Creation of a spectral signature reflectance data, which aids in the identification of the crops is important in determining size and location crop fields. Therefore, we developed a spectral signature reflectance for ...Creation of a spectral signature reflectance data, which aids in the identification of the crops is important in determining size and location crop fields. Therefore, we developed a spectral signature reflectance for the vegetative stage of the green gram (Vigna. radiata L.) over 5 years (2020, 2018, 2017, 2015, and 2013) for agroecological zone IV and V in Kenya. The years chosen were those whose satellite resolution data was available for the vegetative stage of crop growth in the short rain season (October, November, December (OND)). We used Landsat 8 OLI satellite imagery in this study. Cropping pattern data for the study area were evaluated by calculating the Top of Atmosphere reflectance. Farms geo-referencing, along with field data collection, was undertaken to extract Top of Atmosphere reflectance for bands 2, 3, 4 and 7. We also carried a spectral similarity assessment on the various cropping patterns. The spectral reflectance ranged from 0.07696 - 0.09632, 0.07466 - 0.09467, 0.0704047 - 0.12188,0.19822 - 0.24387, 0.19269 - 0.26900, and 0.11354 - 0.20815 for bands 2, 3, 4, 5, 6, and 7 for green gram, respectively. The results showed a dissimilarity among the various cropping patterns. The lowest dissimilarity index was 0.027 for the maize (Zea mays L.) bean (Phaseolus vulgaris) versus the maize-pigeon pea (Cajanus cajan) crop, while the highest dissimilarity index was 0.443 for the maize bean versus the maize bean and cowpea cropping patterns. High crop dissimilarities experienced across the cropping pattern through these spectral reflectance values confirm that the green gram was potentially identifiable. The results can be used in crop type identification in agroecological lower midland zone IV and V for mung bean management. This study therefore suggests that use of reflectance data in remote sensing of agricultural ecosystems would aid in planning, management, and crop allocation to different ecozones.展开更多
ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we...ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem.展开更多
In this paper, a scheme which can be used in multi-user quantum digital signature is proposed. The scheme of signature and verification is based on the characters of GHZ (Greenberger-Horne-Zeilinger) states and cont...In this paper, a scheme which can be used in multi-user quantum digital signature is proposed. The scheme of signature and verification is based on the characters of GHZ (Greenberger-Horne-Zeilinger) states and controlled quantum teleportation. Different from the digital signatures based on computational complexity, this scheme is unconditional secure, and compared to the former presented quantum signature scheme, it does not rely on an arbitrator to verify the signature and realize a message can be signed by multi-user together.展开更多
A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy...A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature.展开更多
A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the...A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm.展开更多
A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer...A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer's privacy is well protected with dynamic anonymity, the public key and signatures have length independent of the number of signature members, new signers are allowed to join the signature without modifying the public key, and attacks caused by secret key dumping or leaking can be avoided.展开更多
The paper proposes a new sequential digital multi-signature scheme based on Knapsack public-key cryptosystem,which is different from the existing scheme.The advantages of this scheme over the existing schemes are that...The paper proposes a new sequential digital multi-signature scheme based on Knapsack public-key cryptosystem,which is different from the existing scheme.The advantages of this scheme over the existing schemes are that it simplifies the signature generation process and speeds up the signature verification process.What’s more,the scheme reduces the cost of communication and redundancy operation, and improves efficiency,and can avoid cheating by signer efficiently,so the scheme has very broad application prospects.展开更多
In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this pape...In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme.展开更多
The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer in 1996. However, most existing proxy signature schemes...The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer in 1996. However, most existing proxy signature schemes does not support nonrepudiation. In this paper, we propose two secure nonrepudiable proxy signature schemes, which overcome disadvantages of M U O and K P W proxy signature schemes, respectively. The schemes proposed can withstand public key substitution attack and forge attack. In addition, our new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. Our approach can also be applied to other ElGamal like proxy signature schemes.展开更多
