99 research outputs found

    A Novel Method Based on Oblique Projection Technology for Mixed Sources Estimation

    Get PDF
    Reducing the computational complexity of the near-field sources and far-field sources localization algorithms has been considered as a serious problem in the field of array signal processing. A novel algorithm caring for mixed sources location estimation based on oblique projection is proposed in this paper. The sources are estimated at two different stages and the sensor noise power is estimated and eliminated from the covariance which improve the accuracy of the estimation of mixed sources. Using the idea of compress, the range information of near-field sources is obtained by searching the partial area instead of the whole Fresnel area which can reduce the processing time. Compared with the traditional algorithms, the proposed algorithm has the lower computation complexity and has the ability to solve the two closed-spaced sources with high resolution and accuracy. The duplication of range estimation is also avoided. Finally, simulation results are provided to demonstrate the performance of the proposed method

    Enriching Phrases with Coupled Pixel and Object Contexts for Panoptic Narrative Grounding

    Full text link
    Panoptic narrative grounding (PNG) aims to segment things and stuff objects in an image described by noun phrases of a narrative caption. As a multimodal task, an essential aspect of PNG is the visual-linguistic interaction between image and caption. The previous two-stage method aggregates visual contexts from offline-generated mask proposals to phrase features, which tend to be noisy and fragmentary. The recent one-stage method aggregates only pixel contexts from image features to phrase features, which may incur semantic misalignment due to lacking object priors. To realize more comprehensive visual-linguistic interaction, we propose to enrich phrases with coupled pixel and object contexts by designing a Phrase-Pixel-Object Transformer Decoder (PPO-TD), where both fine-grained part details and coarse-grained entity clues are aggregated to phrase features. In addition, we also propose a PhraseObject Contrastive Loss (POCL) to pull closer the matched phrase-object pairs and push away unmatched ones for aggregating more precise object contexts from more phrase-relevant object tokens. Extensive experiments on the PNG benchmark show our method achieves new state-of-the-art performance with large margins.Comment: Accepted by IJCAI 202

    A Security-Awareness Virtual Machine Management Scheme Based on Chinese Wall Policy in Cloud Computing

    Get PDF
    Cloud computing gets increasing attention for its capacity to leverage developers from infrastructure management tasks. However, recent works reveal that side channel attacks can lead to privacy leakage in the cloud. Enhancing isolation between users is an effective solution to eliminate the attack. In this paper, to eliminate side channel attacks, we investigate the isolation enhancement scheme from the aspect of virtual machine (VM) management. The security-awareness VMs management scheme (SVMS), a VMs isolation enhancement scheme to defend against side channel attacks, is proposed. First, we use the aggressive conflict of interest relation (ACIR) and aggressive in ally with relation (AIAR) to describe user constraint relations. Second, based on the Chinese wall policy, we put forward four isolation rules. Third, the VMs placement and migration algorithms are designed to enforce VMs isolation between the conflict users. Finally, based on the normal distribution, we conduct a series of experiments to evaluate SVMS. The experimental results show that SVMS is efficient in guaranteeing isolation between VMs owned by conflict users, while the resource utilization rate decreases but not by much

    Convergence of DNA methylation and phosphorothioation epigenetics in bacterial genomes

    Get PDF
    Explosive growth in the study of microbial epigenetics has revealed a diversity of chemical structures and biological functions of DNA modifications in restriction-modification (R-M) and basic genetic processes. Here, we describe the discovery of shared consensus sequences for two seemingly unrelated DNA modification systems, [superscript 6m]A methylation and phosphorothioation (PT), in which sulfur replaces a nonbridging oxygen in the DNA backbone. Mass spectrometric analysis of DNA from Escherichia coli B7A and Salmonella enterica serovar Cerro 87, strains possessing PT-based R-M genes, revealed d(G[subscript PS] [superscript 6m]A) dinucleotides in the G[subscript PS] [superscript 6m]AAC consensus representing ∼5% of the 1,100 to 1,300 PT-modified d(G[subscript PS] A) motifs per genome, with [superscript 6m]A arising from a yet-to-be-identified methyltransferase. To further explore PT and 6m A in another consensus sequence, G[subscript PS] [superscript 6m]ATC, we engineered a strain of E. coli HST04 to express Dnd genes from Hahella chejuensis KCTC2396 (PT in G[subscript PS] ATC) and Dam methyltransferase from E. coli DH10B ( [superscript 6m] A in G [superscript 6m] ATC). Based on this model, in vitro studies revealed reduced Dam activity in G PS ATC-containing oligonucleotides whereas single-molecule real-time sequencing of HST04 DNA revealed [superscript 6m] A in all 2,058 G[subscript PS] ATC sites (5% of 37,698 total GATC sites). This model system also revealed temperature-sensitive restriction by DndFGH in KCTC2396 and B7A, which was exploited to discover that [superscript 6m] A can substitute for PT to confer resistance to restriction by the DndFGH system. These results point to complex but unappreciated interactions between DNA modification systems and raise the possibility of coevolution of interacting systems to facilitate the function of each

    KP-ABE based Verifiable Cloud Access Control Scheme

    No full text
    With the rapid development of mobile internet, mobile devices are requiring more complex authorization policy to ensure an secure access control on mobile data. However mobiles have limited resources (computing, storage, etc.) and are not suitable to execute complex operations. Cloud computing is an increasingly popular paradigm for accessing powerful computing resources. Intuitively we can solve that problem by moving the complex access control process to the cloud and implement a fine-grained access control relying on the powerful cloud. However the cloud computation may not be trusted, a crucial problem is how to verify the correctness of such computations. In this paper, we proposed a public verifiable cloud access control scheme based on Parno's public verifiable computation protocol. For the first time, we proposed the conception and concrete construction of verifiable cloud access control. Specifically, we firstly design a user private key revocable Key Policy Attribute Based Encryption (KP-ABE) scheme with non-monotonic access structure, which can be combined with the XACML policy perfectly. Secondly we convert the XACML policy into the access structure of KP-ABE. Finally we construct a security provable public verifiable cloud access control scheme based on the KP-ABE scheme we designed.With the rapid development of mobile internet, mobile devices are requiring more complex authorization policy to ensure an secure access control on mobile data. However mobiles have limited resources (computing, storage, etc.) and are not suitable to execute complex operations. Cloud computing is an increasingly popular paradigm for accessing powerful computing resources. Intuitively we can solve that problem by moving the complex access control process to the cloud and implement a fine-grained access control relying on the powerful cloud. However the cloud computation may not be trusted, a crucial problem is how to verify the correctness of such computations. In this paper, we proposed a public verifiable cloud access control scheme based on Parno's public verifiable computation protocol. For the first time, we proposed the conception and concrete construction of verifiable cloud access control. Specifically, we firstly design a user private key revocable Key Policy Attribute Based Encryption (KP-ABE) scheme with non-monotonic access structure, which can be combined with the XACML policy perfectly. Secondly we convert the XACML policy into the access structure of KP-ABE. Finally we construct a security provable public verifiable cloud access control scheme based on the KP-ABE scheme we designed
    • …
    corecore