The problem of how to distinguish and recognize more than one target when they are entering the working area of the Radio Frequency Identification( RFID ) system should be considered in design of the system. To avoi...The problem of how to distinguish and recognize more than one target when they are entering the working area of the Radio Frequency Identification( RFID ) system should be considered in design of the system. To avoid signal interference with each other among all targets, an anti collision algorithm as well as the condition of working stability is proposed. The computer simulation shows that the new algorithm will be of advantages in the process of system design.展开更多
Using the new technologies such as information technology, communication technology and electronic control technology, vehicle collision warning system(CWS) can acquire road condition, adjacent vehicle march conditi...Using the new technologies such as information technology, communication technology and electronic control technology, vehicle collision warning system(CWS) can acquire road condition, adjacent vehicle march condition as well as its dynamics performance continuously, then it can forecast the oncoming potential collision and give a warning. Based on the analysis of driver's driving behavior, algorithm's warning norms are determined. Based on warning norms adopting machine vision method, the cooperation collision warning algorithm(CWA) model with multi-input and multi-output is established which is used in supporting vehicle CWS. The CWA is tested using the actual data and the result shows that this algorithm can identify and carry out warning for vehicle collision efficiently, which has important meaning for improving the vehicle travel safety.展开更多
Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is dif...Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.展开更多
In sports timing systems,P2P communication is used at low frequency bandwidths(under 135 KHz) between tags and readers in the RFID field.However,in such cases,collisions tend to occur when a reader deals with multiple...In sports timing systems,P2P communication is used at low frequency bandwidths(under 135 KHz) between tags and readers in the RFID field.However,in such cases,collisions tend to occur when a reader deals with multiple RFID tags simultaneously.To overcome this issue,a sports timing system including a Multi Reader Controller(MRC)loaded with an advanced multiple reader algorithm and application was created and applied at large-scale citizens' marathon events.In these cases,a large number of people pass over the installed urethane type's antenna mat continually during a short period of time.This study verified the superiority of the improved algorithm and application through the on-thespot application of the multi reader algorithm and application program,which allows us to smoothly measure runners' times through multiaccess reading for rapid collision avoidance.展开更多
The cutting simulation of soft tissue is important in virtual surgery.It includes three major challenges in computation:Soft tissue simulation,collision detection,and handling,as well as soft tissue models.In order to...The cutting simulation of soft tissue is important in virtual surgery.It includes three major challenges in computation:Soft tissue simulation,collision detection,and handling,as well as soft tissue models.In order to address the earlier challenges,we propose a virtual cutting system based on the mass-spring model.In this system,MSM is utilized to simulate the soft tissue model.Residual stress is introduced to the model for simulating the shrinking effect of soft tissue in cutting.Second,a cylinder-based collision detection method is used to supervise the collision between surgical tools and soft tissue.Third,we simulate the cutting operation with a three-stage cutting method with swept volume,B´ezier curve,and an algorithm named shortest distance nodes matching method.In order to verify the system performance,we carry out three validation experiments on the proposed system:Cutting accuracy experiment,collision detection validation,and practical cutting evaluation.Experiments indicate that our system can well perform the shrinking effect of soft tissue in cutting.The system has fast and accurate collision detection.Moreover,the system can reconstruct smooth incisions vividly.展开更多
Flight simulators can provide a suitable alternative to real flight, mainly to increase safety through the training of crew, and evaluation data from simulator can be used to validation and certification of aircraft s...Flight simulators can provide a suitable alternative to real flight, mainly to increase safety through the training of crew, and evaluation data from simulator can be used to validation and certification of aircraft systems. However, it must convey some degree of realism to the user to be effective. For that reason, it is necessary to calibrate the simulator software. Calibration for flight simulation is parameter identification process. The process is formulated as an optimization problem, and it is solved by using a new approach named Multiple Particle Collision Algorithm (MPCA). Results show a good performance for the employed approach.展开更多
In this paper, we discuss the expected number of steps in solving multi-discrete logarithm problems over a group of elliptic curves with prime order by using Pollard's rho method and parallel collision search algorit...In this paper, we discuss the expected number of steps in solving multi-discrete logarithm problems over a group of elliptic curves with prime order by using Pollard's rho method and parallel collision search algorithm. We prove that when using these algorithms to compute discrete logarithms, the knowledge gained through computing many logarithms does not make it easier for finding other logarithms. Hence in an elliptic cryptosystem, it is safe for many users to share the same curve, with different private keys.展开更多
文摘The problem of how to distinguish and recognize more than one target when they are entering the working area of the Radio Frequency Identification( RFID ) system should be considered in design of the system. To avoid signal interference with each other among all targets, an anti collision algorithm as well as the condition of working stability is proposed. The computer simulation shows that the new algorithm will be of advantages in the process of system design.
