期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Probability-based Clustering and Its Application to WLAN Location Estimation 被引量:3
1
作者 张明华 张申生 曹健 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第5期547-552,共6页
Wireless local area networks (WLAN) localization based on received signal strength is becoming an important enabler of location based services. Limited efficiency and accuracy are disadvantages to the deterministic lo... Wireless local area networks (WLAN) localization based on received signal strength is becoming an important enabler of location based services. Limited efficiency and accuracy are disadvantages to the deterministic location estimation techniques. The probabilistic techniques show their good accuracy but cost more computation overhead. A Gaussian mixture model based on clustering technique was presented to improve location determination efficiency. The proposed clustering algorithm reduces the number of candidate locations from the whole area to a cluster. Within a cluster, an improved nearest neighbor algorithm was used to estimate user location using signal strength from more access points. Experiments show that the location estimation time is greatly decreased while high accuracy can still be achieved. 展开更多
关键词 probability-based clustering Gaussian mixture model wireless local area networks (WLAN) location estimation received signal strength
原文传递
Programmable SoC for an XTEA Encryption Algorithm Using a Co-Design Environment Replication Performance Approach 被引量:1
2
作者 Mohamed H. Al Meer 《Journal of Computer and Communications》 2017年第11期40-59,共20页
With the rapid development of wired and wireless networks, the security needs within network systems are becoming increasingly intensive owing to the continuous development of new applications. Existing cryptography a... With the rapid development of wired and wireless networks, the security needs within network systems are becoming increasingly intensive owing to the continuous development of new applications. Existing cryptography algorithms differ from each other in many ways including their security complexity, size of the key and words operated on, and processing time. Nevertheless, the main factors that prioritize an encryption algorithm over others are its ability to secure and protect data against attacks and its speed and efficiency. In this study, a reconfigurable Co-Design multi-purpose security design with very low complexity, weight, and cost, has been developed using Extended Tiny Encryption Algorithm (XTEA) data encryption standards. The paper aims to discuss issues and present solutions associated with this system, as well as compare the Co-Design implementation approach with Full-Hardware and Full-Software solutions. The main contribution that this paper offers is the profiling of XTEA cryptographic algorithm to reach more satisfactory understanding of its computation structure that leads to fully software, fully hardware, beside the co-design implementations all together, of this light weight encryption algorithm. 展开更多
关键词 FPGA NIOS II Co_Design PSOC XTEA TEA
暂未订购
A data mining approach to characterize road accident locations 被引量:1
3
作者 Sachin Kumar Durga Toshniwal 《Journal of Modern Transportation》 2016年第1期62-72,共11页
Data mining has been proven as a reliable technique to analyze road accidents and provide productive results. Most of the road accident data analysis use data mining techniques, focusing on identifying factors that af... Data mining has been proven as a reliable technique to analyze road accidents and provide productive results. Most of the road accident data analysis use data mining techniques, focusing on identifying factors that affect the severity of an accident. However, any damage resulting from road accidents is always unacceptable in terms of health, property damage and other economic factors. Sometimes, it is found that road accident occurrences are more frequent at certain specific locations. The analysis of these locations can help in identifying certain road accident features that make a road accident to occur frequently in these locations. Association rule mining is one of the popular data mining techniques that identify the correlation in various attributes of road accident. In this paper, we first applied k-means algorithm to group the accident locations into three categories, high-frequency, moderate-frequency and low-frequency accident locations. k-means algorithm takes accident frequency count as a parameter to cluster the locations. Then we used association rule mining to characterize these locations. The rules revealed different factors associated with road accidents at different locations with varying accident frequencies. Theassociation rules for high-frequency accident location disclosed that intersections on highways are more dangerous for every type of accidents. High-frequency accident locations mostly involved two-wheeler accidents at hilly regions. In moderate-frequency accident locations, colonies near local roads and intersection on highway roads are found dangerous for pedestrian hit accidents. Low-frequency accident locations are scattered throughout the district and the most of the accidents at these locations were not critical. Although the data set was limited to some selected attributes, our approach extracted some useful hidden information from the data which can be utilized to take some preventive efforts in these locations. 展开更多
