Title of the Paper: An
Algorithm Based on Core Characteristic Extraction of Watermelon
Authors: Yong Sun, Yun Bai, Lihong
Gang, Qiangguo Pu, Nikos Mastorakis
Abstract: The algorithm of extracting a series of characteristic values, taking
the flat objects, seeds, as the experiment is applied into the
auto-distinguishing seeds system software successfully. It fulfills the blank in
this area. It shows it is practical for the machine to distinguish the flat
objects with the equipment visual. It designs and realizes the new algorithm of
the length of orthogonal long and minor axis, the degree of connecting
superficial pattern and the area; brings forward the concept of the coverage
degree of black region and the way to distinguish different colorful objects
with the distribution difference of histogram gradation. The system software has
a very bright future. It is meaningful to the distinguishing objects areas.
Keywords: long and short axis, the degree of connecting surface patterns, the
coverage degree of black region, core characteristic extraction, watermelon
seeds
Title of the Paper:
Fast Pre-authentication with Minimized Overhead and High Security for WLAN
Handoff
Authors: Hung-Yu Chien,
Tzu-Hang Hsu and Yuan-Liang Tang
Abstract: User mobility in WLANs becomes more and more popular because of wide
deployment of WLANs and numerous applications on it. Some of these applications,
for example multimedia applications, require fast handoffs among access points
to maintain the quality of service. In order to support multimedia applications
for roaming users, IEEE 802.11i defines pre-authentication to reduce the
re-authentication delay. The primary drawback of IEEE 802.11i pre-authentication
is that the full 802.1x/EAP authentication consumes too much overhead. In this
paper, we propose a new fast pre-authentication scheme that greatly improves the
efficiency and achieves high security level.
Keywords:
Pre-authentication, fast handoff, wireless security, IEEE 802.11i.
Title of the
Paper: Fractional Fourier Transform
Based Key Exchange for Optical Asymmetric Key Cryptography
Authors: Aloka Sinha
Abstract: Recently several optical encryption techniques have been proposed for
two-dimensional data. These techniques use random phase masks, jigsaw
transforms, digital signatures, and linear transforms like the Fourier
transforms, the fractional Fourier transform and the Fresnel transform. The
strength of these encryption techniques is dependent on the size of the key but
is strongly limited by the security linked with the exchange of the secret key.
We propose a new technique, based on the Diffie-Hellman protocol, in which the
key can be exchanged with high security. The Diffie-Hellman protocol allows two
users to exchange a secret key over an insecure channel without any prior
secrets. Fractional Fourier transforms have been used for the secure key
transfer. Results of computer simulation are presented to verify the proposed
idea and analyse the robustness of the proposed technique.
Keywords: Fractional Fourier Transform,
Optical encryption, Public key encryption, Diffie-Hellman protocol, Fourier
Transform, cryptography
Title of the Paper:
Increase The Efficiency of English-Chinese Sentence
Alignment: Target Range Restriction and Empirical Selection of Stop Words
Authors: Wing-Kwong Wong, Hsi-Hsun Yang,
Wei-Lung Shen, Sheng-Kai Yin, and Sheng-Cheng Hsu
Abstract: In this paper, we use a lexical method to do sentence alignment for an
English-Chinese corpus. Past research shows that alignment using a dictionary
involves a lot of word matching and dictionary look ups. To address these two
issues, we first restrict the range of candidate target sentences, based on the
location of the source sentence relative to the beginning of the text. Moreover,
careful empirical selection of stop words, based on word frequencies in the
source text, helps to reduce the number of dictionary look ups. Experimental
results show that the amount of word matching can be cut down by 75% and that of
dictionary look ups by as much as 43% without sacrificing precision and recall.
Another experiment was also done with twenty New York Times articles with 598
sentences and 18395 words. The resulted precision is 95.6% and the recall is
93.8%. Among all predicted alignment, 86% of the alignment is 1:1 (one source
sentence to one target sentence), 8% is 1:2, and 6% is 2:1. Further analysis
shows that most errors occur in alignments of types 1:2 and 2:1. Future work
should focus on problems with these two alignment types.
Keywords: Sentence alignment,
lexical method, statistical method, English-Chinese corpus, stop words, target
range.
Title of the Paper:
TEMPLUM: A Process Adapted Numerical Simulation Code for The 3D Predictive
Assessment of Laser Surface Heat Treatments in Planar Geometry
Authors: A. Garcνa-Beltrαn,
J. L. Ocaρa and C. L. Molpeceres
Abstract: A process adapted numerical simulation code for the 3D predictive
assessment of laser heat treatment of materials has been developed. Primarily
intended for the analysis of the laser transformation hardening of steels, the
code has been successfully applied for the predictive characterization of other
metallic and non metallic materials posing specific difficulties from the
numerical point of view according to their extreme thermal and absorption
properties. Initially based on a conventional FEM calculational structure, the
developed code (TEMPLUM) reveals itself as an extremely useful prediction tool
with specific process adapted features (not usually available in FEM heat
transfer codes) in the field of laser heat treatment applications.
Keywords: Numerical analysis; Finite
element; Modeling; Simulation; Heat conduction; Laser surface treatments;
Transformation hardening; Optical glass polishing.
No comments:
Post a Comment