4,212 research outputs found
On the Security of the Yi-Tan-Siew Chaos-Based Cipher
This paper presents a comprehensive analysis on the security of the
Yi-Tan-Siew chaotic cipher proposed in [IEEE TCAS-I 49(12):1826-1829 (2002)]. A
differential chosen-plaintext attack and a differential chosen-ciphertext
attack are suggested to break the sub-key K, under the assumption that the time
stamp can be altered by the attacker, which is reasonable in such attacks.
Also, some security Problems about the sub-keys and are
clarified, from both theoretical and experimental points of view. Further
analysis shows that the security of this cipher is independent of the use of
the chaotic tent map, once the sub-key is removed via the proposed
suggested differential chosen-plaintext attack.Comment: 5 pages, 3 figures, IEEEtrans.cls v 1.
Evaluation of Impacts on Delay, Cycle-Length Optimization, Control Types, and Peak-Hour Factor with the Randomness of Traffic
Some basic concepts about traffic which are correct in theory may be misinterpreted in practice. Such misinterpretations may lead to a different direction from the ideal operation. This four-part dissertation is designated to examine fundamental concepts in traffic operation, and to validate the impact of randomness on control delays, cycle-length optimization, control types, and the peak-hour factor.
Control delays experienced by drivers is a critical performance measure on interrupted-flow traffic which involves movements at slower speeds and stops on intersection approaches, as vehicles move up in the queue or slow down upstream of an intersection. Since the basic term of control delay in a signalized intersection was originally from queueing analyses within a cycle, results from such models may be inaccurate due to the neglect of inter-cycle traffic variation. Besides, traffic is rare varying on the clock. Therefore, the peak-hour factor will be inaccurate to a certain degree if peak periods are placed on the clock.
All parts of this dissertation, except the first and the last, are independent papers for different professional journals, and are summarized as follows. Part II of this dissertation, “Impacts of Inter-Cycle Demand Fluctuations on Delay”, distinguishes between intra- and inter-cycle demand fluctuations and recognizes the potentially significant impact of delay underestimation when inter-cycle demand fluctuation is unaccounted for, as in all previous models. “Short or Long … which is Better? A Probabilistic Approach towards Cycle Length Optimization” in the third part of this dissertation proposes a framework to determine the optimal or near-optimal cycle length for signalized intersections based on the criterion with minimal control delays. The fourth part with title “A Trade-Off Framework for Determining the Best Control at an Intersection” in this dissertation uses the same criterion with minimal control delays to assist decision makers in the trade-off between signals and stop signs for an intersection. Part V of this dissertation, “Impacts of Misplaced Peak Intervals on PHFs”, argues about the significant difference among different ways to define the peak intervals, and distinguishes the differences between the “real” and “on the clock” peak-hour factors
Convolutional Neural Networks over Tree Structures for Programming Language Processing
Programming language processing (similar to natural language processing) is a
hot research topic in the field of software engineering; it has also aroused
growing interest in the artificial intelligence community. However, different
from a natural language sentence, a program contains rich, explicit, and
complicated structural information. Hence, traditional NLP models may be
inappropriate for programs. In this paper, we propose a novel tree-based
convolutional neural network (TBCNN) for programming language processing, in
which a convolution kernel is designed over programs' abstract syntax trees to
capture structural information. TBCNN is a generic architecture for programming
language processing; our experiments show its effectiveness in two different
program analysis tasks: classifying programs according to functionality, and
detecting code snippets of certain patterns. TBCNN outperforms baseline
methods, including several neural models for NLP.Comment: Accepted at AAAI-1
- …