- Access Control and Trust
- Privacy-Preserving Technologies in Data
- Robotic Path Planning Algorithms
- Cryptography and Data Security
- Privacy, Security, and Data Protection
- Advanced SAR Imaging Techniques
- Synthetic Aperture Radar (SAR) Applications and Techniques
- Service-Oriented Architecture and Web Services
- Satellite Communication Systems
- Cloud Computing and Resource Management
- Metaheuristic Optimization Algorithms Research
- Parallel Computing and Optimization Techniques
- Advanced Data Storage Technologies
- Internet Traffic Analysis and Secure E-voting
- Cloud Data Security Solutions
- Technology and Security Systems
- Radio Frequency Integrated Circuit Design
- Wireless Communication Networks Research
- Advancements in PLL and VCO Technologies
- Modular Robots and Swarm Intelligence
- Distributed Control Multi-Agent Systems
- Radar Systems and Signal Processing
- Advanced Optical Sensing Technologies
- Autonomous Vehicle Technology and Safety
- Mobile Agent-Based Network Management
National University of Defense Technology
2011-2025
National Taiwan Normal University
2021-2022
Harbin Institute of Technology
2016
System Equipment (China)
2011-2012
China Electronics Standardization Institute
2012
Jingdezhen Ceramic Institute
2007
This paper presents a survey of identity management from the perspectives development stages and functions variety Identity Management. The definition core concepts have been discussed deeply. Management models including isolated model, centralized federated model are grouped by components varying changing. Based on transformation design principles, paradigms classified into network centric paradigm, service user paradigm. Comparisons these presented. And we give rough classification current...
Interference detection is one of the key technologies used in satellite communication systems to cope with complex electromagnetic environments. To accommodate power consumption and resource-constrained application scenarios payloads, this paper proposes an efficient differential amplitude interference algorithm based on non-uniform adaptive segmentation, building upon classical forward consecutive mean excision (FCME) field. The proposed replaces traditional point-based iterative approach a...
Abstract Radio frequency interference (RFI) is becoming more and frequently, which makes it an important issue in SAR imaging. RFI presented synthetic aperture radar either on purpose or inadvertent will distort the useful echoes, thus degrade image quality. To resolve this issue, a long time study was carried out to characteristic of through RFI-affected spaceborne airborne data. Based narrow band nature RFI, paper proposes new process contains both detection suppression. A subband spectral...
UCONABC is a basic framework of next generation access control policy Usage Control that composed Authorization-oBlige-Condition components, but so far it lacks important delegation characteristic. The paper analyses the behaviors in UCON based on OM-AM engineering principles, presents formalized usage model with features using BNF Extensions, called as UCOND, and further articulates its hybrid architecture Client & Server Delegation Reference Monitors relative key protocol functions. UCOND...
Nowadays the significance of access control technology in service oriented network is increasingly highlighted. The RBAC model has a variety advantages such as easy management and high efficiency. With expansion scale, must be divided into autonomous multi-domains for convenient management. However, there still lack studies on domain based barrier applying to multi-domain environment, corresponding supporting implementation technologies are also weak. In this paper, we proposed (D-RBAC)...
This study develops a catering service robot system for self-serviced restaurant. The overall integrates the Dobot arm, linear motion robot, and Temi mobile robot. By ordering drinks via panel on robots, arm will prepare beverage. When meal is ready, FoodTemi automatically fetch deliver to customer.
Faced with an increasingly complex electromagnetic environment of space, Synthetic Aperture Radar (SAR) is susceptible to the influence Radio Frequency Interference (RFI) signals, thus seriously affecting SAR image interpretation. This even worse for low-frequency-band systems (P-band example) which are disturbed by a lot television broadcasting signals. Based on model and characteristics RFI modified suppression method proposed. combines advantages traditional notch subspace projection in...
