Algorithmic Aspects in Information and Management [[electronic resource] ] : 6th International Conference, AAIM 2010, Weihai, China, July 19-21, 2010. Proceedings / / edited by Bo Chen |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XI, 336 p. 51 illus.) |
Disciplina | 005.1 |
Collana | Information Systems and Applications, incl. Internet/Web, and HCI |
Soggetto topico |
Software engineering
Computer programming Computers Algorithms Computer science—Mathematics Management information systems Computer science Software Engineering/Programming and Operating Systems Programming Techniques Theory of Computation Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Management of Computing and Information Systems |
ISBN |
1-280-38791-2
9786613565839 3-642-14355-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Comparison of Two Algorithms for Computing Page Importance -- The Invisible Hand for Risk Averse Investment in Electricity Generation -- Efficient Algorithms for the Prize Collecting Steiner Tree Problems with Interval Data -- The (K,k)-Capacitated Spanning Tree Problem -- Optimal Algorithms for the Economic Lot-Sizing Problem with Multi-supplier -- Synthetic Road Networks -- Computing Exact and Approximate Nash Equilibria in 2-Player Games -- Where Would Refinancing Preferences Go? -- Approximating Maximum Edge 2-Coloring in Simple Graphs -- A Linear Kernel for Co-Path/Cycle Packing -- A VaR Algorithm for Warrants Portfolio -- Some Results on Incremental Vertex Cover Problem -- Finding Good Tours for Huge Euclidean TSP Instances by Iterative Backbone Contraction -- Point Location in the Continuous-Time Moving Network -- Coordinated Scheduling of Production and Delivery with Production Window and Delivery Capacity Constraints -- Inverse 1-median Problem on Trees under Weighted l ??? Norm -- On the Approximability of the Vertex Cover and Related Problems -- Feasibility Testing for Dial-a-Ride Problems -- Indexing Similar DNA Sequences -- Online Scheduling on Two Uniform Machines to Minimize the Makespan with a Periodic Availability Constraint -- A New Smoothing Newton Method for Symmetric Cone Complementarity Problems -- Approximation Algorithms for Scheduling with a Variable Machine Maintenance -- Bounded Parallel-Batch Scheduling on Unrelated Parallel Machines -- Exact Algorithms for Coloring Graphs While Avoiding Monochromatic Cycles -- Randomized Approaches for Nearest Neighbor Search in Metric Space When Computing the Pairwise Distance Is Extremely Expensive -- A Primal-Dual Approximation Algorithm for the k-Level Stochastic Facility Location Problem -- Optimal Semi-online Scheduling Algorithms on Two Parallel Identical Machines under a Grade of Service Provision -- Varieties of Regularities in Weighted Sequences -- Online Uniformly Inserting Points on Grid -- Kernelization for Cycle Transversal Problems -- Online Splitting Interval Scheduling on m Identical Machines -- Extended Tabu Search on Fuzzy Traveling Salesman Problem in Multi-criteria Analysis -- Efficient Exact and Approximate Algorithms for the Complement of Maximal Strip Recovery. |
Record Nr. | UNISA-996465662203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Algorithmic aspects in information and management : 6th International Conference, AAIM 2010 Weihai, China, July 19-21, 2010 : proceedings / / Bo Chen (ed.) |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, : Springer, 2010 |
Descrizione fisica | 1 online resource (XI, 336 p. 51 illus.) |
Disciplina | 005.1 |
Altri autori (Persone) | ChenBo |
Collana |
Lecture notes in computer science
LNCS sublibrary : SL 3 : Information systems and application, incl. internet/web and HCI |
Soggetto topico | Algorithms |
ISBN |
1-280-38791-2
9786613565839 3-642-14355-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Comparison of Two Algorithms for Computing Page Importance -- The Invisible Hand for Risk Averse Investment in Electricity Generation -- Efficient Algorithms for the Prize Collecting Steiner Tree Problems with Interval Data -- The (K,k)-Capacitated Spanning Tree Problem -- Optimal Algorithms for the Economic Lot-Sizing Problem with Multi-supplier -- Synthetic Road Networks -- Computing Exact and Approximate Nash Equilibria in 2-Player Games -- Where Would Refinancing Preferences Go? -- Approximating Maximum Edge 2-Coloring in Simple Graphs -- A Linear Kernel for Co-Path/Cycle Packing -- A VaR Algorithm for Warrants Portfolio -- Some Results on Incremental Vertex Cover Problem -- Finding Good Tours for Huge Euclidean TSP Instances by Iterative Backbone