Showing 261 - 280 results of 684 for search '"computational complexity"', query time: 0.04s Refine Results
  1. 261

    Efficient strong privacy protection and transferable attribute-based ticket scheme by Huamin FENG, Rui SHI, Feng YUAN, Yanjun LI, Yang YANG

    Published 2022-03-01
    “…To solve the problems of efficiency, flexibility, and privacy protection faced by electronic tickets, an efficient and transferable attribute-based ticket scheme with strong privacy protection was proposed.Firstly, a ticket issuing algorithm based on attribute disclosure was constructed by combining attribute-based credentials and set commitment.Secondly, the structure-preserving signature on equivalence class and dynamic malleable signature were used to reduce the computational complexity of the ticket issuance, and the ticket transfer and ticket verification with constant complexity were realized.In addition, to prevent the possibility of malicious verifiers guessing user information according to the seller’s identity, the scheme not only realized the anonymity of the user, but also realized the anonymity of the seller in the ticket verification for the first time.Finally, the security definition of the scheme was given, and its security was reduced to either well-known complexity cryptography assumptions or the security of proven cryptography primitives.Comparison and experimental results demonstrate that the proposed scheme is flexible and efficient.…”
    Get full text
    Article
  2. 262

    Physical-layer security transmission method based on spatial modulation with finite alphabet inputs by Bo CUI, Lu LIU, Xiang-yu LI, Liang JIN

    Published 2015-02-01
    “…Addressing the problem of wireless physical layer security transmission for finite alphabet input systems,a spatial modulation secure transmission method is proposed.On the basis of information theory,the method utilizes the receive antenna indices of multiple-input multiple-output (MIMO) system to bear information,and randomizes the eavesdropper’s equivalent channel by switching the receive antennas,which can guarantee physical layer security transmission.First,the different receiving performances of the legitimate user and eavesdropper are analyzed in the spatial modulation secure transmission system.Second,the mutual information and secrecy mutual information of the transmission system are calculated,and two sufficient conditions that ensure positive secrecy mutual information are pointed out.Finally,an estimation algorithm of mutual information is provided.Moreover,the symmetry of finite alphabet set is exploited to decrease the computational complexity.Theoretical analysis and numerical simulation results verify the availability of the security transmission method.…”
    Get full text
    Article
  3. 263

    Verifiable access control scheme based on unpaired CP-ABE in fog computing by Jiangtao DONG, Peiwen YAN, Ruizhong DU

    Published 2021-08-01
    “…Fog computing extends computing power and data analysis applications to the edge of the network, solves the latency problem of cloud computing, and also brings new challenges to data security.Attribute encryption based on ciphertext strategy (CP-ABE) is a technology to ensure data confidentiality and fine-grained access control.The excessive computational overhead of bilinear pairing restricts its application and development.In response to this, a verifiable access control scheme was proposed based on unpaired CP-ABE in fog computing.In order to make CP-ABE more efficient, simple scalar multiplication in elliptic curve encryption was used to replace bilinear pairing, thereby reducing the overall computational overhead.Decryption operations were outsourced to fog nodes to reduce user computational complexity, and based on the tamper-proof and traceable characteristics of the blockchain, the correctness of the access transaction was verified and the access authorization process was recorded.Security and performance analysis shows that the scheme is safe under the elliptic curve decision-making DBDH (Diffie-Hellman) assumption, and the calculation efficiency is higher.…”
    Get full text
    Article
  4. 264

    Programmed Tool for Quantifying Reliability and Its Application in Designing Circuit Systems by N. S. S. Singh

    Published 2014-01-01
    “…However, the process of computing reliability has become very time consuming and troublesome as the computational complexity grows exponentially with the dimension of circuit systems. …”
    Get full text
    Article
  5. 265

    A Combined ESPRIT-MUSIC Method for FDA-MIMO Radar with Extended Range Ambiguity Using Staggered Frequency Increment by Yuwei Song, Guimei Zheng, Guoping Hu

    Published 2019-01-01
    “…For the problem of joint angle and range estimation with frequency diverse array (FDA), MIMO radar, staggered frequency increment is proposed to expand the range ambiguity and the joint algorithm of ESPRIT and MUSIC is proposed to reduce the computational complexity. The uniformly weighted beampattern of FDA is a SINC-like function. …”
    Get full text
    Article
  6. 266

    Covariance matrix opportunistic cooperative spectrum sensing of high detection probability by Shunlan LIU, Jing WANG, Jianrong BAO

    Published 2019-01-01
    “…Moreover, the proposed algorithm has high energy efficiency as well as the moderate computational complexity, so it is especially suited for the spectrum cognition applications in the new generation wireless communication.…”
    Get full text
    Article
  7. 267