This paper proposes a novel method based on median filter for radio frequency interference (RFI) suppression applied to synthetic aperture radar (SAR). The RFI has higher power than the useful echo signal and narrow property in range domain. A threshold called max-mean-ratio (MMR) is proposed detect existence. If exists, then processed with filter. verified linear modulation (LFM) point target simulation. In end, RadarSat-1 data demonstrate performance. (5 pages)
Abstract Ant colony optimization (ACO) is a simple and efficient bionic intelligent algorithm, which can be applied to various problems. There are many controllable parameters in the ant optimization, so parameter setting has great impact on efficiency of algorithm. In order further improve researchers have proposed improvements. However, current improved method ACO ignored consideration its original settings. analyze effect this article uses solve small-scale TSP problems as an example for...
Difficulties in building quantitative and semantic model of user identity data are bottlenecks for the further development Identity Management technology. Currently, definition has much illegibility, people have different starting points goals, formalization work definitions is exiguous. This paper tries to find a way describe quantitatively, so that semantics information can be expressed, based on analysis Basic Model proposed this paper, requirements been determined, new generalized...
Introducing the trust evaluation into access control for service requester in a distributed network environment could be helpful enhancing precision and security of authorization decisions, special to strange requesters. The existing researches divided objective means subjective means. evaluations used dynamically measure user's degree according reputation based on its past actions. But it cannot work when interaction experience with user is absence. Compared other models using probability...
This paper provides an overview of identity management architecture from the viewpoint paradigms and models. The definition has been discussed, are classified by development stage core design principle transmission which include network centric paradigm, service user paradigm; models grouped components varying functions changing to isolated model, centralized federated model. These have no collisions among them for they views different viewpoint.
In open computing environment (e.g. Web 2.0, SOA, Cloud), resources are shared across different organizations. Application needs authenticate many users from domains. this paper, we present AI-IdM(Application Independent Identity Management), a comprehensive Management, which focus on privacy preservation. The solution presents some useful features, such as user-chosen IdP and two-level identifier etc.
For spaceborne synthetic aperture radar (SAR) imaging, the dispersive ionosphere has significant effects on propagation of low frequency (especially P-band) signal. The ionospheric can be a source phase error in signal, which causes degeneration image quality SAR imaging system. background through modeling and simulation are analyzed, qualitative quantitative analysis based spatio-temporal variability is given. A novel correction algorithm (ICA) proposed to deal with With algorithm,...
To coordinate the traffic lights for adjacent crossings makes profound challenges to intelligent control of traffics in modern cities. In particular, complexity model multi-crossing is difficult solve a time scale acceptable efficient control. This study proposed optimization problem by co-evolving particle swarm optimization, and learn optimal strategy an artificial neural network (ANN). With this well trained ANN, realtime over can be achieved. The systematic simulation results showed us...
In this letter, a combined technique of self-injection locking and in-loop mixing (SIL-MIX) is applied to phase-locked loop (PLL) frequency synthesizer, which significantly reduces the integrated phase noise conventional PLL synthesizer. Simultaneously, model calculation formula based on SIL-MIX method proposed has high degree consistency with measured results. addition, designed programmable shifter provides novel perspective board-level system integration synthesizers. Experimental results...
Recently, privacy protection attracts more and research efforts especially for social network data. In the literature, most of existing approaches assume that data are independent to each other which is not case in real world applications. this paper, we first attempt investigate issue when correlated. We model correlation as probability a vertex might be related given vertex, i.e., how likely person could friend another person. The highly correlated will selected neighbor perturbed graph....
Prufer algorithm is a powerful method for topology vectorization, but the traditional prufer can only encode rootless labeled tree, and no prior work has studied of applying it to graph vectorization. This paper proposes vectorization undirected graphs based on algorithm, including encoding decoding algorithms. A particular case was discovered by preliminary experiments, which will reduce accuracy coding (when node size reaches more than 150, reach about 60%), so connectivity check mechanism...
Recently, GPUs are found to be used across a broad range of domains. To support virtual memory, which is required by most applications at present, the address translation process introduced GPU side. However, many demonstrate that an irregular memory access pattern, in accesses poor structured and often data dependent, makes performance worse especially with virtual-to-physical translations. Modern management unit (MMU) employs caching, e.g. page walk buffer (PWB) cache (PWC), scheduling...