Contraction -- Point Location in the Continuous-Time Moving Network -- Coordinated Scheduling of Production and Delivery with Production Window and Delivery Capacity Constraints -- Inverse 1-median Problem on Trees under Weighted l ??? Norm -- On the Approximability of the Vertex Cover and Related Problems -- Feasibility Testing for Dial-a-Ride Problems -- Indexing Similar DNA Sequences -- Online Scheduling on Two Uniform Machines to Minimize the Makespan with a Periodic Availability Constraint -- A New Smoothing Newton Method for Symmetric Cone Complementarity Problems -- Approximation Algorithms for Scheduling with a Variable Machine Maintenance -- Bounded Parallel-Batch Scheduling on Unrelated Parallel Machines -- Exact Algorithms for Coloring Graphs While Avoiding Monochromatic Cycles -- Randomized Approaches for Nearest Neighbor Search in Metric Space When Computing the Pairwise Distance Is Extremely Expensive -- A Primal-Dual Approximation Algorithm for the k-Level Stochastic Facility Location Problem -- Optimal Semi-online Scheduling Algorithms on Two Parallel Identical Machines under a Grade of Service Provision -- Varieties of Regularities in Weighted Sequences -- Online Uniformly Inserting Points on Grid -- Kernelization for Cycle Transversal Problems -- Online Splitting Interval Scheduling on m Identical Machines -- Extended Tabu Search on Fuzzy Traveling Salesman Problem in Multi-criteria Analysis -- Efficient Exact and Approximate Algorithms for the Complement of Maximal Strip Recovery. |
Record Nr. | UNINA-9910483739703321 |
Berlin, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (216 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Data encryption (Computer science)
Telecommunication systems - Security measures Internet of things - Security measures Huang, Xinyi |
ISBN | 3-030-80851-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation. 1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency. 2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion. References -- Author Index. |
Record Nr. | UNISA-996464420203316 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied cryptography in computer and communications : first EAI International Conference, AC3 2021, virtual event, May 15-16, 2021, proceedings / / Bo Chen, Xinyi Huang (editors) |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
Descrizione fisica | 1 online resource (216 pages) |
Disciplina | 005.82 |
Collana | Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering |
Soggetto topico |
Data encryption (Computer science)
Telecommunication systems - Security measures Internet of things - Security measures Huang, Xinyi |
ISBN | 3-030-80851-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Organization -- Contents -- Blockchain -- Anchor: An NDN-Based Blockchain Network -- 1 Introduction -- 2 Our Design -- 2.1 Random Anchor Selection -- 2.2 Two-Layer Cascaded NDN Design -- 2.3 Elimination of Duplicated Transmissions from Multiple Anchors -- 3 Performance Evaluation -- 4 Conclusion -- References -- An Identity-Based Blind Signature and Its Application for Privacy Preservation in Bitcoin -- 1 Introduction -- 2 Preliminaries -- 2.1 Tate Bilinear Pairings -- 2.2 Computational Diffie-Hellman Assumption -- 2.3 System Model -- 3 Review of Sarde et al.' Blind Signature Scheme -- 4 Attack on Sarde et al.' Blind Signature Scheme -- 5 Unlinkable ID-Based Blind Signature Scheme -- 6 Unlinkable ID-Based Proxy Blind Signature Scheme -- 7 Security Analysis -- 7.1 Analysis of Blind Signature -- 7.2 Analysis of Proxy Blind Signature -- 8 Performance Analysis and Comparison -- 9 Application for Privacy Preservation in Bitcoin -- References -- Blockchain-Based Sealed-Bid Domain Name Auction Protocol -- 1 Introduction -- 2 Models and Design Goals -- 2.1 System Model -- 2.2 Security Model -- 2.3 Design Goal -- 3 Preliminaries -- 3.1 Account-Based Consortium Blockchain -- 3.2 Auction Types -- 3.3 Pedersen Commitment -- 3.4 Zero-Knowledge Proof -- 4 Our Proposal -- 4.1 Create the Auction -- 4.2 Commit the Bid -- 4.3 Reveal the Bid -- 4.4 Close the Auction -- 5 Analysis of Our Proposal -- 5.1 Security Analysis -- 5.2 Performance Evaluation -- 6 Related Work -- 6.1 Blockchain-Based DNS -- 6.2 Blockchain-Based Auction -- 7 Conclusion -- References -- Authentication -- A Security Enhanced Key Management Service for ARM Pointer Authentication -- 1 Introduction -- 2 Background -- 2.1 Privilege and Exception Levels -- 2.2 Pointer Authentication -- 3 Threat Model -- 3.1 Attacks -- 3.2 Assumptions -- 4 Design -- 4.1 Architecture.