    A peak-to-average power ratio reduction method for mixed-numerology multi-carrier systems by Nan SHI, Xiaoran LIU, Jun XIONG, Xiaoying ZHANG, Jibo WEI

    Published 2023-10-01
    “…In order to support diverse service demands of communication scenarios, 5G adopts the mixed-numerology system based on orthogonal frequency division multiplexing (OFDM).The mixed-numerology systems still have the problem of high peak-to-average power ratio (PAPR).Furthermore, its design structure makes it difficult to apply traditional PAPR suppression methods straight forwardly, in which mixed signals are generated by superimposing multiple sub-signals with different parameters.An optimization model for minimizing PAPR in mixed-numerology systems was established based on tone reservation method.Utilizing the characteristic of single-peak of time-domain kernel, the multiple copies were generated in different numerologies based on the peak position of the mixed signal.The mixed time-domain kernel was then superimposed to reduce the peaks of the mixed signal.Since the proposed algorithm didn’t require inverse fast Fourier transform (IFFT)/ fast Fourier transform (FFT) operations during iteration, it had relatively low computational complexity.Simulation results show that the proposed algorithm effectively reduces the PAPR of mixed signals.…”
    Get full text
    Article
  8. 268

    Fast Block Partitioning Algorithm for HEVC Based on Spatial Correlation and Image Texture by Yingbiao Yao, Xiaojuan Li

    Published 2015-01-01
    “…Compared with HM13.0, experimental results reveal that the proposed algorithm can save about 20% computational complexity on average whereas the average bit rate increment is 0.84% and the decrement of PSNR is 0.04 dB.…”
    Get full text
    Article
  9. 269

    Low-Complexity Online Synthesis for AMIDAR Processors by Stefan Döbrich, Christian Hochberger

    Published 2010-01-01
    “…In this paper, we show that even a relative simplistic synthesis approach with low computational complexity can have a strong impact on the performance of compute intensive applications.…”
    Get full text
    Article
  10. 270

    Analysis the self-similarity of network traffic in fractional Fourier transform domain by Tong GUO, Ju-long LAN, Wan-wei HUANG, Zhen ZHANG

    Published 2013-06-01
    “…Statistical characteristics of network traffic data in FrFT domain were analyzed,which indicates the self-simi-larity feature.Further,Hurst parameter estimation methods based on modified ensemble empirical mode decomposi-tion-detrended fluctuation analysis (MEEMD-DFA) and adaptive estimator with weighted least square regression (WLSR) were presented,which aimed at displaying network traffic in “time” or “frequency” domain of FrFT domain separately.Experimental results demonstrate that the MEEMD-DFA method has more accurate estimate precision but higher com-putational complexity than existing common methods.The overall robustness of adaptive estimator is more satisfactory than that of the other methods in simulation,while it has lower computational complexity.Thus,it can be used as a real-time online Hurst parameter estimator for traffic data.…”
    Get full text
    Article
  11. 271

    Malicious domain name detection method based on associated information extraction by Bin ZHANG, Renjie LIAO

    Published 2021-10-01
    “…To improve the accuracy of malicious domain name detection based on the associated information, a detection method combining resolution information and query time was proposed.Firstly, the resolution information was mapped to nodes and edges in a heterogeneous information network, which improved the utilization rate.Secondly, considering the problem of high computational complexity in extracting associated information with matrix multiplication, an efficiency breadth-first network traversal algorithm based on meta-path was proposed.Then, the query time was used to detect the domain names lacking meta-path information, which improved the coverage rate.Finally, domain names were vectorized by representation learning with adaptive weight.The Euclidean distance between domain name feature vectors was used to quantify the correlation between domain names.Based on the vectors learned above, a supervised classifier was constructed to detect malicious domain names.Theoretical analysis and experimental results show that the proposed method preforms well in extraction domain name associated information.The coverage rate and F1 score are 97.7% and 0.951 respectively.…”
    Get full text
    Article
  12. 272

    Improved integral attack——random linear distinguish and key recovery attack by Shaoyu DU

    Published 2023-04-01
    “…Based on the integral attack and collision attack of four rounds of AES, a random linear distinguish attack against four rounds of SP block ciphers was proposed, which took advantage of the non-uniformity of linear biases’ distribution between some blocks of plaintext and inner state.Combined with precomputation, a key recovery attack against four rounds of AES-like block ciphers was proposed.For LED-64, the results of distinguish attack and key recovery attack were given.Therein for LED-64 of 1-Step, the probability of successful distinguish attack is 85% under the condition that the data complexity is 2<sup>8</sup> and the computational complexity is 2<sup>16</sup> basic operation.For LED-64 of 2-Step, the calculation complexity of the key recovery attack under the condition of related key is 2<sup>14</sup> basic operation, the data complexity is 2<sup>8</sup>, and the precomputation storage complexity is 2<sup>38</sup> half bytes.…”
    Get full text
    Article
  13. 273

