-
15761
PoSW:novel secure deduplication scheme for collaborative cloud applications
Published 2017-07-01“…In order to solve the problems of secure access and deduplication to the shared file in the cloud environment,a novel notion called proof of shared ownership (PoSW) was formalized,and a formal definition of the PoSW was given.Furthermore,a PoSW scheme and an enhanced version of that were proposed.In the PoSW scheme,secure shared file dispersal,convergent encryption and secret sharing algorithm were employed to transform the shared file realize the sharing and authorization for the shared file,and then a novel challenge-response protocol was proposed to achieve the proof of shared ownership and the foundation for the secure deduplication of the shared file was provided.An enhanced PoSW scheme was designed to improve the availability and reliability for different kinds of the shared files by introducing the multi-cloud server providers and using the strategies of both data duplication and secret file dispersal.Security analysis and performance evaluation show the security and efficiency of the proposed scheme.…”
Get full text
Article -
15762
Combined encryption method for CAN bus data based on periodic coupled processing
Published 2023-01-01“…In the intelligent connected age, CAN bus transmission faces the urgent demand of light weighted security encryption.Based on this, a fast response and high security CAN bus data encryption method was proposed.Since the 64 bit CAN packets were sent periodically, an online-offline block encryption algorithm coupled with message transmission cycle was proposed.In offline phase, the dynamic session key was generated by using advanced encryption standard.In online phase, the dynamic session key was used to quickly respond to encryption and decryption requests.The online computation delay was greatly reduced by the pre-encryption computation in offline phase, which helped achieving low latency and lightweight computation.At the same time, the ciphertext policy attribute based encryption was used to encrypt the block cipher.The access control policy made by the data sending OBU ensures that only the target OBU can decrypt the block cipher, so as to achieve targeted encryption.…”
Get full text
Article -
15763
RELIABILITY ANALYSIS OF REACTION FORCE DEVELOPED IN THE LUBRICATED REVOLUTE JOINT FOR A SLIDER-CRANK SYSTEM INCLUDING JOINT WITH CLEARANCE AND LUBRICATION
Published 2017-01-01“…In order to overcome this limitation,the parameters are pretreated through Genetic Algorithm to get the optimum parameters values. Then approximate function relation between random parameters and performance function is derived and the reliability of the reaction force developed in the lubricated revolute joint of the crank-slider mechanism is discussed by Monte-Carlo method. …”
Get full text
Article -
15764
ATKB-PID: an adaptive control method for micro tension under complex hot rolling conditions
Published 2025-01-01“…This method incorporates a linear attention layer and utilizes a K-Nearest Neighbors (KNN) algorithm to predict the optimal learning rate and inertia coefficient under actual operating conditions. …”
Get full text
Article -
15765
Systems Thinking Safety Analysis: Nuclear Security Assessment of Physical Protection System in Nuclear Power Plants
Published 2013-01-01“…The systems thinking algorithm is used for the quantifications by the Vensim software package. …”
Get full text
Article -
15766
Dispatching Design for Customized Bus of Hybrid Vehicles Based on Reservation Data
Published 2021-01-01“…Finally, a calculation example is designed and the genetic algorithm is used to solve the model. The results show that the hybrid vehicle solution is more reasonable than the traditional single-vehicle solution and reveal that the model is feasible to optimize scheduling plan. …”
Get full text
Article -
15767
A law of meaning
Published 2025-01-01“…We implement the law in an algorithm using Dunning’s log-likelihood and illustrate it by extracting markers for ‘know’, negation, first person subject and complementizers from translations of the New Testament in a variety sample of 83 languages with manual evaluation of all extracted markers. …”
Get full text
Article -
15768
Research on multiflow in wireless networks based on network coding
