Search results for "computer.programming_language"
showing 10 items of 986 documents
An Efficient Traceable Attribute-Based Authentication Scheme with One-Time Attribute Trees
2015
Attribute-based authentication (ABA) is a way to authenticate signers by means of attributes and it requests proof of possessing required attributes from the one to be authenticated. To achieve the property of traceability, required attributes should be combined with the signer’s attribute private keys in order to generate a signature. In some schemes, signers’ attribute keys are related to attribute trees, so changing attribute trees will cause the regeneration of all related attribute keys. In this paper, we propose an efficient traceable ABA scheme, where the generation of signers’ attribute keys is independent from attribute trees. Thus the same set of attribute keys can be used with a …
Modeling and Performance Assessment of the Split-Pi Used as a Storage Converter in All the Possible DC Microgrid Scenarios. Part I: Theoretical Analy…
2021
The integration of an electrical storage system (ESS) into a DC microgrid using a bidirectional DC/DC converter provides substantial benefits but requires careful design. Among such converter topologies, the Split-pi converter presents several merits at the cost of non-isolated operation. However, the few works in the literature on the Split-pi presented only closed-loop control with a single control loop; furthermore, they neglected the reactive components’ parasitic resistances and did not perform any experimental validation. This work aimed at investigating the use of the Split-pi converter as a power interface between an ESS and a DC microgrid. Five typical microgrid scenarios are prese…
Fast narrowing-driven partial evaluation for inductively sequential programs
2005
Narrowing-driven partial evaluation is a powerful technique for the specialization of (first-order) functional and functional logic programs. However, although it gives good results on small programs, it does not scale up well to realistic problems (e.g., interpreter specialization). In this work, we introduce a faster partial evaluation scheme by ensuring the termination of the process offline . For this purpose, we first characterize a class of programs which are quasi-terminating , i.e., the computations performed with needed narrowing—the symbolic computation mechanism of narrowing-driven partial evaluation—only contain finitely many different terms (and, thus, partial evaluation termi…
Motion Cueing Algorithms: A Review
2017
Robotic motion platforms are commonly used in motion-based vehicle simulation. However, the reproduction of realistic accelerations within a reduced workspace is a major challenge. Thus, high-level control strategies commonly referred to as motion cueing algorithms (MCA) are required to convert the simulated vehicle physical state into actual motion for the motion platform. This paper reviews the most important strategies for the generation of motion cues in simulators, listing the advantages and drawbacks of the different solutions. The motion cueing problem, a general scheme and the four most common approaches – classical washout, adaptive washout, optimal control and model predictive con…
A Learning Automata Based Solution to Service Selection in Stochastic Environments
2010
Published version of a paper published in the book: Trends in Applied Intelligent Systems. Also available on SpringerLink: http://dx.doi.org/10.1007/978-3-642-13033-5_22 With the abundance of services available in today’s world, identifying those of high quality is becoming increasingly difficult. Reputation systems can offer generic recommendations by aggregating user provided opinions about service quality, however, are prone to ballot stuffing and badmouthing . In general, unfair ratings may degrade the trustworthiness of reputation systems, and changes in service quality over time render previous ratings unreliable. In this paper, we provide a novel solution to the above problems based …
An Anonymous Delegatable Attribute-based Credential Scheme for a Collaborative E-health Environment
2019
We propose an efficient anonymous, attribute-based credential scheme capable of provisioning multi-level credential delegations. It is integrated with a mechanism to revoke the anonymity of credentials for resolving access disputes and making users accountable for their actions. The proposed scheme has a lower end-user computational complexity in comparison to existing credential schemes with delegatability and has a comparable level of performance with the credential standards of U-Prove and Idemix. Furthermore, we demonstrate how the proposed scheme can be applied to a collaborative e-health environment to provide its users with the necessary anonymous access with delegation capabilities.
An On-Demand Energy Requesting Scheme for Wireless Energy Harvesting Powered IoT Networks
2018
Energy harvesting (EH) delivers a unique technique for replenishing batteries in Internet of Things (IoT) devices. Equipped with an energy harvesting accessory, EH-enabled sensor nodes/IoT devices ...
Attribute based access control scheme with controlled access delegation for collaborative E-health environments
2017
Abstract Modern electronic healthcare (e-health) settings constitute collaborative environments with complex access requirements. Thus, there is a need for sophisticated fine-grained access control mechanisms to cater these access demands and thereby experience the full potential of e-health systems. In order to realize a flexible access control scheme, integrating access delegation is of paramount importance. However, access delegation has to be enforced in a controlled manner so that it will not jeopardize the security of the system. In this paper, we addressed this issue through proposing an attribute based access control scheme integrated with controlled access delegation capabilities. …
UCS: Ultimate course search
2016
International audience; In this system prototype demonstration we present, Ultimate Course Search (UCS), a learning tool developed to provide students ways to efficiently search electronic educational materials. UCS integrates slides, lecture videos and textbooks into a single platform. The keywords extracted from the textbooks and the slides are the basis of the indexing scheme. For the videos, UCS relies on slide transitions and metadata to establish the correspondence between slides and video segments. The video segmentation is based on the slides being presented using the meta-data provided by the video recording software and image processing techniques.
Adaptive backstepping based consensus tracking of uncertain nonlinear systems with event-triggered communication
2021
Abstract This paper investigates the consensus tracking problem for a class of uncertain high-order nonlinear systems with parametric uncertainties and event-triggered communication. Under a directed communication condition, a totally distributed adaptive backstepping based control scheme is presented. Specifically, a decentralized triggering condition is adopted in this paper such that continuous monitoring of neighboring states, as required in some existing results, can be avoided. Besides, to handle the non-differentiability problem of virtual controllers, which arises from the utilization of neighboring states collected only at the triggering instants, the virtual controllers in each re…