Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct...Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.展开更多
We study numerical methods for level set like equations arising in image processing and curve evolution problems. Semi-implicit finite volume-element type schemes are constructed for the general level set like equati...We study numerical methods for level set like equations arising in image processing and curve evolution problems. Semi-implicit finite volume-element type schemes are constructed for the general level set like equation (image selective smoothing model) given by Alvarez et al. (Alvarez L, Lions P L, Morel J M. Image selective smoothing and edge detection by nonlinear diffusion II. SIAM J. Numer. Anal., 1992, 29: 845-866). Through the reasonable semi-implicit discretization in time and co-volume method for space approximation, we give finite volume schemes, unconditionally stable in L∞ and W1'2 (W1'1) sense in isotropic (anisotropic) diffu- sion domain.展开更多
Selecting the optimal one from similar schemes is a paramount work in equipment design.In consideration of similarity of schemes and repetition of characteristic indices,the theory of set pair analysis(SPA)is proposed...Selecting the optimal one from similar schemes is a paramount work in equipment design.In consideration of similarity of schemes and repetition of characteristic indices,the theory of set pair analysis(SPA)is proposed,and then an optimal selection model is established.In order to improve the accuracy and flexibility,the model is modified by the contribution degree.At last,this model has been validated by an example,and the result demonstrates the method is feasible and valuable for practical usage.展开更多
The maintenance window scheme(MWS) is one of the most important railway transportation organizational plans and plays an important role in ensuring railway operational safety. However, MWS setting is a very complicate...The maintenance window scheme(MWS) is one of the most important railway transportation organizational plans and plays an important role in ensuring railway operational safety. However, MWS setting is a very complicated process, and most countries currently do so with the help of a computer-aided decision system. In general, a decision system can generate multiple alternatives for MWS within an acceptable time. Therefore, how to choose the best option from the alternatives is a vital decision. This paper presents a novel framework for MWS evaluation based on the Chinese railway system. Specifically, the requirements of each department related to MWS setting are analysed, and we construct an evaluation indicator system for MWS based on the preferences of different departments. Then, we apply the fuzzy soft set theory to MWS evaluation, a method that not only effectively deals with evaluation of uncertain information, but also gives flexibility for experts to input their subjective judgment.Additionally, using the ‘‘AND’’ operation of soft set theory allows combing evaluation information from multiple evaluators to give comprehensive results. Finally, a case study illustrates the proposed framework, showing that the proposed evaluation indicator system and evaluation method are effective and practical.展开更多
Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every lin...Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme.展开更多
In view of the shortcomes of conventional ElectroCardioGram (ECG) compression algo- rithms,such as high complexity of operation and distortion of reconstructed signal,a new ECG compression encoding algorithm based on ...In view of the shortcomes of conventional ElectroCardioGram (ECG) compression algo- rithms,such as high complexity of operation and distortion of reconstructed signal,a new ECG compression encoding algorithm based on Set Partitioning In Hierarchical Trees (SPIHT) is brought out after studying the integer lifting scheme wavelet transform in detail.The proposed algorithm modifies zero-tree structure of SPIHT,establishes single dimensional wavelet coefficient tree of ECG signals and enhances the efficiency of SPIHT-encoding by distributing bits rationally,improving zero-tree set and ameliorating classifying method.For this improved algorithm,floating-point com- putation and storage are left out of consideration and it is easy to be implemented by hardware and software.Experimental results prove that the new algorithm has admirable features of low complexity, high speed and good performance in signal reconstruction.High compression ratio is obtained with high signal fidelity as well.展开更多
During the past decade, increasing attention has been given to the development of meshless methods using radial basis functions for the numerical solution of Partial Differential Equations (PDEs). A level set method...During the past decade, increasing attention has been given to the development of meshless methods using radial basis functions for the numerical solution of Partial Differential Equations (PDEs). A level set method is a promising design tool for tracking, modelling and simulating the motion of free boundaries in fluid mechanics, combustion, computer animation and image processing. In the conventional level set methods, the level set equation is solved to evolve the interface using a capturing Eulerian approach. The solving procedure requires an appropriate choice of the upwind schemes, reinitialization, etc. Our goal is to include Multiquadric Radial Basis Functions (MQ RBFs) into the level set method to construct a more efficient approach and stabilize the solution process with the adaptive greedy algorithm. This paper presents an alternative approach to the conventional level set methods for solving moving-boundary problems. The solution was compared to the solution calculated by the exact explicit lime integration scheme. The examples show that MQ RBFs and adaptive greedy algorithm is a very promising calculation scheme.展开更多
文摘Secret sharing has been a subject of study for over 30 years. The coding theory has been an important role in the constructing of the secret sharing schemes. It is known that every linear code can be used to construct the secret sharing schemes. Since the code of a symmetric (V, k, λ)-design is a linear code, this study is about the secret sharing schemes based on C of Fp-code C of asymmetric (v, k, λ)-design.