基金Sponsored by the Special Development Foundation of High School’s Doctor Subject of China (20030006007)
文摘Using the new technologies such as information technology, communication technology and electronic control technology, vehicle collision warning system(CWS) can acquire road condition, adjacent vehicle march condition as well as its dynamics performance continuously, then it can forecast the oncoming potential collision and give a warning. Based on the analysis of driver's driving behavior, algorithm's warning norms are determined. Based on warning norms adopting machine vision method, the cooperation collision warning algorithm(CWA) model with multi-input and multi-output is established which is used in supporting vehicle CWS. The CWA is tested using the actual data and the result shows that this algorithm can identify and carry out warning for vehicle collision efficiently, which has important meaning for improving the vehicle travel safety.
基金supported in part by the National Natural Science Foundation of China under Grant No. 60873216Scientific and Technological Research Priority Projects of Sichuan Province under Grant No. 2012GZ0017Basic Research of Application Fund Project of Sichuan Province under Grant No. 2011JY0100
文摘Chosen-message pair Simple Power Analysis (SPA) attacks were proposed by Boer, Yen and Homma, and are attack methods based on searches for collisions of modular multiplication. However, searching for collisions is difficult in real environments. To circumvent this problem, we propose the Simple Power Clustering Attack (SPCA), which can automatically identify the modular multiplication collision. The insignificant effects of collision attacks were validated in an Application Specific Integrated Circuit (ASIC) environment. After treatment with SPCA, the automatic secret key recognition rate increased to 99%.
文摘In sports timing systems,P2P communication is used at low frequency bandwidths(under 135 KHz) between tags and readers in the RFID field.However,in such cases,collisions tend to occur when a reader deals with multiple RFID tags simultaneously.To overcome this issue,a sports timing system including a Multi Reader Controller(MRC)loaded with an advanced multiple reader algorithm and application was created and applied at large-scale citizens' marathon events.In these cases,a large number of people pass over the installed urethane type's antenna mat continually during a short period of time.This study verified the superiority of the improved algorithm and application through the on-thespot application of the multi reader algorithm and application program,which allows us to smoothly measure runners' times through multiaccess reading for rapid collision avoidance.
基金This work was supported,in part,by the National Nature Science Foundation of China under Grant Nos.61502240,61502096,61304205,61773219in part,by the Natural Science Foundation of Jiangsu Province under Grant Nos.BK20191401 and BK20201136+2 种基金in part,by the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)fundin part,by the Collaborative Innovation Center of Atmospheric Environment and Equipment Technology(CICAEET)fundNUIST Students’Platform for Innovation and Entrepreneurship Training Program.
文摘The cutting simulation of soft tissue is important in virtual surgery.It includes three major challenges in computation:Soft tissue simulation,collision detection,and handling,as well as soft tissue models.In order to address the earlier challenges,we propose a virtual cutting system based on the mass-spring model.In this system,MSM is utilized to simulate the soft tissue model.Residual stress is introduced to the model for simulating the shrinking effect of soft tissue in cutting.Second,a cylinder-based collision detection method is used to supervise the collision between surgical tools and soft tissue.Third,we simulate the cutting operation with a three-stage cutting method with swept volume,B´ezier curve,and an algorithm named shortest distance nodes matching method.In order to verify the system performance,we carry out three validation experiments on the proposed system:Cutting accuracy experiment,collision detection validation,and practical cutting evaluation.Experiments indicate that our system can well perform the shrinking effect of soft tissue in cutting.The system has fast and accurate collision detection.Moreover,the system can reconstruct smooth incisions vividly.
文摘Flight simulators can provide a suitable alternative to real flight, mainly to increase safety through the training of crew, and evaluation data from simulator can be used to validation and certification of aircraft systems. However, it must convey some degree of realism to the user to be effective. For that reason, it is necessary to calibrate the simulator software. Calibration for flight simulation is parameter identification process. The process is formulated as an optimization problem, and it is solved by using a new approach named Multiple Particle Collision Algorithm (MPCA). Results show a good performance for the employed approach.
基金NNSF of China.No.90304012973 Project,No.2004CB318000
文摘In this paper, we discuss the expected number of steps in solving multi-discrete logarithm problems over a group of elliptic curves with prime order by using Pollard's rho method and parallel collision search algorithm. We prove that when using these algorithms to compute discrete logarithms, the knowledge gained through computing many logarithms does not make it easier for finding other logarithms. Hence in an elliptic cryptosystem, it is safe for many users to share the same curve, with different private keys.