Published 2013-08-01“…,in the protocol interference model),the problem was formulated to compute the maximum throughput of multiple unicast flows supported by the multihop wireless network with given NC settings,in which the constraints were rebuilt from the conflict graph of hyperarcs.Furthermore,a practical algorithm was proposed to collect maximal independent sets,instead of collecting all maximal independent sets in the conflict graph of hyperarcs (which is NP-hard),and some numerical results were illustrated.…”
Get full text
Article -
15769
A Novel Method for Identifying Resonance Frequency Band in Weak Bearing Fault Diagnosis of Electric Driving System
Published 2024-01-01“…The modified principle and algorithm flow of the proposed method are derived. …”
Get full text
Article -
15770
Design and Analysis of Parallel Adjusting Equipment of Vertical Drilling
Published 2015-01-01“…Focusing on the current limited vertical adjustment technique of large-scale drillings,a 6-DOF parallel adjustment equipment with 12 inputs is designed for the working condition of vertical drilling.The equipment mechanism consists of 6branched chains with redundancy which are symmetrical in structure.Each of the chains is composed by a compound of rotate joint and a compound of spherical joint,while the two pairs are connected by two prismatic pairs.The modal analysis is carried out on the body which is based on ANSYS software,first six order frequency distribution and modal vibration mode,and along the X、Y、Zdirection of the displacement frequency response about the moving platform are got.The analysis consequence shows that the most sensitive of external forces to the moving platform is 46 Hz frequency.Otherwise,the working space of the 6-DOF platform is obtained by using the 3-D searching algorithm.The results have significant meanings in the further research on the correlation between the parameters and the whole mechanism,as well as the optimization of the parameter.…”
Get full text
Article -
15771
Efficient strong privacy protection and transferable attribute-based ticket scheme
Published 2022-03-01“…To solve the problems of efficiency, flexibility, and privacy protection faced by electronic tickets, an efficient and transferable attribute-based ticket scheme with strong privacy protection was proposed.Firstly, a ticket issuing algorithm based on attribute disclosure was constructed by combining attribute-based credentials and set commitment.Secondly, the structure-preserving signature on equivalence class and dynamic malleable signature were used to reduce the computational complexity of the ticket issuance, and the ticket transfer and ticket verification with constant complexity were realized.In addition, to prevent the possibility of malicious verifiers guessing user information according to the seller’s identity, the scheme not only realized the anonymity of the user, but also realized the anonymity of the seller in the ticket verification for the first time.Finally, the security definition of the scheme was given, and its security was reduced to either well-known complexity cryptography assumptions or the security of proven cryptography primitives.Comparison and experimental results demonstrate that the proposed scheme is flexible and efficient.…”
Get full text
Article -
15772
Interference alignment based secure transmission scheme in multi-user interference networks
Published 2023-06-01“…Faced with the requirement of information security in internet of things, a scenario of multi-user interference networks with multiple eavesdroppers was considered, and an interference alignment (IA) scheme based physical layer secure transmission was proposed.Traditional IA security algorithm may result in secret signal cancellation.To overcome this threat, a modified alternating minimization (AM) method was proposed.The multi-user interference was eliminated by alternatively optimizing transceiver matrices, and artificial noise (AN) aided max-eigenmode beamforming was employed for secure transmission.To obtain a more accurate analysis of IA feasibility, the IA equation was divided into independent subsets and their combinations.By analyzing each case, a much tighter necessary condition for IA feasibility was established.Finally, the power allocation ratio between the secret signal and the AN signal was optimized to maximize the secrecy outage probability (SOP) constrained secrecy rate.Numerical results confirm that both the quality and security of the secret signal have been enhanced.Therefore, the proposed scheme is more suitable and reliable for security applications in interference networks.…”
Get full text
Article -
15773
Bayesian and non-bayesian analysis for stress-strength model based on progressively first failure censoring with applications.