4.2 Algorithm -- 5 Implementation -- 5.1 EL3 Runtime Service -- 5.2 EL1 Kernel Module -- 5.3 EL0 Calling Convention -- 6 Evaluation -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 7 Related Works -- 8 Conclusion -- References -- Privacy-Preserving ECC-Based Three-Factor Authentication Protocol for Smart Remote Vehicle Control System -- 1 Introduction -- 1.1 Threat Model -- 1.2 Related Works -- 1.3 Motivation and Contribution -- 1.4 Notations -- 1.5 Paper Organization -- 2 Review of Chatterjee et al.'s Scheme -- 2.1 System Initialization and Registration Phase -- 2.2 Authentication and Key Agreement Phase -- 3 Cryptanalysis of Chatterjee et al.'s Scheme -- 4 The Proposed Scheme -- 4.1 Pre-deployment Phase -- 4.2 User Registration Phase -- 4.3 Login and Authentication Phase -- 5 Security Analysis -- 5.1 BAN-Logic Based Proof of Authentication -- 5.2 Further Security Analysis -- 6 Performance Evaluation -- 6.1 Security Features -- 6.2 Computational Overhead -- 7 Conclusion and Future Work -- References -- Secure Computation -- Efficient and Private Divisible Double Auction in Trusted Execution Environment -- 1 Introduction -- 2 Divisible Double Auction -- 2.1 Models -- 2.2 Auction Properties -- 3 Mechanism Design -- 4 ETA System Design -- 4.1 SGX Formalization -- 4.2 ETA System -- 4.3 ETA Execution Program -- 4.4 Threat Model -- 4.5 Security Analysis -- 5 Experiments -- 5.1 ETA Performance Evaluation -- 5.2 Case Study -- 6 Related Work -- 7 Conclusion -- References -- Parallel Implementation and Optimization of SM4 Based on CUDA -- 1 Introduction -- 2 Preliminaries -- 2.1 CUDA -- 2.2 A Brief Description of SM4 -- 3 Parallel Design of SM4 -- 4 Experiment and Discussion -- 4.1 Basic Experiment -- 4.2 Performance Optimization -- 4.3 Analysis of Results -- 5 Conclusion -- References -- Another Algebraic Decomposition Method for Masked Implementation. 1 Introduction -- 2 Preliminaries -- 2.1 Functions over Finite Fields -- 3 Algebraic Decomposition -- 3.1 Algebraic Decomposition Using GM Polynomials -- 3.2 Experimental Result -- 4 Application to Masking -- 5 Conclusion -- A Masking for Quadratic Polynomial -- References -- Practical Crypto Application -- Concealed Communication in Online Social Networks -- 1 Introduction -- 2 Related Work -- 2.1 Privacy Analysis in Online Social Networks -- 2.2 Privacy Leakages -- 2.3 Privacy-Preserving Online Social Networks -- 2.4 Mix Networks -- 3 Proposed Protocols -- 3.1 A Concealed Secure Channel -- 3.2 User Information and Postings -- 3.3 Personal Messages and Group Messages -- 3.4 Groups -- 3.5 Finding and Verifying Participants, Exchanging Keys -- 3.6 Key Revocation -- 3.7 User Registration -- 4 Privacy Analysis -- 4.1 Attacker Model -- 4.2 Structure of Network (NS) -- 4.3 Structure of Data (DS) -- 4.4 Timing (T) -- 4.5 Control Information (CI) -- 5 Performance Analysis -- 6 Conclusions -- References -- MobiWear: A Plausibly Deniable Encryption System for Wearable Mobile Devices -- 1 Introduction -- 2 Background -- 2.1 Wearable Mobile Devices -- 2.2 Plausibly Deniable Encryption -- 2.3 Image Steganography -- 2.4 Digital Watermarking -- 2.5 Peak Signal-to-Noise Ratio (PSNR) -- 3 Model and Assumptions -- 3.1 System Model -- 3.2 Adversarial Model -- 4 Design -- 4.1 Design Rationale -- 4.2 Design Details -- 5 Implementation and Evaluation -- 5.1 Implementation -- 5.2 Evaluation -- 6 Security Analysis and Discussion -- 6.1 Security Analysis -- 6.2 Discussion -- 7 Related Work -- 7.1 Plausibly Deniable Encryption Systems -- 7.2 Image Steganograyphy -- 8 Conclusion -- References -- Recent Advances in the Web PKI and the Technical Challenges in SCMS -- 1 Introduction -- 2 Recent Advances in the Web PKI -- 2.1 Certificate Transparency. 