Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Clean Installation Training System for Gas-Insulated Metal-Enclosed Switchgear based on Three-Dimensional Modeling and Virtual Reality Technology
ICCSIE '24: Proceedings of the 2024 9th International Conference on Cyber Security and Information EngineeringPages 952–956https://doi.org/10.1145/3689236.3696269The dust-free installation training system for Gas-Insulated Metal-Enclosed Switchgear (HGIS) is a key technology for the safe operation of the power system. This paper addresses the shortcomings of existing training methods and proposes a dust-free ...
- research-articleNovember 2024
Intelligent Reflecting Surface-Assisted NLOS Sensing With OFDM Signals
IEEE Transactions on Signal Processing (TSP), Volume 72Pages 5322–5337https://doi.org/10.1109/TSP.2024.3498861This work addresses the problem of intelligent reflecting surface (IRS) assisted target sensing in a non-line-of-sight (NLOS) scenario, where an IRS is employed to facilitate the radar/access point (AP) to sense the targets when the line-of-sight (LOS) ...
- research-articleSeptember 2023
Sub-Nyquist sampling-based wideband spectrum sensing: a compressed power spectrum estimation approach
Frontiers of Computer Science: Selected Publications from Chinese Universities (FCS), Volume 18, Issue 2https://doi.org/10.1007/s11704-022-2158-6AbstractIn this paper, we introduce a sub-Nyquist sampling-based receiver architecture and method for wideband spectrum sensing. Instead of recovering the original wideband analog signal, the proposed method aims to directly reconstruct the power spectrum ...
- ArticleAugust 2023
A Graphical Approach to Document Layout Analysis
- Jilin Wang,
- Michael Krumdick,
- Baojia Tong,
- Hamima Halim,
- Maxim Sokolov,
- Vadym Barda,
- Delphine Vendryes,
- Chris Tanner
Document Analysis and Recognition - ICDAR 2023Pages 53–69https://doi.org/10.1007/978-3-031-41734-4_4AbstractDocument layout analysis (DLA) is the task of detecting the distinct, semantic content within a document and correctly classifying these items into an appropriate category (e.g., text, title, figure). DLA pipelines enable users to convert ...
- research-articleJanuary 2019
An improved reversible data hiding scheme based on pixel permutation
International Journal of Information Technology and Management (IJITM), Volume 18, Issue 1Pages 110–125https://doi.org/10.1504/ijitm.2019.097903Low payload capacity is a flaw in pixel exchange-based reversible data hiding schemes. In order to improve it, this paper proposes a triangular pixel pair structure, which requires fewer pixels than a traditional 2 × 2 pixel block. At the same time, the ...
- ArticleJune 2011
Forgeability attack of two DLP-base proxy blind signature schemes
ICSI'11: Proceedings of the Second international conference on Advances in swarm intelligence - Volume Part IIPages 395–402Proxy blind signature is a cryptographical technique and allows a proxy signer to produce a proxy blind signature on behalf of original signer, in such a way that the authority learns nothing about the message that is being signed. The unforgeability is ...
- ArticleOctober 2010
Face Detection Method Research and Implementation Based on Adaboost
IPTC '10: Proceedings of the 2010 International Symposium on Intelligence Information Processing and Trusted ComputingPages 643–646https://doi.org/10.1109/IPTC.2010.125This paper describes and deduces the theory of Haar-like features, Integral image and AdaBoost algorithm, which were proposed by Paul Viola, and then researches its improvement. We combine Microsoft Visual C++6.0 with OpenCV Function library to develop ...
- ArticleAugust 2010
A controllable anonymous proxy signature scheme with revocation
Anonymous authentication is an important means of authorizing a user without identification. It serves as a breakthrough to enhance the privacy of the user and yet preserve the security of the system. Due to limited bandwidth, permanent connections ...
- articleJanuary 2010
Synthesis of boron nitride nanotubes by self-propagation high-temperature synthesis and annealing method
Journal of Nanomaterials (NANO), Volume 2010Article No.: 80, Pages 1–6https://doi.org/10.1155/2010/540456High-quality boron nitride nanotubes were synthesized by annealing porous precursor in flowing NH3 gas at 1150°C. The porous precursor B18Ca2(MgO)9 was produced by self-propagation high-temperature synthesis (SHS) method using Mg, B2O3, and CaB6 as the ...
- ArticleMay 2009
SCISM: A Solution for General Buffer Overflow Protection
WCSE '09: Proceedings of the 2009 WRI World Congress on Software Engineering - Volume 03Pages 429–434https://doi.org/10.1109/WCSE.2009.61In software coding practices, buffer overflow is most frequently used as a means of intrusion. Typically, an attacker is able to affect a successful intrusion by causing buffer overflow in the stack frame of a function call, thereby causing the valid ...
- ArticleDecember 2008
A Novel User Authentication Scheme Using Smart Cards
CSSE '08: Proceedings of the 2008 International Conference on Computer Science and Software Engineering - Volume 03Pages 834–836https://doi.org/10.1109/CSSE.2008.1043Recently, Das et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. Liao et al. pointed out some weaknesses of Das et al.’s scheme, and presented an improved scheme. However, an impersonate attack on Liao et al.’s ...
- ArticleOctober 2005
A convertible limited verifier signature scheme
WAIM'05: Proceedings of the 6th international conference on Advances in Web-Age Information ManagementPages 638–644https://doi.org/10.1007/11563952_57In some cases, it is not necessary for anyone to be convinced a justification of signer’s signature. Motivated by the above case, in this work we propose a provably secure convertible limited verifier signature scheme which based on the CDH assumption ...
- ArticleMarch 2004
An Improved Nominative Proxy Signature Scheme for Mobile Communication
Recently, Seung-Hyun et al proposed a nominativeproxy signature scheme for mobile communication.However, we show that the scheme hasn't non-repudiation,note that a malicious original signer canforge the proxy signer to sign on any message. Finally,we ...