275 research outputs found

    Information-Theoretic Secure Outsourced Computation in Distributed Systems

    Get PDF
    Secure multi-party computation (secure MPC) has been established as the de facto paradigm for protecting privacy in distributed computation. One of the earliest secure MPC primitives is the Shamir\u27s secret sharing (SSS) scheme. SSS has many advantages over other popular secure MPC primitives like garbled circuits (GC) -- it provides information-theoretic security guarantee, requires no complex long-integer operations, and often leads to more efficient protocols. Nonetheless, SSS receives less attention in the signal processing community because SSS requires a larger number of honest participants, making it prone to collusion attacks. In this dissertation, I propose an agent-based computing framework using SSS to protect privacy in distributed signal processing. There are three main contributions to this dissertation. First, the proposed computing framework is shown to be significantly more efficient than GC. Second, a novel game-theoretical framework is proposed to analyze different types of collusion attacks. Third, using the proposed game-theoretical framework, specific mechanism designs are developed to deter collusion attacks in a fully distributed manner. Specifically, for a collusion attack with known detectors, I analyze it as games between secret owners and show that the attack can be effectively deterred by an explicit retaliation mechanism. For a general attack without detectors, I expand the scope of the game to include the computing agents and provide deterrence through deceptive collusion requests. The correctness and privacy of the protocols are proved under a covert adversarial model. Our experimental results demonstrate the efficiency of SSS-based protocols and the validity of our mechanism design

    A Survey on Soft Subspace Clustering

    Full text link
    Subspace clustering (SC) is a promising clustering technology to identify clusters based on their associations with subspaces in high dimensional spaces. SC can be classified into hard subspace clustering (HSC) and soft subspace clustering (SSC). While HSC algorithms have been extensively studied and well accepted by the scientific community, SSC algorithms are relatively new but gaining more attention in recent years due to better adaptability. In the paper, a comprehensive survey on existing SSC algorithms and the recent development are presented. The SSC algorithms are classified systematically into three main categories, namely, conventional SSC (CSSC), independent SSC (ISSC) and extended SSC (XSSC). The characteristics of these algorithms are highlighted and the potential future development of SSC is also discussed.Comment: This paper has been published in Information Sciences Journal in 201

    Study of Acid Response of Qatar Carbonate Rocks

    Get PDF
    The Middle East has 62% of the world’s proved conventional oil reserves; more than 70% of these reserves are in carbonate reservoirs. It also has 40% of the world’s proved conventional gas reserves; 90% of these reserves are hold in carbonate reservoirs. Recently papers published from industry discussed the techniques, planning, and optimization of acid stimulation for Qatar carbonate. To the best of author’s knowledge, no study has focused on the acid reaction to Qatar carbonates. The lack of understanding of Qatar carbonate especially Middle East carbonates and the abundance of Middle East carbonate reservoirs is the main motivation behind this study. This work is an experimental study to understand the acid response to Qatar rocks in rocks with two types: homogenous carbonate and heterogeneous carbonate. A large portion of this research is to further investigate the impact of centimeter scale heterogeneity on the acid stimulation using Qatar rocks. Qatar carbonates have multi-scale heterogeneities which may cause the impact of the injected acids to differ from homogenous case. Recent published field data indicate a much smaller number of pore volume to breakthrough compared with experimental measurement with homogeneous carbonate and heterogeneity is believed to be one of the contributors of causing the low field measurements. In this case, acid linear core-flood experiments were conducted with carbonate core samples of different petrophysical properties to study the impact of both separated and connected vugs and channels on pore volume to breakthrough. Computerized tomography was used in characterization of the heterogeneities. One experiment simulated the response of acid to heterogeneous carbonate in downhole condition with drill-in fluid damage. Homogeneous rock was cored from a well in Qatar. The optimal injection rate was pursued through acid core flood experiments for acid stimulation design and for further reference. It is been discovered that the optimum injection rate for heterogeneous carbonate exists. For the similar acid flux, the corresponding PVBT for buggy limestone correlates inversely with the fraction of total porosity comprised by vugs. For vuggy carbonates with connected vugs and channels, whether or not formation damage exists, the acid tends to create new pore space nearby to the existing vugs and channels. Different strategies need to be made regarding acid stimulation design with homogeneous carbonate, heterogeneous carbonate with separated vugs and channels and heterogeneous carbonate with connected vugs and channels

    Trajectory planning of jumping over an obstacle for one-legged jumping robot

    Get PDF
    For one-legged passive jumping robot, a trajectory planning strategy is developed to jump over an obstacle integrating three various dynamics among jumping process. Manipulability ellipsoids are effective tools to perform task space analysis and motion optimization of redundant manipulators. Jumping robot can be considered as a redundant manipulator with a load held at the end-effector. The concept of inertia matching ellipsoid and directional manipulability is extended to optimize the take-off posture of jumping robot, and the optimized results have been used to plan jumping trajectory. Aimed at the sensitivity of a trajectory to constraint conditions on point-to-point motion planning, the 6th order polynomial function is proposed to plan jumping motion having a better robustness to the parameters change of constraint conditions than traditional 5th order polynomial function. In order to lift the foot over the obstacle, correction functions are constructed under unchanged boundary constraint conditions. Furthermore, the body posture is controlled based on internal motion dynamics and steady-state consecutive jumping motion principle. A prototype model is designed, and the effectiveness of the proposed method is confirmed via simulations performed on parameters of designed prototype
    corecore