69 research outputs found

    An efficient protocol for the problem of secure two-party vector dominance

    Get PDF
    The problem of secure two-party vector dominance requires the comparison of two vectors in an "all-or-nothing" way. In this paper we provide a solution to this problem based on the semi-honest model. It is reduced to the problem of privacy preserving prefix test, and an additive threshold homomorphic encryption is used to protect those privacies while computing the results of all of the prefix tests. Our solution has advantages of efficiency and security in comparison with other solutions.Yingpeng Sang, Hong Shen, Zonghua Zhan

    超高速ノンブロック・ネットワーク構成方式に関する研究

    Get PDF
    平成14年度-平成16年度科学研究費補助金(基盤研究(B)(2))研究成果報告書,課題番号.1438013

    An LBP based Iris Recognition System using Feed Forward Back Propagation Neural Network

    Get PDF
    An iris recognition system using LBP feature extraction technique with Feed Forward Back Propagation Neural Network is presented. For feature extraction from the eye images the iris localization and segmentation is very important task so in proposed work Hough circular transform (HCT) is used to segment the iris region from the eye mages. In this proposed work Local Binary Pattern (LBP) feature extraction technique is used to extract feature from the segmented iris region, then feed forward back propagation neural network is use as a classifier and in any classifier there to phases training and testing. The LBP feature extraction technique is a straightforward technique and every proficient feature operator which labels the pixels of an iris image by thresholding the neighbourhood of each pixel and considers the feature as a result in form of binary number. Due to its discriminative efficiency and computational simplicity the LBP feature extractor has become a popular approach in various recognition systems. This proposed method decreased the FAR as well as FRR, & has increases the system performance on the given dataset. The average accuracy of proposed iris recognition system is more than 97%

    A survey of localization in wireless sensor network

    Get PDF
    Localization is one of the key techniques in wireless sensor network. The location estimation methods can be classified into target/source localization and node self-localization. In target localization, we mainly introduce the energy-based method. Then we investigate the node self-localization methods. Since the widespread adoption of the wireless sensor network, the localization methods are different in various applications. And there are several challenges in some special scenarios. In this paper, we present a comprehensive survey of these challenges: localization in non-line-of-sight, node selection criteria for localization in energy-constrained network, scheduling the sensor node to optimize the tradeoff between localization performance and energy consumption, cooperative node localization, and localization algorithm in heterogeneous network. Finally, we introduce the evaluation criteria for localization in wireless sensor network

    Diseño hardware de la transformada wavelet discreta: un análisis de complejidad, precisión y frecuencia de operación

    Get PDF
    The purpose of this paper is to present a comparative analysis of hardware design of the Discrete Wavelet Transform (DWT) in terms of three design goals: accuracy, hardware cost and operating frequency. Every design should take into account the following facts: method (non-polyphase, polyphase and lifting), topology (multiplier-based and multiplierless-based), structure (conventional or pipelined), and quantization format (floatingpoint, fixed-point, CSD or integer). Since DWT is widely used in several applications (e.g. compression, filtering, coding, pattern recognition among others), selection of adequate parameters plays an important role in the performance of these systems.El propósito de este documento es presentar un análisis comparativo de esquemas hardware de la Transformada Wavelet Discreta, DWT, en términos de tres objetivos de diseño: precisión, complejidad y frecuencia de operación. Cada diseño debe considerar los siguientes aspectos: método (no polifásico, polifásico y lifting), topología (basados en multiplicadores y sin multiplicadores), estructura (convencional o pipeline) y formato de cuantización (punto flotante, punto fijo, CSD o entero). Dado que la DWT es ampliamente utilizada en diversas aplicaciones (por ejemplo en compresión, filtrado, codificación, reconocimiento de patrones, entre otras), la selección adecuada de parámetros de diseño desempeña un papel importante en el diseño de estos sistemas

    The Factors Influencing the Use of Password Managers

    Get PDF
    This paper investigates the factors that influence the actual use of password managers. In this paper, we have integrated some factors from the Technology Acceptance Model (perceived ease of use, perceived usefulness, and attitude) with other factors from the literature review (user readiness, awareness, and motivation) to investigate the influence of these factors on the use of password managers. The authors used an online questionnaire to collect data. The questionnaire was distributed by using two social media platforms (Twitter and WhatsApp). There were 171 participants from 6 countries who completed the questionnaire. Structural equation modelling was employed by using SmartPLS-3 software to analyse the data. Findings indicate that perceived ease of use, perceived usefulness, and user readiness have a positive impact and are substantially associated with attitude, thus influencing the actual use of password managers. Likewise, perceived usefulness, user readiness, and awareness have a positive impact and are significantly associated with motivation of users to use it, which also influences the actual use of password managers
    corecore