This paper presents two systems for recognizing static signs (digits) from American Sign Language (ASL). These systems avoid the use color marks, or gloves, using instead, low-pass and high-pass filters in space and f...This paper presents two systems for recognizing static signs (digits) from American Sign Language (ASL). These systems avoid the use color marks, or gloves, using instead, low-pass and high-pass filters in space and frequency domains, and color space transformations. First system used rotational signatures based on a correlation operator;minimum distance was used for the classification task. Second system computed the seven Hu invariants from binary images;these descriptors fed to a Multi-Layer Perceptron (MLP) in order to recognize the 9 different classes. First system achieves 100% of recognition rate with leaving-one-out validation and second experiment performs 96.7% of recognition rate with Hu moments and 100% using 36 normalized moments and k-fold cross validation.展开更多
In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving...In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.展开更多
The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effecti...The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effective aperture of 3.6 m–4.9 m) and a wide field of view (FOV) (5°). It has an innovative active reflecting Schmidt configuration which continuously changes the mirror’s surface that adjusts during the observation process and combines thin deformable mirror active optics with segmented active optics. Its primary mirror (6.67m×6.05 m) and active Schmidt mirror (5.74m×4.40 m) are both segmented, and composed of 37 and 24 hexagonal sub-mirrors respectively. By using a parallel controllable fiber positioning technique, the focal surface of 1.75 m in diameter can accommodate 4000 optical fibers. Also, LAMOST has 16 spectrographs with 32 CCD cameras. LAMOST will be the telescope with the highest rate of spectral acquisition. As a national large scientific project, the LAMOST project was formally proposed in 1996, and approved by the Chinese government in 1997. The construction started in 2001, was completed in 2008 and passed the official acceptance in June 2009. The LAMOST pilot survey was started in October 2011 and the spectroscopic survey will launch in September 2012. Up to now, LAMOST has released more than 480 000 spectra of objects. LAMOST will make an important contribution to the study of the large-scale structure of the Universe, structure and evolution of the Galaxy, and cross-identification of multiwaveband properties in celestial objects.展开更多
Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS ...Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS 7, Ⅲ°AVB 5) undergoing pacemaker implantation. Right ventricular apex (RVA), right ventricular outflow tract (RVOT), right ventricular bifocal (RV-Bi), left ventricular base (LVB) and bi -ventricular (Bi-Ⅴ) pacing at 60 -80 ppm were done in VVI mode prior to implantation of DDD pacemaker. The cardiac index (CI), mean pulmonary artery pressure (mPAP) and pulmonary capillary wedge pressure (PCWP) were measured with Swan - Ganz thermodilution catheter after 5 minutes of each pacing mode. Results (1) Comparing to pacing at RVA (CI: 2. 41± 0. 38 L/min per m2, PCWP: 16. 7 ±3.3 mmHg), the CI increased and the PCWP decreased significantly in pacing at RVOT(CI: 2. 63 ± 0.46, PCWP: 13. 8±2. 3), LVB(CI: 2. 78±0.52, PCWP: 14. 4±3.1), RV-Bi(CI: 2. 83±0.57, PCWP: 12. 8± 2. 5) and Bi -Ⅴ pacing (CI: 2. 94± 0.60, PCWP: 12. 7±2. 5), P < 0. 01, respectively. (2) The CI of RV-Bi and Bi-Ⅴ pacing was higher than that of RVOT and LVB pacing, the PCWP was lower, P < 0. 05, respectively. (3) There was no significant difference between RV - Bi pacing and Bi-Ⅴ pacing in CI and PCWP. Conclusion There is no significant difference between RV - Bi pacing and Bi -V pacing in the acute hemodynamic effects; however,dual - site pacing is much better than single site pacing in that aspect for patients with cardiac function NYHA class Ⅰ to Ⅱ without BBB. Among single site pacing, the RVOT and LVB pacing is better than RVA pacing in cardiac function.展开更多
In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardwar...In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardware construction, is introduced. Spinning experiments show that the system achieves satisfactory result. This system can solve the diftkultles of mechatronical fusion between domestic hollow splndk fancy yarn spuming muchine and its microcomputer control technology.展开更多
