感器根据节点迁移模式和剩余能量将消息成功传递到sink的可能性。缓冲区管理由两个相关组件组成:排队机制和清除机制。前者根据重要因子确定要传输的消息的优先级,重要因子表示消息的重要程度和传输的QoS要求。后者利用接收器生成的死亡向量来清除已经从网络传递的无用消息。实验结果表明,所提出的数据采集方案支持不同的消息传输需求,并在传输率、延迟和资源消耗之间实现了良好的性能权衡。
{"title":"Efficient Data Gathering in Intermittent Connected Mobile Sensor Networks","authors":"Yongping Xiong, Shizhong Wu, Zhang Tao, Yubo Deng, Shiwu Chen","doi":"10.1109/INCoS.2013.86","DOIUrl":"https://doi.org/10.1109/INCoS.2013.86","url":null,"abstract":"Intermittent Connected Mobile Sensor Networks (ICMSN) have emerged in recent studies, e.g. underwater sensor networks, wildlife tracking and human-oriented flu virus monitoring. In these networks, conventional routing protocols in WSN are not suitable for data gathering application in ICMSN since packets will be dropped when no complete route to the sink is available. In this paper, we propose an efficient data gathering scheme for ICMSN, which is composed of forwarding protocol and buffer management. Message forwarding makes decision on which sensors are qualified for next hop based on nodal delivery probability, which signifies the likelihood that the sensor can deliver the message to the sink successfully based on the nodal mobility pattern and residual energy. Buffer management consists of two related components: queuing mechanism and purging mechanism. The former determines priority of messages to transmit based on the importance factor, which indicates importance of the messages and QoS requirement of transmission. The latter utilizes a death vector generated by the sink to purge useless messages that have been delivered from the network. Our experimental results show that the proposed data gathering scheme supports the different transmission requirement of messages and achieves the good performance tradeoff between delivery ratio, delay and resource consumption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Real-Time Template Generation Algorithm to Identify RMB Crest Number 一种实时模板生成算法识别人民币波峰号
Gaoyu Zhang, Yingying Wang
On the basis of reviewing the current RMB-banknote crest number identification research literature, a real-time template generation algorithm to identify crest number in high-speed RMB-banknote moving environment is proposed. Firstly enough complete RMB images should be collected in currency detector equipped with CIS, then the area of crest number should be dug out and processed with tilt correction, binarization, morphology processing, character segmentation and highly normalization. Secondly corresponding template set should be generated to each character bitmap and then according to the principle of maximum difference, five character bitmap should be jetted out from the templates set, forming final template simplified set. Finally, the data and analysis of the real-time identification effect applied with this template are provided.
在回顾现有人民币纸币波峰号识别研究文献的基础上,提出了一种用于高速移动环境下人民币纸币波峰号识别的实时模板生成算法。首先在配备CIS的货币检测器中采集足够完整的人民币图像,然后挖掘出波峰数区域,进行倾斜校正、二值化、形态学处理、字符分割和高度归一化等处理。其次,对每个字符位图生成相应的模板集,然后根据最大差值原则,从模板集中喷射出5个字符位图,形成最终的模板简化集。最后,给出了应用该模板进行实时识别效果的数据和分析。
{"title":"A Real-Time Template Generation Algorithm to Identify RMB Crest Number","authors":"Gaoyu Zhang, Yingying Wang","doi":"10.1109/INCoS.2013.137","DOIUrl":"https://doi.org/10.1109/INCoS.2013.137","url":null,"abstract":"On the basis of reviewing the current RMB-banknote crest number identification research literature, a real-time template generation algorithm to identify crest number in high-speed RMB-banknote moving environment is proposed. Firstly enough complete RMB images should be collected in currency detector equipped with CIS, then the area of crest number should be dug out and processed with tilt correction, binarization, morphology processing, character segmentation and highly normalization. Secondly corresponding template set should be generated to each character bitmap and then according to the principle of maximum difference, five character bitmap should be jetted out from the templates set, forming final template simplified set. Finally, the data and analysis of the real-time identification effect applied with this template are provided.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Anonymous Single Sign-On Schemes Transformed from Group Signatures 从群签名转换的匿名单点登录方案
Jingquan Wang, Guilin Wang, W. Susilo
Single Sign-on (SSO) allows a user to obtain a single credential from a Trusted Third Party (TTP) once and then authenticates himself/herself to different service providers by using the same credential. Though different SSO schemes have been obtained from various primitives, user anonymity has not yet been studied formally. Motivated by the fact that anonymity is a very essential security requirement in certain scenarios, in this paper we first formalize a security model of anonymous single-sign on (ASSO). Subsequently, we present a generic ASSO scheme which is transformed from group signatures. Formal proofs are provided to show that the proposed ASSO is secure under the assumption that the underlying group signature is secure according to Bell are et al.'s model introduced at CT-RSA 2005. Compared to existing SSO schemes, our transformation not only implements the user's anonymity, but also reduces the trust level in TTP.
单点登录(Single Sign-on, SSO)允许用户从可信第三方(Trusted Third Party, TTP)获得一次证书,然后使用同一证书向不同的服务提供商验证自己的身份。尽管从各种原语中获得了不同的单点登录方案,但用户匿名性尚未得到正式的研究。鉴于匿名在某些情况下是一种非常重要的安全需求,本文首先形式化了匿名单点登录(aso)的安全模型。随后,我们提出了一种由群签名转化而来的通用aso方案。根据Bell等人在CT-RSA 2005中介绍的模型,在假定底层群签名是安全的情况下,给出了正式的证明来证明所提出的ASSO是安全的。与现有的单点登录方案相比,我们的转换不仅实现了用户的匿名性,而且降低了http中的信任级别。
{"title":"Anonymous Single Sign-On Schemes Transformed from Group Signatures","authors":"Jingquan Wang, Guilin Wang, W. Susilo","doi":"10.1109/INCoS.2013.104","DOIUrl":"https://doi.org/10.1109/INCoS.2013.104","url":null,"abstract":"Single Sign-on (SSO) allows a user to obtain a single credential from a Trusted Third Party (TTP) once and then authenticates himself/herself to different service providers by using the same credential. Though different SSO schemes have been obtained from various primitives, user anonymity has not yet been studied formally. Motivated by the fact that anonymity is a very essential security requirement in certain scenarios, in this paper we first formalize a security model of anonymous single-sign on (ASSO). Subsequently, we present a generic ASSO scheme which is transformed from group signatures. Formal proofs are provided to show that the proposed ASSO is secure under the assumption that the underlying group signature is secure according to Bell are et al.'s model introduced at CT-RSA 2005. Compared to existing SSO schemes, our transformation not only implements the user's anonymity, but also reduces the trust level in TTP.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"117 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
期刊
2013 5th International Conference on Intelligent Networking and Collaborative Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1