Published 2024-01-01“…In the end, for illustrative reasons, an algorithmic application to actual data is investigated.…”
Get full text
Article -
15774
Target localization method based on semi-definite relaxation with frequency difference of arrival
Published 2024-03-01“…The simulation results show that the performance of the adopted semi-definite relaxation method is able to reach the Cramer-Rao lower bound (CRLB) at lower Gaussian noise levels and the algorithm is highly robust to geometry. In addition, its RMSE performance is better than that of the two-stage weighted least square (TSWLS) method for a smaller number of sensors.…”
Get full text
Article -
15775
Two-layer distributed cache in D2D integrated fog-RAN
Published 2018-04-01“…With the development of mobile communications,people’s demands for low-latency transmission networks are rapidly increasing.Fog-RAN,as a new architecture suitable for 5G/B5G communication networks,has broad application prospects.Considering the fog network of device-to-device communication,a two-layer distributed cache based on device-to-device communication and fog-RAN was proposed to reduce the delay for users to download files.Firstly,a closed-form solution of the download delay of the two-layer cache and a closed-form solution of the delay gain were obtained.On this basis,a distributed algorithm was designed to obtain the best cache strategy,so that each fog-based wireless access point (F-AP) or user equipment (UE) only needed to use the information of the neighboring devices to complete the caching.The simulation results show that the two-layer distributed cache can effectively reduce the download delay.…”
Get full text
Article -
15776
Physical-layer security transmission method based on spatial modulation with finite alphabet inputs
Published 2015-02-01“…Addressing the problem of wireless physical layer security transmission for finite alphabet input systems,a spatial modulation secure transmission method is proposed.On the basis of information theory,the method utilizes the receive antenna indices of multiple-input multiple-output (MIMO) system to bear information,and randomizes the eavesdropper’s equivalent channel by switching the receive antennas,which can guarantee physical layer security transmission.First,the different receiving performances of the legitimate user and eavesdropper are analyzed in the spatial modulation secure transmission system.Second,the mutual information and secrecy mutual information of the transmission system are calculated,and two sufficient conditions that ensure positive secrecy mutual information are pointed out.Finally,an estimation algorithm of mutual information is provided.Moreover,the symmetry of finite alphabet set is exploited to decrease the computational complexity.Theoretical analysis and numerical simulation results verify the availability of the security transmission method.…”
Get full text
Article -
15777
Study on Acoustic Emission Localization of Concrete Using Modified Velocity
Published 2019-01-01“…To improve the accuracy of the acoustic emission (AE) source localization, a new 3D AE source localization method was investigated which used a combination of the modified velocity and the 3D localization algorithm based on the exhaustive method. The wave speed has a significant effect on the AE location results. …”
Get full text
Article -
15778
Terminal battery status information based fairness-aware SWIPT strategy
Published 2020-05-01“…To solve the battery depletion problem,the terminals’ battery status information (BSI) was proposed to be taken into consideration in simultaneous wireless information and power transfer (SWIPT) strategies,and a SWIPT strategy to guarantee the rate fairness was provided.BSI determined the terminals’ sufferable received rate and harvested energy.The proposed scheme was formulated as an optimization problem to max-min user rate,with rate/energy requirement constraints and the sufferable rate/energy constraints.To solve optimization problem,the receivers were firstly classified with their battery level,then the optimal solutions were obtained by the proposed iteration optimization-based algorithm.With the proposed scheme,the transmit power and the power splitting factor would be controlled and the data rate at receivers,especially the receivers that with lower battery level would be restricted,avoiding the required battery consumption to exceed battery level.Simulation results reveal that the proposed scheme can prolong battery lifetime and avoid the battery depletion problem,and its fairness performance is strengthened with the difference decreasing among the receivers’ battery level.…”
Get full text
Article -
15779
Multiscale network alignment model based on convolution of homogeneous multilayer graphs
Published 2024-12-01“…In terms of node characteristics, the K-nearest neighbor algorithm was used to aggregate node neighborhood information to model the deep network structure, so as to enhance the data. …”
Get full text
Article -
15780
Research on Population Development Trend in Huizhou of China Forecast Based on Optimal Weighted Combination Method and Fractional Grey Model
Published 2021-01-01“…On the other hand, the optimal conformable fractional order and dynamic background value coefficient are determined by the quantum inspired evolutionary algorithm (QIEA). Taking the resident population from 2008 to 2018 as the research object, the optimal weighted combination model and fractional grey model were used to study the estimated and predicted values. …”
Get full text
Article