A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the rein...A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the reinforcement of textile composites, the relationships among the structural parameters are derived for different binding patterns of the fabric structure. The conditions, which meet the requirements of structural cell stability,are also discussed.展开更多
文摘Creation of a spectral signature reflectance data, which aids in the identification of the crops is important in determining size and location crop fields. Therefore, we developed a spectral signature reflectance for the vegetative stage of the green gram (Vigna. radiata L.) over 5 years (2020, 2018, 2017, 2015, and 2013) for agroecological zone IV and V in Kenya. The years chosen were those whose satellite resolution data was available for the vegetative stage of crop growth in the short rain season (October, November, December (OND)). We used Landsat 8 OLI satellite imagery in this study. Cropping pattern data for the study area were evaluated by calculating the Top of Atmosphere reflectance. Farms geo-referencing, along with field data collection, was undertaken to extract Top of Atmosphere reflectance for bands 2, 3, 4 and 7. We also carried a spectral similarity assessment on the various cropping patterns. The spectral reflectance ranged from 0.07696 - 0.09632, 0.07466 - 0.09467, 0.0704047 - 0.12188,0.19822 - 0.24387, 0.19269 - 0.26900, and 0.11354 - 0.20815 for bands 2, 3, 4, 5, 6, and 7 for green gram, respectively. The results showed a dissimilarity among the various cropping patterns. The lowest dissimilarity index was 0.027 for the maize (Zea mays L.) bean (Phaseolus vulgaris) versus the maize-pigeon pea (Cajanus cajan) crop, while the highest dissimilarity index was 0.443 for the maize bean versus the maize bean and cowpea cropping patterns. High crop dissimilarities experienced across the cropping pattern through these spectral reflectance values confirm that the green gram was potentially identifiable. The results can be used in crop type identification in agroecological lower midland zone IV and V for mung bean management. This study therefore suggests that use of reflectance data in remote sensing of agricultural ecosystems would aid in planning, management, and crop allocation to different ecozones.
基金Supported bythe National Key Basic Research andDevelopment Program (973 Program G1999035804),the NationalNatural Science Foundation of China (90204015 ,60473021) and theElitist Youth Foundation of Henan Province (021201400)
文摘ID-based public key cryptosystem can be a good alternative for certifieate-based public key setting. This paper provides an efficient ID-based proxy multi signature scheme from pairings. In the random oracle model, we prove that our new scheme is secure against existential delegation forgery with the assumption that Hess's scheme-1 is existential unforgeable, and that our new scheme is secure against existential proxy multi-signature forgery under the hardness assumption of the computational Diffie-Hellman problem.
基金Supported by the National Natural Science Foundation of China (60572035, 10505005) the Foundation of Beijing Municipality Key Laboratory of Communication and Information System (JD100040513)
文摘In this paper, a scheme which can be used in multi-user quantum digital signature is proposed. The scheme of signature and verification is based on the characters of GHZ (Greenberger-Horne-Zeilinger) states and controlled quantum teleportation. Different from the digital signatures based on computational complexity, this scheme is unconditional secure, and compared to the former presented quantum signature scheme, it does not rely on an arbitrator to verify the signature and realize a message can be signed by multi-user together.
基金Project supported by the National Basic Research Program of China (973 Program) (Grant No 2007CB311100)the National High Technology Research and Development Program of China (Grant Nos 2006AA01Z419 and 20060101Z4015)+4 种基金the Major Research plan of the National Natural Science Foundation of China (Grant No 90604023)2008 Scientific Research Common Program of Beijing Municipal Commission of Education The Scientific Research Foundation for the Youth of Beijing University of Technology (Grant No 97007016200701)the National Research Foundation for the Doctoral Program of Higher Educationof China (Grant No 20040013007)the National Laboratory for Modern Communications Science Foundation of China (GrantNo 9140C1101010601)the Doctor Scientific Research Activation Foundation of Beijing University of Technology (Grant No 52007016200702)
文摘A multi-proxy quantum group signature scheme with threshold shared verification is proposed. An original signer may authorize a proxy group as his proxy agent. Then only the cooperation of all the signers in the proxy group can generate the proxy signature on behalf of the original signer. In the scheme, any t or more of n receivers can verify the message and any t - 1 or fewer receivers cannot verify the validity of the proxy signature.
文摘A nominative multi-proxy signature in which the original signer authorizes a group of proxy signers is presented. Meanwhile, our proposed scheme is based on elliptic curve cryptosystem which is more efficient than the corresponding one based on traditional discrete logarithm.
基金the National High Technology Research and Development Program of China(863 Program) (2005AA145110, 2006AA01Z436)the Natural Science Foundation of Shanghai (05ZR14083)the Pudong New Area Technology Innovation Public Service Platform of China (PDPT2005-04)
文摘A new multi-signature scheme was proposed with the extension of the direct anonymous attestation (DAA) protocol supported by trusted computing (TC) technology. Analysis and simulation results show that the signer's privacy is well protected with dynamic anonymity, the public key and signatures have length independent of the number of signature members, new signers are allowed to join the signature without modifying the public key, and attacks caused by secret key dumping or leaking can be avoided.
基金supported by the National Key Lab.of Integrated Service Networks of Xidian University(No.ISN7-01)National Natural Science Foundation of China(No.60642008)
文摘The paper proposes a new sequential digital multi-signature scheme based on Knapsack public-key cryptosystem,which is different from the existing scheme.The advantages of this scheme over the existing schemes are that it simplifies the signature generation process and speeds up the signature verification process.What’s more,the scheme reduces the cost of communication and redundancy operation, and improves efficiency,and can avoid cheating by signer efficiently,so the scheme has very broad application prospects.
基金Supported by the National Natural Science Foundation of China (60473021) and the Science Foundation of Henan Province (0511010900)
文摘In the last couple of years, D-based cryptography has got fruitful achievements. Proxy multi-signature allows a designated person, called a proxy signer, to sign on behalf of two or more original signers. In this paper, we present a general security model for ID-based proxy multi-signature (ID-PMS) schemes. Then, we show how to construct a secure ID-PMS scheme from a secure ID-based signature scheme, and prove that the security of the construction can be reduced to the security of the original ID-based signature scheme.
文摘The concept of proxy signature introduced by Mambo, Usuda, and Okamoto allows a designated person, called a proxy signer, to sign on behalf of an original signer in 1996. However, most existing proxy signature schemes does not support nonrepudiation. In this paper, we propose two secure nonrepudiable proxy signature schemes, which overcome disadvantages of M U O and K P W proxy signature schemes, respectively. The schemes proposed can withstand public key substitution attack and forge attack. In addition, our new schemes have some other advantages such as proxy signature key generation and updating using insecure channels. Our approach can also be applied to other ElGamal like proxy signature schemes.
文摘This paper presents two systems for recognizing static signs (digits) from American Sign Language (ASL). These systems avoid the use color marks, or gloves, using instead, low-pass and high-pass filters in space and frequency domains, and color space transformations. First system used rotational signatures based on a correlation operator;minimum distance was used for the classification task. Second system computed the seven Hu invariants from binary images;these descriptors fed to a Multi-Layer Perceptron (MLP) in order to recognize the 9 different classes. First system achieves 100% of recognition rate with leaving-one-out validation and second experiment performs 96.7% of recognition rate with Hu moments and 100% using 36 normalized moments and k-fold cross validation.
文摘In the video-based surveillance application, moving shadows can affect the correct localization and detection of moving objects. This paper aims to present a method for shadow detection and suppression used for moving visual object detection. The major novelty of the shadow suppression is the integration of several features including photometric invariant color feature, motion edge feature, and spatial feature etc. By modifying process for false shadow detected, the averaging detection rate of moving object reaches above 90% in the test of Hall-Monitor sequence.
