Applied Mechanics and Materials Vols. 479-480

Paper Title Page

Abstract: We propose a three-dimensional (3D) image encryption method based on the modified computational integral imaging (CII) technique with the smart pixel mapping (SPM) algorithm, which is introduced for reconstructing orthoscopic 3D images with improved image quality. The depth-converted two-dimensional (2D) elemental image array (EIA) is firstly obtained by SPM-based CII system, and then the 2D EIA is encrypted by Fibonacci transform for 3D image encryption. Compared with conventional encryption methods based on integral imaging (II), the proposed method enables us to reconstruct orthoscopic 3D images at long distance. In addition, the qualities of the reconstructed plane images are enhanced by applying the SPM and pixel average algorithm (PAA) in CII. To show the usefulness of the proposed method, we carry out the preliminary experiments and present the experimental results.
958
Abstract: Nowadays, we can easily obtain variety of services through network. But due to the open environment, networks are vulnerable to variety of security threats. Ramasamy et al. proposed a discrete logarithm based remote authentication scheme with smart cards. Their scheme provides mutual authentication and withstanding the denial of service attack, forgery attack, parallel session attack and smart card loss attack. In this article, we show that their scheme is not a practical solution for remote accessing. It also lacks key agreement mechanism; and users cannot update password freely. Moreover, their scheme cannot resist the stolen verifier attack and off-line guessing attack.
963
Abstract: Wireless Networkinfrastructure has Developed Rapidly with the Popularity of Personal Mobiledevices. Userscan Use Mobile Devices to Roam the Wireless Network Environment Conductingtransactions such as Sending Messages and Accessing the Internet. Networkcommunication has Become a Lifestyle Necessity. the Application of Information Technologyproducts also Brings IT Security Issues. the Wireless Network Environment Makesmessages Susceptible to Eavesdropping and Data Tampering Attacks. in Addition,the Mobile Device Computation Ability Presents Power Limiting Issues. Therefore,achieving Efficiency and Security Requirements is more Difficult in Mobiledevice Data Transfer over a Wireless Network Compared with a Hard-Wiredcomputer Network. Insecurity Issues Abound in Peer to Peer (P2P) Networks.Conducting Identity Authentication Recognized Certified Legal Membership Andperforming Message Delivery and Shared Information are Critical Issues. Theidentity (ID) Authentication and Certification for this Type of Network Hasbecome an Important Issue. the Paperpresents a Secure Communication Method Using Self-Certified Sign-Cryption Witha Blind Signature Scheme Based on Elliptic Curve Cryptography (ECC) Forhybrid P2P Networks. Theoreticalanalysis Shows Better Secure Identification-and-Authentication Features.
968
Abstract: Information dissemination in inter-vehicle communication is a main way to propagate and obtain the communicating messages among vehicles and infrastructures of road networks in vehicular ad-hoc network (VANET). However, a well-designed protocol for information dissemination would probably provide the higher performance of information dissemination in VANET. In this paper, we propose the improved information dissemination schemes for multi-hop broadcasting in VANET. Our proposed scheme will select a better message forwarder to forward the messages to its neighboring vehicles according to the back-off time for reducing the waiting time in the directional broadcasting. It will also adopt the road-side unit to keep the disseminated message at the intersection of the roads for waiting to disseminate the messages when the vehicle is crossing the intersection which may probably act as a message forwarder to forward the disseminated messages to the intersectional direction. In our simulation, the result indicates that our proposed scheme can efficiently disseminate the messages under the consideration of back-off time in VANET.
973
Abstract: The concept of vehicle-to-grid (V2G) is that electric vehicles (EVs) communicate with the smart grid to sell demand response services by delivering electricity into the grid. Due to the scale of the network, the speed of the vehicles, their geographic positions, and the very sporadic connectivity between them, V2G communications have the crucial requirements of fast session key establishment. In this paper, we propose a threshold-based privacy-preserving key management scheme for V2G networks, which utilizes the threshold-based secret sharing and symmetric key technique to protect the identities of the EV owners and to establish the shared session key between the aggregator and the vehicle. The proposed scheme can achieve the property of identity privacy, confidentiality of the communications, and known-key security.
978
