نتایج جستجو برای: identification scheme
تعداد نتایج: 625502 فیلتر نتایج به سال:
In this paper a discrete-time adaptive sliding mode controller for wheeled mobile robots (WMR) is presented. The dynamical model with time-varying mass has been taken into account. The sliding-mode controller has designed on two components, corresponding to angular and position motion, respectively. In order to accomplish the robustness against parameter uncertainties (robot mass and moment of ...
In this paper, an identification scheme for sandwich systems with a dead zone is proposed. In this scheme, a so-called combinational input is proposed to transform the sandwich model with a dead zone into a model with separated parameters. Then, the recursive general identification algorithm can be applied to the parameter-estimation, since the transformed model has a form that is linearized in...
Many abuses of the Internet’s electronic mail system rely on its intrinsic lack of reliable sender identification, and many parties have proposed schemes to retro-fit sender identification into the system to combat such abuse. This paper considers what the spam problem and its countermeasures would be like under a theoretically ideal sender identification scheme, with some attention to the reso...
In cognitive radio (CR) technology, the trend of sensing is no longer to only detect the presence of active primary users. A large number of applications demand for more comprehensive knowledge on primary user behaviors in spatial, temporal, and frequency domains. To satisfy such requirements, we study the statistical relationship among primary users by introducing a Bayesian network (BN) based...
A low Hamming weight product (LHWP) exponent is used to increase the efficiency of cryptosystems based on the discrete logarithm problem (DLP). In this paper, we introduce a new tool, called a Parameterized Splitting System, to analyze the security of the DLP with LHWP exponents. We apply a parameterized splitting system to attack the GPS identification scheme modified by Coron, Lefranc and Pou...
Majority of the network host today are threatened by the network attacks like Denial-of-service(DoS) attack, Distributed DoS(DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based on deterministic marking scheme with effective storage requirement by using hash bas...
This paper describes the design of a configuration management toolkit, which integrates a dedicated version control system and shape, a significantly enhanced Make [7] program. Enhancements include full access to the version control system and support of configuration rules which control the selection process for component versions during identification, build or rebuild of system configuration...
1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.05.005 * Corresponding author. E-mail addresses: [email protected] (X. Lin), ca (R. Lu), [email protected] (D. Kwan), xshe (Xuemin (Sherman) Shen). In this paper, we propose an RFID-based privacy-preserving children tracking (REACT) scheme for helping locate missing children in large amusement parks and other public ven...
Recently time-frequency interferometry (TFI)OFDM has been proposed as a channel identification scheme. TFI-OFDM system can multiplex the same impulse response in twice on the time domain without overlapping to each other. In this case, the required pilot signal is only one. Moreover, by averaging of these impulse responses, the accurated channel impulse responses are obtained. However, if the t...
In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks. key words: cryptanalysis, user identification, ID-based cryptosystem, wi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید