Entity

Time filter

Source Type


Liu X.,Tongji University | Liu X.,The Key Laboratory of Embedded System and Service Computing | Li P.,Tongji University | Li P.,The Key Laboratory of Embedded System and Service Computing | Chen T.,Fudan University
Neurocomputing | Year: 2015

In this paper, we investigate the cluster synchronization for linearly coupled networks with constant time delay by pinning periodically intermittent controllers. The network topology can be directed. The time delay is assumed to be less than the control width. At first, we give some criteria for cluster synchronization under constant pinning control strategy. Furthermore, by applying the adaptive approach, we design a centralized adaptive algorithm on the intermittent control gain, and also prove its validity rigorously. Finally, numerical simulations are given to demonstrate the correctness of obtained theoretical results. © 2015 Elsevier B.V.. Source


Mo X.M.,The Key Laboratory of Embedded System and Service Computing | Fang Y.,The Key Laboratory of Embedded System and Service Computing | Yang Y.G.,Shanghai Railway Telecommunication Equipment Ltd Co.
Applied Mechanics and Materials | Year: 2013

This paper proposes a method of the fault detection and diagnosis for the railway turnout based on the current curve of switch machine. Exact curve matching fault detection method and SVM-based fault diagnosis method are adopted in the paper. Based on envelope and morpheme match algorithm, exact curve matching method is used to match the detected current curve with the reference curve so as to predict whether the curve would have fault or not. Moreover, the SVM-based fault diagnosis method is used to make sure that the fault conditions could be diagnosed intelligently. Finally, the experimental results show that the proposed method can accurately identify the turnout fault status in the conversion process, and the accuracy rate in the diagnosis of the fault location is above 98%, which verify the effectiveness of the method in the fault detection and diagnosis. © (2013) Trans Tech Publications, Switzerland. Source


Liu X.,Tongji University | Liu X.,The Key Laboratory of Embedded System and Service Computing | Xu Y.,Tongji University | Xu Y.,The Key Laboratory of Embedded System and Service Computing
Neurocomputing | Year: 2015

In this paper, we investigate the cluster synchronization problem of complex networks via pinning control. Nodes in the same cluster are governed by the same dynamical function, while the functions for different clusters are different. For the coupling scheme, the effects of the coupling are assumed to be only cooperative, i.e., the coupling matrix is a Metzler matrix with zero row sums, and the connections between the same cluster can be few. For this type of coupling, the main difference of this paper with previous works is that the cluster synchronization is realized by pinning control technique. A simple pinning control strategy is proposed and some sufficient criteria to realize cluster synchronization with both static and adaptive control strength are given. Finally, numerical simulations are presented to verify our theoretical results. © 2015 Elsevier B.V. Source


Ma H.-Y.,Tongji University | Ma H.-Y.,The Key Laboratory of Embedded System and Service Computing | Ma H.-Y.,Nantong University | Zeng G.-S.,Tongji University | Zeng G.-S.,The Key Laboratory of Embedded System and Service Computing
Jisuanji Xuebao/Chinese Journal of Computers | Year: 2012

Attribute-based encryption (ABE) is an effective cryptographic primitive for achieving fine-grained access control of encrypted data. A well-known concern in the ABE system is that malicious users (or traitors) leak their private keys to construct pirate decryption devices and distribute them to illegal users. The existing solutions can only trace the identities of users who leaked their keys, but they can not revoke the leaked keys from the ABE system. This paper proposes an attribute-based encryption scheme for traitor tracing and revocation together (ABTR). We first introduce an ABE scheme with generalized wildcards (GWABE). Under three assumptions of the subgroup decision problem for 3 primes (3P-SDP), we prove that the GWABE scheme is fully secure by using the dual system encryption method. Then we transform the GWABE scheme into an ABTR scheme by using the complete subtree framework. The ABTR scheme is proved to be fully secure, and provides the nice feature of having constant private key size. However, the previous ABE schemes for traitor tracing were only proved secure in the selective model. Source


Xu J.-C.,Tongji University | Xu J.-C.,The Key Laboratory of Embedded System and Service Computing | Zeng G.-S.,Tongji University | Zeng G.-S.,The Key Laboratory of Embedded System and Service Computing
Tien Tzu Hsueh Pao/Acta Electronica Sinica | Year: 2012

The existed thread-based software watermarking algorithm can only hide a small amount of information and have low efficiency. Aimed to this status, this paper proposes a new software watermarking algorithm based on the relationship between threads. The main idea is to control the interactive relationship between threads which hides software watermarking by modifying the program's source code. This paper gives a formal definition of the concepts such as relation and relation matrix, and a detailed description of the software watermark embedding and extraction process. We also analyze the date rate and fidelity of the algorithm. Various kinds of attacks used in the experiment, results indicate this algorithm has high resistance. Source

Discover hidden collaborations