    Fast two dimensional to three dimensional registration of fluoroscopy and CT-scans using Octrees on segmentation maps by Luca Bertelli, Frédéric Gibou

    Published 2012-06-01
    “…The DRR generation process is the bottleneck of any three dimensional to two dimensional registration system, since its computational complexity scales with the number of voxels in the Computed Tomography Data, which can be of the order of tens to hundreds of millions. …”
    Get full text
    Article
  14. 274

    Enhanced YOLOv5s for PCB Defect Detection with Coordinate Attention and Internal Convolution by Zhijun Xiao

    Published 2024-01-01
    “…This model aims to improve the detection accuracy of small defects while reducing computational complexity. Experiments on the PCB defect dataset demonstrate that the proposed CA-CBAM-IOYOLOv5s model achieves higher accuracy (97.8%), recall (98.6%), and F1 score (98.3%) compared to the basic YOLOv5s and other state-of-the-art models. …”
    Get full text
    Article
  15. 275

    Perfect space-time block codes and high performance decoding algorithm by HU Jun-feng1, YANG Yuan1, ZHANG Hai-lin1

    Published 2007-01-01
    “…Based on the structure of perfect space-time block codes(STBC),an equivalent vertical Bell Laboratories layered space-time(V-BLAST) decoding model was given.Minimum mean-square error decision feedback equalizer(MMSE-DFE) was used to preprocess this model and a decoder with boundary controlled Fano tree search algorithm was proposed.This decoder achieves almost maximum likelihood(ML) decoding performance and applies for any antenna configurations.For a wide range of signal-to-noise ratio(SNR),the decoder has lower computational complexity than that of previously proposed near-ML decoders.Operating in complex number field,the decoder is robust for any constellations.The decoder can apply for any multi-input multi-output(MIMO) systems that can be transformed into an equivalent V-BLAST model.Simulation results demonstrate the excellent performance of the proposed decoder.…”
    Get full text
    Article
  16. 276

    Scalable Alternating Projection and Proximal Splitting for Array Pattern Synthesis by Yubing Han, Chuan Wan

    Published 2015-01-01
    “…Finally, the selection of the weighted matrix and computational complexity are discussed briefly. Several typical linear and planar synthesis examples with or without the embedded element patterns are provided to demonstrate the effectiveness and power of the proposed method.…”
    Get full text
    Article
  17. 277

    An Efficient 2-D DOA Estimation for a Cylindrical Conformal Array with Unknown Mutual Coupling by Chao Liu, Shunian Yin

    Published 2018-01-01
    “…The proposed method can well calibrate the mutual coupling effect of a cylindrical array with a low computational complexity. The final simulation results corroborate our analysis.…”
    Get full text
    Article
  18. 278

    Low complexity acquisition algorithm for GPS signals with low SNR and high dynamic by Zhu-lin XIONG, Ce-lun LIU, Jian-ping AN, Ze-bin XIE

    Published 2015-03-01
    “…The results show that compared with the traditional periodogram algorithm, the proposed algorithm has much lower computational complexity and a little performance loss.…”
    Get full text
    Article
  19. 279

    Deep Learning-Based Prediction of Physical Stability considering Class Imbalance for Amorphous Solid Dispersions by Hanbyul Lee, Junghyun Kim, Suyeon Kim, Jimin Yoo, Guang J. Choi, Young-Seob Jeong

    Published 2022-01-01
    “…Furthermore, it significantly reduces the computational complexity of both training and test processes.…”
    Get full text
    Article
  20. 280

    Blind data recovery of single-channel mixed signals based on Turbo equalization and channel estimation by Dong-ling ZHANG, Yong YANG, Jing LI, Lin-dong GE

    Published 2014-01-01
    “…The timing synchronization is the key technique of the single-channel blind signal receiver.The single-channel blind recovery algorithm based on Turbo equalization was proposed,which does not require the timing synchronization.In the algorithm,the timing offset is taken as inter-symbol interference channel,which can improve the restorability of source signals by the feedback soft information between channel estimation and the turbo equalization.The primary works include the research on initial blind equalization algorithm,the channel estimation algorithm,MMSE equalization algorithm for the mixed signals and the soft information interaction among those three algorithms.The proposed algorithm has low computational complexity and small computational load,which can be applied to high-order modulated signals.Simulation results show that,good performance could be achieved for BPSK,QPSK and 8PSK modulated signals.In addition,the proposed algorithm is suitable for both equal power and unequal power signals.…”
    Get full text
    Article