Advanced Search
Displaying 11401-11410 on page 1141 of 11942. Per Page  

Articles / Online

  • Modeling and Analysis the Effects of EMP on the Balise System
  • Abstract Balise system is one kind of high-rate point-mode data transmission equipment. It plays an indispensable role in Chinese Train Control System (CTCS), and it has been immigrated and widely used for passenger dedicated lines and high-speed lines. Thus, its working conditions directly affect train operation safety. However, the balise information transmission system (BITS) is based on the principle of electromagnetic induction, and the communication process is susceptible to external electromagnetic interference. Therefore, it is vital to study the influence of transient signal interference on the balise system. This paper builds the up-link model between the vehicle antena and the balise,…
  • More
  •   Views:1328       Downloads:952        Download PDF
  • A Privacy-Preserving Algorithm for Clinical Decision-Support Systems Using Random Forest
  • Abstract Clinical decision-support systems are technology-based tools that help healthcare providers enhance the quality of their services to satisfy their patients and earn their trust. These systems are used to improve physicians’ diagnostic processes in terms of speed and accuracy. Using data-mining techniques, a clinical decision support system builds a classification model from hospital’s dataset for diagnosing new patients using their symptoms. In this work, we propose a privacy-preserving clinical decision-support system that uses a privacy-preserving random forest algorithm to diagnose new symptoms without disclosing patients’ information and exposing them to cyber and network attacks. Solving the same problem with a…
  • More
  •   Views:1745       Downloads:773        Download PDF
  • Online Magnetic Flux Leakage Detection System for Sucker Rod Defects Based on LabVIEW Programming
  • Abstract Aiming at the detection of the sucker rod defects, a real-time detection system is designed using the non-destructive testing technology of magnetic flux leakage (MFL). An MFL measurement system consists of many parts, and this study focuses on the signal acquisition and processing system. First of all, this paper introduces the hardware part of the acquisition system in detail, including the selection of the Hall-effect sensor, the design of the signal conditioning circuit, and the working process of the single chip computer (SCM) control serial port. Based on LabVIEW, a graphical programming software, the software part of the acquisition system…
  • More
  •   Views:1534       Downloads:1064        Download PDF
  • An Improved Unsupervised Image Segmentation Method Based on Multi-Objective Particle Swarm Optimization Clustering Algorithm
  • Abstract Most image segmentation methods based on clustering algorithms use single-objective function to implement image segmentation. To avoid the defect, this paper proposes a new image segmentation method based on a multi-objective particle swarm optimization (PSO) clustering algorithm. This unsupervised algorithm not only offers a new similarity computing approach based on electromagnetic forces, but also obtains the proper number of clusters which is determined by scale-space theory. It is experimentally demonstrated that the applicability and effectiveness of the proposed multi-objective PSO clustering algorithm.
  • More
  •   Views:1689       Downloads:773        Download PDF
  • A Weighted Threshold Secret Sharing Scheme for Remote Sensing Images Based on Chinese Remainder Theorem
  • Abstract The recent advances in remote sensing and computer techniques give birth to the explosive growth of remote sensing images. The emergence of cloud storage has brought new opportunities for storage and management of massive remote sensing images with its large storage space, cost savings. However, the openness of cloud brings challenges for image data security. In this paper, we propose a weighted image sharing scheme to ensure the security of remote sensing in cloud environment, which takes the weights of participants (i.e., cloud service providers) into consideration. An extended Mignotte sequence is constructed according to the weights of participants, and…
  • More
  •   Views:1684       Downloads:671        Download PDF
  • WiBPA: An Efficient Data Integrity Auditing Scheme Without Bilinear Pairings
  • Abstract The security of cloud data has always been a concern. Cloud server provider may maliciously tamper or delete user’s data for their own benefit, so data integrity audit is of great significance to verify whether data is modified or not. Based on the general three-party audit architecture, a dynamic auditing scheme without bilinear pairings is proposed in this paper. It utilizes exponential operation instead of bilinear mapping to verify the validity of evidence. By establishing the mapping relation between logic index and tag index of data block with index transformation table, our scheme can easily support dynamic data operation. By…
  • More
  •   Views:1576       Downloads:775        Download PDF
  • Optimization Algorithm for Reduction the Size of Dixon Resultant Matrix: A Case Study on Mechanical Application
  • Abstract In the process of eliminating variables in a symbolic polynomial system, the extraneous factors are referred to the unwanted parameters of resulting polynomial. This paper aims at reducing the number of these factors via optimizing the size of Dixon matrix. An optimal configuration of Dixon matrix would lead to the enhancement of the process of computing the resultant which uses for solving polynomial systems. To do so, an optimization algorithm along with a number of new polynomials is introduced to replace the polynomials and implement a complexity analysis. Moreover, the monomial multipliers are optimally positioned to multiply each of the…
  • More
  •   Views:1306       Downloads:659        Download PDF
  • A Lightweight Three-Factor User Authentication Protocol for the Information Perception of IoT
  • Abstract With the development of computer hardware technology and network technology, the Internet of Things as the extension and expansion of traditional computing network has played an increasingly important role in all professions and trades and has had a tremendous impact on people lifestyle. The information perception of the Internet of Things plays a key role as a link between the computer world and the real world. However, there are potential security threats in the Perceptual Layer Network applied for information perception because Perceptual Layer Network consists of a large number of sensor nodes with weak computing power, limited power supply,…
  • More
  •   Views:2030       Downloads:817        Download PDF
  • Design of Feedback Shift Register of Against Power Analysis Attack
  • Abstract Stream ciphers based on linear feedback shift register (LFSR) are suitable for constrained environments, such as satellite communications, radio frequency identification devices tag, sensor networks and Internet of Things, due to its simple hardware structures, high speed encryption and lower power consumption. LFSR, as a cryptographic primitive, has been used to generate a maximum period sequence. Because the switching of the status bits is regular, the power consumption of the LFSR is correlated in a linear way. As a result, the power consumption characteristics of stream cipher based on LFSR are vulnerable to leaking initialization vectors under the power attacks.…
  • More
  •   Views:1514       Downloads:590        Download PDF
  • Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications
  • Abstract Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services. The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP) method. Next, in the defined relay selection area, we propose a secure relay selection…
  • More
  •   Views:1512       Downloads:708        Download PDF
Displaying 11401-11410 on page 1141 of 11942. Per Page