2.2 Push-Based Certificate Revocation -- 3 The Technical Challenges in SCMS -- 3.1 The Expected Properties of V2V PKI Systems -- 3.2 SCMS -- 3.3 Technical Challenge #1: Certificate Transparency vs. Pseudonym Certificate -- 3.4 Technical Challenge #2: Push-Based Certificate Revocation vs. the Great Volume of Pseudonym Certificates -- 4 Conclusions -- References -- The First International Workshop on Security for Internet of Things (IOTS 2021) -- A Novel Approach for Code Smells Detection Based on Deep Leaning -- 1 Introduction -- 2 Code Smells Detection Based on Convolutional Networks -- 3 High Level Design -- 3.1 Experiments Results -- 4 Conclusion -- References -- A Thieves Identification Scheme for Prepaid Systems in Smart Grids -- 1 Introduction -- 2 Related Work -- 3 The Framework -- 3.1 Network Model -- 3.2 Security Requirements -- 4 Our Proposed Approach -- 4.1 Setup -- 4.2 Joining -- 4.3 Power Purchasing -- 4.4 Power Requesting -- 4.5 Identification -- 5 Conclusion -- References -- Using Smart Contracts to Improve Searchable Symmetric Encryption -- 1 Introduction -- 2 Notations -- 3 Preliminaries -- 3.1 Scheme of Searchable Symmetric Encryption -- 3.2 Smart Contract -- 4 Scheme of the Integrity Verification of Search Results -- 4.1 Merkle Tree -- 4.2 Proof of Integrity Verification of Search Results -- 5 Smart Contract Based Searchable Symmetric Encryption -- 5.1 Scheme of Smart Contract Based SSE -- 5.2 Details of Smart Contract Based SSE Scheme -- 6 Security and Performance Analyses -- 6.1 Security Analysis -- 6.2 Performance Analysis -- 6.3 Experimental Analysis -- 7 Conclusion -- References -- Towards the Adaptability of Traffic-Based IoT Security Management Systems to the Device Behavior Evolutions -- 1 Introduction -- 2 IoT Security Management Systems -- 3 IoT Device Behavior Evolutions -- 4 Possible Solutions -- 5 Conclusion. References -- Author Index. |
Record Nr. | UNINA-9910490025803321 |
Cham, Switzerland : , : Springer, , [2021] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Distributed Fusion Estimation for Sensor Networks with Communication Constraints / / by Wen-An Zhang, Bo Chen, Haiyu Song, Li Yu |
Autore | Zhang Wen-An |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (XII, 210 p. 96 illus., 38 illus. in color.) |
Disciplina | 629.8 |
Soggetto topico |
Control engineering
Signal processing Image processing Speech processing systems Electrical engineering Computer communication systems Control and Systems Theory Signal, Image and Speech Processing Communications Engineering, Networks Computer Communication Networks |
