نتایج جستجو برای: identification scheme

تعداد نتایج: 625502  

2005
A. FILIPESCU U. NUNES S. STAMATESCU

In this paper a discrete-time adaptive sliding mode controller for wheeled mobile robots (WMR) is presented. The dynamical model with time-varying mass has been taken into account. The sliding-mode controller has designed on two components, corresponding to angular and position motion, respectively. In order to accomplish the robustness against parameter uncertainties (robot mass and moment of ...

2011
Yangqiu Xie Yanghong Tan Ruili Dong

In this paper, an identification scheme for sandwich systems with a dead zone is proposed. In this scheme, a so-called combinational input is proposed to transform the sandwich model with a dead zone into a model with separated parameters. Then, the recursive general identification algorithm can be applied to the parameter-estimation, since the transformed model has a form that is linearized in...

2004
Brett Watson

Many abuses of the Internet’s electronic mail system rely on its intrinsic lack of reliable sender identification, and many parties have proposed schemes to retro-fit sender identification into the system to combat such abuse. This paper considers what the spam problem and its countermeasures would be like under a theoretically ideal sender identification scheme, with some attention to the reso...

Journal: :CoRR 2014
Weijia Han Huiyan Sang Min Sheng Jiandong Li Shuguang Cui

In cognitive radio (CR) technology, the trend of sensing is no longer to only detect the presence of active primary users. A large number of applications demand for more comprehensive knowledge on primary user behaviors in spatial, temporal, and frequency domains. To satisfy such requirements, we study the statistical relationship among primary users by introducing a Bayesian network (BN) based...

2008
Sungwook Kim Jung Hee Cheon

A low Hamming weight product (LHWP) exponent is used to increase the efficiency of cryptosystems based on the discrete logarithm problem (DLP). In this paper, we introduce a new tool, called a Parameterized Splitting System, to analyze the security of the DLP with LHWP exponents. We apply a parameterized splitting system to attack the GPS identification scheme modified by Coron, Lefranc and Pou...

2011
Sneha S. Rana

Majority of the network host today are threatened by the network attacks like Denial-of-service(DoS) attack, Distributed DoS(DDoS) attack. The path identification scheme described in this paper can trace back an individual packet back to its source. The routers along the path of the packet mark the packet based on deterministic marking scheme with effective storage requirement by using hash bas...

1988
Axel Mahler Andreas Lampen

This paper describes the design of a configuration management toolkit, which integrates a dedicated version control system and shape, a significantly enhanced Make [7] program. Enhancements include full access to the version control system and support of configuration rules which control the selection process for component versions during identification, build or rebuild of system configuration...

Journal: :Computer Networks 2010
Xiaodong Lin Rongxing Lu Davis Kwan Xuemin Shen

1389-1286/$ see front matter 2010 Elsevier B.V doi:10.1016/j.comnet.2010.05.005 * Corresponding author. E-mail addresses: [email protected] (X. Lin), ca (R. Lu), [email protected] (D. Kwan), xshe (Xuemin (Sherman) Shen). In this paper, we propose an RFID-based privacy-preserving children tracking (REACT) scheme for helping locate missing children in large amusement parks and other public ven...

Journal: :Digital Signal Processing 2009
Takeshi Yoshimura Chang-Jun Ahn Takeshi Kamio Hisato Fujisaka Kazuhisa Haeiwa

Recently time-frequency interferometry (TFI)OFDM has been proposed as a channel identification scheme. TFI-OFDM system can multiplex the same impulse response in twice on the time domain without overlapping to each other. In this case, the required pilot signal is only one. Moreover, by averaging of these impulse responses, the accurated channel impulse responses are obtained. However, if the t...

Journal: :Computer Standards & Interfaces 2004
Chao-Liang Liu Gwoboa Horng Hsin-Yu Liu

In 1998, Tseng and Jan proposed a lightweight interactive user identification protocol based on ID-based cryptography. Recently, Hwang et al. modified their protocol to reduce the responding and waiting time for wireless network applications. In this letter, we show that their scheme is vulnerable to impersonation attacks. key words: cryptanalysis, user identification, ID-based cryptosystem, wi...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید