4,719 research outputs found

    The Research of Secret Image Sharing Based on RS Erasure Code

    Get PDF
    AbstractSecret image sharing is an attractive research problem in information security filed. After more than ten years of development, secret image sharing has become a relatively independent area. Most current secret image sharing scheme used Lagrange interpolation of Shamir scheme as the core idea, but which way will greatly reduce the computational efficiency and system availability without a doubt because of a huge amount of data in images. According to the internal relationship between coding theory and secret sharing technology, the paper proposed a secret image scheme based on coding theory. In addition to have advantages which most secret image sharing schemes based on Lagrange interpolation own, the new method which has a more simple idea reduced computational complexity and easy to extend the field of video and audio, so has a more obvious practical value; The design and realization of the new secret image sharing scheme has indirectly proved the internal relationship between coding and secret sharing scheme

    Results Visualization in the XBrain XML Interface to a Relational Database

    Get PDF
    The University of Washington's XBrain application is used to dynamically export relational data over the web in XML format, as a prelude to data exchange. We describe additional tools to aid the human user in visualizing the dynamically generated XML results returned by the web application

    Bounded perturbation resilience of extragradient-type methods and their applications

    Full text link
    In this paper we study the bounded perturbation resilience of the extragradient and the subgradient extragradient methods for solving variational inequality (VI) problem in real Hilbert spaces. This is an important property of algorithms which guarantees the convergence of the scheme under summable errors, meaning that an inexact version of the methods can also be considered. Moreover, once an algorithm is proved to be bounded perturbation resilience, superiorizion can be used, and this allows flexibility in choosing the bounded perturbations in order to obtain a superior solution, as well explained in the paper. We also discuss some inertial extragradient methods. Under mild and standard assumptions of monotonicity and Lipschitz continuity of the VI's associated mapping, convergence of the perturbed extragradient and subgradient extragradient methods is proved. In addition we show that the perturbed algorithms converges at the rate of O(1/t)O(1/t). Numerical illustrations are given to demonstrate the performances of the algorithms.Comment: Accepted for publication in The Journal of Inequalities and Applications. arXiv admin note: text overlap with arXiv:1711.01936 and text overlap with arXiv:1507.07302 by other author
    • …
    corecore