ISBN | 981-10-0795-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Multi-Rate Kalman Fusion Estimation for WSNs -- Kalman Fusion Estimation for WSNs with Non-Uniform Estimation Rates -- H1 Fusion Estimation for WSNs with Non-Uniform Sampling Rates -- Fusion Estimation for WSNs Using Dimension Reduction Method -- H1 Fusion Estimation for WSNs with Quantization -- Hierarchical Asynchronous Fusion Estimation for WSNs -- Fusion Estimation for WSNs with Delayed Measurements -- Fusion Estimation for WSNs with Delays and Packet Losses. |
Record Nr. | UNINA-9910254227903321 |
Zhang Wen-An | ||
Singapore : , : Springer Singapore : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Emerging low-dimensional materials / / by Bo Chen, Rutao Wang, Nana Wang, editors |
Pubbl/distr/stampa | Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , [2023] |
Descrizione fisica | 1 online resource (166 pages) |
Disciplina | 537.623 |
Soggetto topico | Superconductivity |
ISBN | 3-0365-6829-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910683381803321 |
Basel : , : MDPI - Multidisciplinary Digital Publishing Institute, , [2023] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Proceedings of the 11th International Conference on Computer Engineering and Networks |
Autore | Liu Qi |
Pubbl/distr/stampa | Singapore : , : Springer Singapore Pte. Limited, , 2021 |
Descrizione fisica | 1 online resource (1699 pages) |
Altri autori (Persone) |
LiuXiaodong
ChenBo ZhangYiming PengJiansheng |
Collana | Lecture Notes in Electrical Engineering Ser. |
Soggetto genere / forma | Electronic books. |
ISBN |
9789811665547
9789811665530 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Intro -- Preface -- Contents -- IOTS Internet of Things and Smart Systems -- A Double Incentive Trading Mechanism for IoT and Blockchain Based Electricity Trading in Local Energy Market -- 1 Introduction -- 2 Blockchain-Based Local Energy Market -- 3 Methodology -- 3.1 System Architecture -- 3.2 Transaction Mechanism -- 4 Case Study -- 5 Conclusion -- References -- A Survey on Task Offloading in Edge Computing for Smart Grid -- 1 Introduction -- 2 Edge Computing -- 2.1 Definition of Edge Computing -- 2.2 Architecture of Edge Computing -- 3 Task Offloading in Edge Computing -- 3.1 The Classification of Task Offloading -- 3.2 Task Unloading Process -- 3.3 Task Offloading Scenario -- 4 Challenges and Future Works -- 5 Conclusion -- References -- Data Fusion of Power IoT Based on GOWA Operator and D-S Evidence Theory -- 1 Introduction -- 2 Related Works -- 3 DFMD -- 4 Simulation -- 4.1 Datasets -- 4.2 Simulation Results -- 5 Conclusion -- References -- Edge Task Offloading Method for Power Internet of Things Based on Multi-round Combined Auction -- 1 Introduction -- 2 Related Work -- 3 Problem Formulation -- 4 Algorithm Design Based on Auction Model -- 4.1 Tender Submission Stage -- 4.2 Resource Block Pre-allocation Phase -- 4.3 Winner Determination Stage -- 5 Experimental Evaluation -- 6 Conclusion -- References -- VEC-MOTAG: Vehicular Edge Computing Based Moving Target Defense System -- 1 Introduction -- 2 Related Work -- 3 Threat Model and System Overview -- 4 System Design: Vehicular Edge Computing Based MOTAG System -- 4.1 Accessibility Constraint -- 4.2 QoS Constraints -- 4.3 Capacity Constraints -- 5 Evaluation -- 6 Conclusion -- References -- AIA Artificial Intelligence and Applications -- Short-Term Wind Power Forecasting Based on the Deep Learning Approach Optimized by the Improved T-distributed Stochastic Neighbor Embedding.