文摘The Large Sky Area Multi-Object Fiber Spectroscopic Telescope (LAMOST, also called the Guo Shou Jing Telescope) is a special reflecting Schmidt telescope. LAMOST’s special design allows both a large aperture (effective aperture of 3.6 m–4.9 m) and a wide field of view (FOV) (5°). It has an innovative active reflecting Schmidt configuration which continuously changes the mirror’s surface that adjusts during the observation process and combines thin deformable mirror active optics with segmented active optics. Its primary mirror (6.67m×6.05 m) and active Schmidt mirror (5.74m×4.40 m) are both segmented, and composed of 37 and 24 hexagonal sub-mirrors respectively. By using a parallel controllable fiber positioning technique, the focal surface of 1.75 m in diameter can accommodate 4000 optical fibers. Also, LAMOST has 16 spectrographs with 32 CCD cameras. LAMOST will be the telescope with the highest rate of spectral acquisition. As a national large scientific project, the LAMOST project was formally proposed in 1996, and approved by the Chinese government in 1997. The construction started in 2001, was completed in 2008 and passed the official acceptance in June 2009. The LAMOST pilot survey was started in October 2011 and the spectroscopic survey will launch in September 2012. Up to now, LAMOST has released more than 480 000 spectra of objects. LAMOST will make an important contribution to the study of the large-scale structure of the Universe, structure and evolution of the Galaxy, and cross-identification of multiwaveband properties in celestial objects.
文摘Objective To compare the acute hemodynamic effects of five different pacing modes in patients with cardiac function NYHA class Ⅰ to Ⅱ without bundle branch block (BBB). Methods This study included 12 patients (SSS 7, Ⅲ°AVB 5) undergoing pacemaker implantation. Right ventricular apex (RVA), right ventricular outflow tract (RVOT), right ventricular bifocal (RV-Bi), left ventricular base (LVB) and bi -ventricular (Bi-Ⅴ) pacing at 60 -80 ppm were done in VVI mode prior to implantation of DDD pacemaker. The cardiac index (CI), mean pulmonary artery pressure (mPAP) and pulmonary capillary wedge pressure (PCWP) were measured with Swan - Ganz thermodilution catheter after 5 minutes of each pacing mode. Results (1) Comparing to pacing at RVA (CI: 2. 41± 0. 38 L/min per m2, PCWP: 16. 7 ±3.3 mmHg), the CI increased and the PCWP decreased significantly in pacing at RVOT(CI: 2. 63 ± 0.46, PCWP: 13. 8±2. 3), LVB(CI: 2. 78±0.52, PCWP: 14. 4±3.1), RV-Bi(CI: 2. 83±0.57, PCWP: 12. 8± 2. 5) and Bi -Ⅴ pacing (CI: 2. 94± 0.60, PCWP: 12. 7±2. 5), P < 0. 01, respectively. (2) The CI of RV-Bi and Bi-Ⅴ pacing was higher than that of RVOT and LVB pacing, the PCWP was lower, P < 0. 05, respectively. (3) There was no significant difference between RV - Bi pacing and Bi-Ⅴ pacing in CI and PCWP. Conclusion There is no significant difference between RV - Bi pacing and Bi -V pacing in the acute hemodynamic effects; however,dual - site pacing is much better than single site pacing in that aspect for patients with cardiac function NYHA class Ⅰ to Ⅱ without BBB. Among single site pacing, the RVOT and LVB pacing is better than RVA pacing in cardiac function.
文摘In this paper, a successfully studied and developed master - slave muld - microcomputers control system based on PC - BUS for hollow spindle fancy yarn spinning machine, mainly Its overall scheme, software and hardware construction, is introduced. Spinning experiments show that the system achieves satisfactory result. This system can solve the diftkultles of mechatronical fusion between domestic hollow splndk fancy yarn spuming muchine and its microcomputer control technology.
文摘A quantitative method is developed to identify the structures of multi-layer woven fabric in this study. Six structural parameters are selected to represent the fabric structure. With some design criteria for the reinforcement of textile composites, the relationships among the structural parameters are derived for different binding patterns of the fabric structure. The conditions, which meet the requirements of structural cell stability,are also discussed.