关键词 Road accidents Accident analysis Datamining k-Means Association rule mining
在线阅读 下载PDF
Collaborative Assessments in Computer Science Education: A Survey
4
作者 Hans Yuan Paul Cao 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2019年第4期435-445,共11页
As computer science enrollments continue to surge, assessments that involve student collaboration may play a more critical role in improving student learning. We provide a review on some of the most commonly adopted c... As computer science enrollments continue to surge, assessments that involve student collaboration may play a more critical role in improving student learning. We provide a review on some of the most commonly adopted collaborative assessments in computer science, including pair programming, collaborative exams, and group projects. Existing research on these assessment formats is categorized and compared. We also discuss potential future research topics on the aforementioned collaborative assessment formats. 展开更多
关键词 assessment COLLABORATION PAIR PROGRAMMING COLLABORATIVE EXAM GROUP project
原文传递
Parametric Evaluation of Video Motion Tracking Data Sets
5
作者 Mukesh Motwani Rakhi Motwani Frederick Harris 《Journal of Electronic Science and Technology》 CAS 2010年第3期215-222,共8页
Video tracking is a complex problem because the environment, in which video motion needs to be tracked, is widely varied based on the application and poses several constraints on the design and performance of the trac... Video tracking is a complex problem because the environment, in which video motion needs to be tracked, is widely varied based on the application and poses several constraints on the design and performance of the tracking system. Current datasets that are used to evaluate and compare video motion tracking algorithms use a cumulative performance measure without thoroughly analyzing the effect of these different constraints imposed by the environment. But it needs to analyze these constraints as parameters. The objective of this paper is to identify these parameters and define quantitative measures for these parameters to compare video datasets for motion tracking. 展开更多
关键词 BENCHMARKING datasets DESIGN metrics video tracking.
在线阅读 下载PDF
Non-interactive and Non-malleable Commitment Scheme Based on q-one Way Group Homomorphisms
6
作者 张宗洋 董晓蕾 曹珍富 《Journal of Shanghai Jiaotong university(Science)》 EI 2008年第5期574-578,共5页
Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleabi... Commitment scheme is a basic component of many cryptographic protocols, such as coin-tossing, identification schemes, zero-knowledge and multi-party computation. In order to prevent man-in-middle attacks, non-malleability is taken into account. Many forming works focus on designing non-malleable commitments schemes based on number theory assumptions. In this paper we give a general framework to construct non- interactive and non-malleable commitment scheme with respect to opening based on more general assumptions called q-one way group homomorphisms (q-OWGH). Our scheme is more general since many existing commitment schemes can be deduced from our scheme. 展开更多
关键词 commitment scheme non-malleable NON-INTERACTIVE q-one way group homomorphisms (q-OWGH)
原文传递
An Eigen-Normal Approach for 3D Mesh Watermarking Using Support Vector Machines
7
作者 Rakhi Motwani Mukesh Motwani +1 位作者 Frederick Harris Sergiu Dascalu 《Journal of Electronic Science and Technology》 CAS 2010年第3期237-243,共7页
The use of support vector machines (SVM) for watermarking of 3D mesh models is investigated. SVMs have been widely explored for images, audio, and video watermarking but to date the potential of SVMs has not been ex... The use of support vector machines (SVM) for watermarking of 3D mesh models is investigated. SVMs have been widely explored for images, audio, and video watermarking but to date the potential of SVMs has not been explored in the 3D watermarking domain. The proposed approach utilizes SVM as a binary classifier for the selection of vertices for watermark embedding. The SVM is trained with feature vectors derived from the angular difference between the eigen normal and surface normals of a 1-ring neighborhood of vertices taken from normalized 3D mesh models. The SVM learns to classify vertices as appropriate or inappropriate candidates for modification in order to accommodate the watermark. Experimental results verify that the proposed algorithm is imperceptible and robust against attacks such as mesh smoothing, cropping and noise addition. 展开更多
关键词 3D mesh models support vector machine watermarking.
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部