1 Introduction -- 2 Proposed Approaches -- 2.1 Wind Power Forecasting Model Architecture Design -- 2.2 Data Preprocessing of the Wind Power Time Series -- 2.3 Metrics Design for Wind Power Forecasting -- 3 Experiments -- 4 Conclusions -- References -- Adaptive Image Steganographic Analysis System Based on Deep Convolutional Neural Network -- 1 Introduction -- 2 Adaptive Image Steganography Analysis Method -- 2.1 Deep Convolutional Neural Network Structure -- 2.2 Steganalysis Method -- 3 Model Training -- 3.1 Experimental Data and Platform -- 3.2 Experimental Results and Analysis -- 4 System Design -- 4.1 System Framework Design -- 4.2 System Function -- 5 Conclusion -- References -- An Efficient Channel Attention CNN for Facial Expression Recognition -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Face Detection and Correction -- 3.2 Improved Network Framework Based on DenseNet -- 3.3 Loss Function -- 4 Experiment -- 4.1 Experimental Platform -- 4.2 Experimental Results -- 5 Conclusion -- References -- Handwritten Digit Recognition Application Based on Fully Connected Neural Network -- 1 Introduction -- 2 Key Technologies of Fully Connected Neural Network in Handwritten Digit Recognition -- 2.1 Activation Function -- 2.2 Sigmoid Function -- 2.3 Relu Function -- 2.4 Loss Function -- 2.5 The Core Code of the Fully Connected Neural Network in the Application of Handwritten Digit Recognition -- 3 MNIST Data Set -- 3.1 Analysis of Results -- References -- Detection System of Truck Blind Area Based on YOLOv3 -- 1 The Introduction -- 2 YOLOv3 -- 2.1 Introduction to YOLOV3 Algorithm -- 2.2 YOLO3 Network Structure -- 3 System is Introduced -- 3.1 System Architecture Diagram -- 3.2 The System Design -- 4 The System Test -- 4.1 The Test Environment -- 4.2 Test Indicators -- 4.3 The Experimental Process -- 5 Conclusion -- References. Driver Fatigue Detection Algorithm Based on SMO Algorithm -- 1 Introduction -- 2 Fatigue State Recognition Based on Machine Vision -- 2.1 Face Feature Location -- 2.2 Extraction of Eye Feature Parameters Based on SMO Selection Strategy -- 2.3 Training Test Based on the Opening and Closing Degree of Human Eyes -- 3 Simulation Experiment -- 4 Conclusion -- References -- Image Mosaic Technology Based on Harris Corner Feature -- 1 Introduction -- 2 Theory and Technology -- 2.1 Image Registration -- 2.2 Harris Image Feature Extraction -- 2.3 Calculation of Homography Matrix -- 3 Image Mosaic Process -- 3.1 Feature Point Capture -- 3.2 Adaptive Non-maximum Suppression -- 3.3 Description of Key Points -- 3.4 Matching of Key Points -- 3.5 The Composition of New Images -- 4 Experiment -- 4.1 Image Mosaic of Existing Data Sets -- 4.2 Actual Shot Image -- 5 Concludes -- References -- Image Semantic Segmentation Based on Joint Normalization -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 Network Structure -- 3.2 Normalization Method -- 4 Experiment -- 4.1 Dataset -- 4.2 Analysis -- 5 Conclusion -- References -- DeepINN: Identifying Influential Nodes Based on Deep Learning Method -- 1 Introduction -- 2 Related Work -- 2.1 Node Identification Method Based on Node Ranking Method -- 2.2 Network Embedding Method -- 3 DeepINN -- 3.1 Node Similarity Based on Network Embedding -- 3.2 Node Sampling Algorithm Based on Community Structure -- 3.3 Node Screening Strategy Based on Influential Communities -- 4 Experimental Results -- 4.1 Data Preparation -- 4.2 Parameter Settings of the Network Embedding Methods -- 4.3 Results -- 5 Conclusion -- References -- Lightweight Semantic Segmentation Convolutional Neural Network Based on SKNet -- 1 Introduction -- 2 Related Work -- 3 Method -- 3.1 The Network Structure -- 3.2 SKNet -- 4 Experiment. 