Abstract: In this paper, the switching signal design to robust exponential stability for discrete-time switched systems with interval time-varying delay is considered. LMI-based conditions are proposed to guarantee the global exponential stability for such system with parametric perturbations by using a switching signal. The appropriate Lyapunov functionals are used to reduce the conservativeness of systems. Finally, a numerical example is illustrated to show the main results.
983
Abstract: In this paper, an improved hybrid Differential Evolution (DE) is proposed to enhance optimization performance by cooperating Dynamic Scaling Mutation (DSM) and Wrapper Local Search (WLS) schemes. When evolution speed is standstill, DSM can improve searching ability to achieve better balance between exploitation and exploration in the search space. Furthermore, WLS can disturb individuals to fine tune the searching range around and then properly find better solutions in the evolution progress. The effective particle encoding representation named Particle Segment Operation-Machine Assignment (PSOMA) that we previously published is also applied to always produce feasible candidate solutions for hybrid DE model to solve the Flexible Job-Shop Scheduling Problem (FJSP). To test the performance of the proposed hybrid method, the experiments contain five frequently used CEC 2005 numerical functions and three representative FJSP benchmarks for single-objective and multi-objective optimization verifications, respectively. Compare the proposed method with the other related published algorithms, the simulation results indicate that our proposed method exhibits better performance for solving most the test functions for single-objective problems. In addition, the wide range of Pareto-optimal solutions and the more Gantt chart diversities can be obtained for the multi-objective FJSP in practical decision-making considerations.
989
Abstract: Since the rapid developing of economy in Taiwan in recently years, a large numbers of constructions have made the changes on theterrain surrounding of the radio monitoring stations rapidly. Hence, the accuracy performance of the radio monitoring station configured by signal angle of arrival (AOA) location technology has been seriously degraded. In this paper, the simulated result of 20km ~ 30km coverage area is evaluated. Furthermore, the implementation and experiments supported by the radio frequency interference have been governed by authority of national communication commissions (NCC) in Taiwan. The results show that the locating accuracy at circle error probability (CEP) 50% is less than 950 m distance under multi-path effect in metropolitan area. Hence, the solution of integrated the AOA/TDOA technologies can be applied and the interference transmitter characterized with low transmitted power, burst and weak signal and metropolitan interference is easy identified, analyzed (located) and prevented.
996
Abstract: The goal of the reasoning system in this study is to identify the most similar failure type or failure cases. As a user inputs all possible requirements (attributes), the inference engine of the system carries out its similarity assessment (inference approaches) and ranks rules or cases from the data base. Various inference approaches are chosen to find out the optimal method for the RBR and CBR system. The CBR system offers two types of inference methods which are hierarchical factors, flat factors without weight. For RBR system, there three types of inference methods are chosen, one is complete matched and the others are partial matched approaches which use the inference capability of CBR. The performance of developed system is then evaluated by using the real cases from China Steel Corporation (CSC). For the RBR system, performance is directly check the inferred order of the document ranking list. For the CBR system, the effectiveness of each inference method is evaluated by using Recall, Precision, and F-Measure approaches. From the test results, many recommendations are proposed.
1001
Abstract: In this paper, a fusion scheme that combines Gaussian mixture model (GMM) calculations and formant feature analysis, called GMM-Formant, is proposed for classification of Chinese popular songs. Generally, automatic classification of popular music could be performed by two main categories of techniques, model-based and feature-based approaches. In model-based classification techniques, GMM is widely used for its simplicity. In feature-based music recognition, the formant parameter is an important acoustic feature for evaluation. The proposed GMM-Formant method takes use of linear interpolation for combining GMM likelihood estimates and formant evaluation results appropriately. GMM-Formant will effectively adjust the likelihood score, which is derived from GMM calculations, by referring to certain degree of formant feature evaluation outcomes. By considering both model-based and feature-based techniques for song classification, GMM-Formant provides a more reliable recognition classification result and therefore will maintain a satisfactory performance in recognition accuracy. Experimental results obtained from a musical data set of numerous Chinese popular songs show the superiority of the proposed GMM-Formant. Keywords: Song classification; Gaussian mixture model; Formant feature; GMM-Formant.
1006

Showing 181 to 190 of 229 Paper Titles