文摘We study numerical methods for level set like equations arising in image processing and curve evolution problems. Semi-implicit finite volume-element type schemes are constructed for the general level set like equation (image selective smoothing model) given by Alvarez et al. (Alvarez L, Lions P L, Morel J M. Image selective smoothing and edge detection by nonlinear diffusion II. SIAM J. Numer. Anal., 1992, 29: 845-866). Through the reasonable semi-implicit discretization in time and co-volume method for space approximation, we give finite volume schemes, unconditionally stable in L∞ and W1'2 (W1'1) sense in isotropic (anisotropic) diffu- sion domain.
文摘Selecting the optimal one from similar schemes is a paramount work in equipment design.In consideration of similarity of schemes and repetition of characteristic indices,the theory of set pair analysis(SPA)is proposed,and then an optimal selection model is established.In order to improve the accuracy and flexibility,the model is modified by the contribution degree.At last,this model has been validated by an example,and the result demonstrates the method is feasible and valuable for practical usage.
基金supported by the National Natural Science Foundation of China (Project Nos.61273242,61403317)Science and Technology Plan of Sichuan province (Project No.2017015)Service Science and Innovation Key Laboratory of Sichuan Province (KL1701)
文摘The maintenance window scheme(MWS) is one of the most important railway transportation organizational plans and plays an important role in ensuring railway operational safety. However, MWS setting is a very complicated process, and most countries currently do so with the help of a computer-aided decision system. In general, a decision system can generate multiple alternatives for MWS within an acceptable time. Therefore, how to choose the best option from the alternatives is a vital decision. This paper presents a novel framework for MWS evaluation based on the Chinese railway system. Specifically, the requirements of each department related to MWS setting are analysed, and we construct an evaluation indicator system for MWS based on the preferences of different departments. Then, we apply the fuzzy soft set theory to MWS evaluation, a method that not only effectively deals with evaluation of uncertain information, but also gives flexibility for experts to input their subjective judgment.Additionally, using the ‘‘AND’’ operation of soft set theory allows combing evaluation information from multiple evaluators to give comprehensive results. Finally, a case study illustrates the proposed framework, showing that the proposed evaluation indicator system and evaluation method are effective and practical.
文摘Secret sharing is an important topic in cryptography and has applications in information security. The coding theory has been an important role in the constructing of secret sharing schemes. It is known that every linear code can be used to construct secret sharing schemes. So, we use the parity-check matrix of a linear code to construct secret sharing schemes based on linear codes. We also describe some techniques to recover the secret and determine the access structure of the new scheme. In this paper, we use the Massey's secret sharing scheme.
文摘In view of the shortcomes of conventional ElectroCardioGram (ECG) compression algo- rithms,such as high complexity of operation and distortion of reconstructed signal,a new ECG compression encoding algorithm based on Set Partitioning In Hierarchical Trees (SPIHT) is brought out after studying the integer lifting scheme wavelet transform in detail.The proposed algorithm modifies zero-tree structure of SPIHT,establishes single dimensional wavelet coefficient tree of ECG signals and enhances the efficiency of SPIHT-encoding by distributing bits rationally,improving zero-tree set and ameliorating classifying method.For this improved algorithm,floating-point com- putation and storage are left out of consideration and it is easy to be implemented by hardware and software.Experimental results prove that the new algorithm has admirable features of low complexity, high speed and good performance in signal reconstruction.High compression ratio is obtained with high signal fidelity as well.
文摘During the past decade, increasing attention has been given to the development of meshless methods using radial basis functions for the numerical solution of Partial Differential Equations (PDEs). A level set method is a promising design tool for tracking, modelling and simulating the motion of free boundaries in fluid mechanics, combustion, computer animation and image processing. In the conventional level set methods, the level set equation is solved to evolve the interface using a capturing Eulerian approach. The solving procedure requires an appropriate choice of the upwind schemes, reinitialization, etc. Our goal is to include Multiquadric Radial Basis Functions (MQ RBFs) into the level set method to construct a more efficient approach and stabilize the solution process with the adaptive greedy algorithm. This paper presents an alternative approach to the conventional level set methods for solving moving-boundary problems. The solution was compared to the solution calculated by the exact explicit lime integration scheme. The examples show that MQ RBFs and adaptive greedy algorithm is a very promising calculation scheme.