4.1 Experimental Environment -- 4.2 Experimental Results and Analysis -- 5 Conclusion -- References -- The Research on Image Detection and Extraction Method Based on Yin and Yang Discrete Points -- 1 Introduction -- 2 Design of the Sampling Method of Yin and Yang Discrete Points -- 2.1 Yin and Yang Discrete Points Sampling -- 2.2 Parameter Tuning of Discrete Point Sampling Method -- 2.3 Analysis of Anti-noise Interference Ability -- 2.4 Constructing Independent Regions of Discrete Graphs -- 3 Research on Shape Detection and Extraction Based on Yin And Yang Discrete Points -- 4 Experimental Results -- 5 Conclusion -- References -- Research on Short-Term Power Load Prediction Based on Deep Learning -- 1 Introduction -- 2 Deep Learning Models -- 3 Prediction Results and Analysis of Power Short-Term Load Models -- 4 Conclusion -- References -- Image Repair Methods Based on Deep Residual Networks -- 1 Related Work -- 2 Body Method -- 2.1 Repair the Module -- 2.2 Mitigation Module -- 2.3 Loss Function -- 3 Analysis of Experimental Results -- 4 Conclusions -- References -- Real-Time Traffic Sign Detection Based on Improved YOLO V3 -- 1 Introduction -- 2 YOLO V3 Target Detection Algorithm -- 3 Data Collection and Data Enhancement -- 3.1 Data Collection -- 3.2 Data Enhancement -- 4 Analysis of Experimental Simulation Results -- 5 Conclusion -- References -- Design of Ground Station for Fire Fighting Robot -- 1 Introduction -- 2 Ground Station Design -- 2.1 Basic Composition of Ground Stations -- 2.2 Operating System Module -- 2.3 Wireless Communication Module -- 2.4 Power Module -- 3 Project Design -- 3.1 Wireless Communication Module Design -- 3.2 Power Module Design -- 3.3 Overall Design Diagram Design -- 4 Conclusion -- References -- Baby Expression Recognition System Design and Implementation Based on Deep Learning -- 1 Introduction -- 2 Related Work. 2.1 Deep Learning Based on Neural Networks -- 2.2 Expression Detection and Correction -- 2.3 Face Recognition Technology -- 3 System Design -- 3.1 General Interface Design -- 3.2 Objective Comparison -- 3.3 System Module -- 3.4 Software Testing -- 4 Conclusion -- References -- Handwriting Imitation with Generative Adversarial Networks -- 1 Introduction -- 2 Related Work -- 3 Architecture -- 4 Experiment -- 4.1 Data Set -- 4.2 Experiment Result -- 5 Conclusion -- 6 Expectation -- References -- Epidemic Real-Time Monitor Based on Spark Streaming Real-Time Computing Algorithm -- 1 Introduction -- 2 Related Work -- 2.1 Introduction to Spark -- 2.2 Introduction to Spark Streaming -- 2.3 Comparison of the Advantages and Disadvantages of Spark Streaming and Storm -- 3 Method -- 3.1 Algorithm Introduction -- 3.2 Algorithm Implementation -- 4 Experiments -- 4.1 Test Results -- 5 Conclusion -- References -- Design and Implementation of Fruit and Vegetable Vending Machine Based on Deep Vision -- 1 Introduction -- 2 System Hardware Design -- 3 System Programming -- 3.1 System Control Terminal Design -- 3.2 System Recognition Terminal Program Design -- 4 Overall System Debugging -- 5 Summary and Outlook -- References -- Design and Implementation of License Plate Recognition System Based on Android -- 1 Introduction -- 2 The Overall Algorithm Flow of the System -- 3 Image Preprocessing -- 3.1 Image Grayscale Algorithm Selection -- 3.2 Image Binarization Algorithm Selection -- 3.3 Edge Detection Algorithm Selection -- 3.4 Morphological Processing -- 4 License Plate Positioning -- 5 Character Segmentation Test and Analysis -- 6 Application Design -- 7 Summary and Outlook -- References -- Pseudo-block Diagonally Dominant Matrix Based on Bipartite Non-singular Block Eigenvalues -- 1 Introduction. 2 Quasi-block Diagonally Dominant Matrix Based on Bipartite Non-singular Block Eigenvalues. |
Record Nr. | UNINA-9910508457803321 |
Liu Qi | ||
Singapore : , : Springer Singapore Pte. Limited, , 2021 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|