1,562 results on '"Identification scheme"'
Search Results
2. Cryptanalysis of Human Identification Protocol with Human-Computable Passwords
- Author
-
Grześkowiak, Maciej, Krzywiecki, Łukasz, Niczyj, Karol, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Meng, Weizhi, editor, Yan, Zheng, editor, and Piuri, Vincenzo, editor
- Published
- 2023
- Full Text
- View/download PDF
3. Multivariate Partially Blind Signature Scheme
- Author
-
Omar, Satyam, Padhye, Sahadeo, Dey, Dhananjoy, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Oneto, Luca, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Shukla, Anupam, editor, Murthy, B. K., editor, Hasteer, Nitasha, editor, and Van Belle, Jean-Paul, editor
- Published
- 2023
- Full Text
- View/download PDF
4. Rank AGS Identification Scheme and Signature Scheme.
- Author
-
Nagaraja, Vaishnavi, Ariffin, Muhammad Rezal Kamel, Lau, Terry Shue Chien, Adenan, Nurul Nur Hanisah, Chin, Ji-Jian, Yip, Sook-Chin, and Yap, Timothy Tzen Vun
- Subjects
- *
CRYPTOGRAPHY , *IDENTIFICATION , *SECURITY management - Abstract
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to convert an identification scheme into a signature scheme which can be used for achieving security purposes and cryptographic purposes, especially for authentication. In this paper, we recall an identification protocol, namely the RankID scheme, and show that the scheme is incorrect and insecure. Then, we proposed a more natural approach to construct the rank version of the AGS identification protocol and show that our construction overcomes the security flaws in the RankID scheme. Our proposal achieves better results when comparing the public key size, secret key size, and signature size with the existing identification schemes, such as Rank RVDC and Rank CVE schemes. Our proposal also achieves 90%, 50%, and 96% reduction for the signature size, secret key size, and public key size when compared to the Rank CVE signature scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
5. An Efficient Identification Scheme Based on Bivariate Function Hard Problem.
- Author
-
Tea, Boon Chian, Ariffin, Muhammad Rezal Kamel, Ghafar, Amir Hamzah Abd, Sapar, Siti Hasana, and Johari, Mohamat Aidil Mohamat
- Subjects
- *
IMPERSONATION , *CRYPTOGRAPHY , *PUBLIC key cryptography , *HARDNESS , *TEA - Abstract
Symmetric cryptography allows faster and more secure communication between two entities using the identical pre-established secret key. However, identifying the honest entity with the same secret key before initiating symmetric encryption is vital since the communication may be impersonated. Tea and Ariffin, in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP) that proved secure against impersonation under passive, active and concurrent attacks via the BFHP-hardness assumption. In this paper, we upgrade the ID scheme and improve some of its settings. Next, we provide the security proof against impersonation under active and concurrent attacks in the random oracle model via the hardness assumption of the One-More BFHP. Finally, we include an additional discussion about the computational efficiency of the upgraded ID scheme based on BFHP and present its comparison with other selected ID schemes. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
6. An Efficient Identification Scheme Based on Rank Metric
- Author
-
Ayebie, Edoukou Berenger, Assidi, Hafsa, Souidi, El Mamoun, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Bertino, Elisa, Editorial Board Member, Gao, Wen, Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Woeginger, Gerhard, Editorial Board Member, Yung, Moti, Editorial Board Member, Benzekri, Abdelmalek, editor, Barbeau, Michel, editor, Gong, Guang, editor, Laborde, Romain, editor, and Garcia-Alfaro, Joaquin, editor
- Published
- 2020
- Full Text
- View/download PDF
7. Asymmetric subversion attacks on signature and identification schemes.
- Author
-
Wang, Yi, Chen, Rongmao, Liu, Chi, Wang, Baosheng, and Wang, Yongjun
- Subjects
- *
CRYPTOGRAPHY , *HAZARDS - Abstract
Studies of subversion attack against cryptosystem could be dated to several decades ago, while the Snowden revelation in 2013 has set off a new wave of exploring possible approaches to protect or subvert cryptography primitives in practice. Inspired by kleptographic attacks proposed by Young et al. [Crypto'96], we present the asymmetric subversion attack on signature and identification schemes in this work. Our contributions is summarized as follows: We present the asymmetric subversion model for signature and identification schemes. The properties of our model are stronger than that of existing subversion model proposed by Giuseppe et al. [CCS'15] and show higher requirement in attack goal. We propose the notion of splittable signature scheme and give a universal asymmetric subversion attack on such schemes. Our attack is independent of secret key size and more efficient than symmetric attacks introduced by Giuseppe et al. [CCS'15]. We introduce the asymmetric subversion attack on a special type of identification schemes and show that it can be transformed from splittable signature scheme. Our subversion attack is demonstrated to be practical and could be mounted on many common schemes, which shows the danger of subversion attacks and spurs the exploring of effective deterrents. [ABSTRACT FROM AUTHOR]
- Published
- 2022
- Full Text
- View/download PDF
8. Rank AGS Identification Scheme and Signature Scheme
- Author
-
Vaishnavi Nagaraja, Muhammad Rezal Kamel Ariffin, Terry Shue Chien Lau, Nurul Nur Hanisah Adenan, Ji-Jian Chin, Sook-Chin Yip, and Timothy Tzen Vun Yap
- Subjects
public-key cryptography ,post-quantum cryptography ,code-based cryptography ,rank metric ,signature scheme ,identification scheme ,Mathematics ,QA1-939 - Abstract
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to convert an identification scheme into a signature scheme which can be used for achieving security purposes and cryptographic purposes, especially for authentication. In this paper, we recall an identification protocol, namely the RankID scheme, and show that the scheme is incorrect and insecure. Then, we proposed a more natural approach to construct the rank version of the AGS identification protocol and show that our construction overcomes the security flaws in the RankID scheme. Our proposal achieves better results when comparing the public key size, secret key size, and signature size with the existing identification schemes, such as Rank RVDC and Rank CVE schemes. Our proposal also achieves 90%, 50%, and 96% reduction for the signature size, secret key size, and public key size when compared to the Rank CVE signature scheme.
- Published
- 2023
- Full Text
- View/download PDF
9. Rethinking Identification Protocols from the Point of View of the GDPR
- Author
-
Kutyłowski, Mirosław, Krzywiecki, Łukasz, Chen, Xiaofeng, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Pandu Rangan, C., Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Dolev, Shlomi, editor, Hendler, Danny, editor, Lodha, Sachin, editor, and Yung, Moti, editor
- Published
- 2019
- Full Text
- View/download PDF
10. Quasi-Dyadic Girault Identification Scheme
- Author
-
Boidje, Brice Odilon, Gueye, Cheikh Thiecoumba, Dione, Gilbert Ndollane, Klamti, Jean Belo, Hutchison, David, Editorial Board Member, Kanade, Takeo, Editorial Board Member, Kittler, Josef, Editorial Board Member, Kleinberg, Jon M., Editorial Board Member, Mattern, Friedemann, Editorial Board Member, Mitchell, John C., Editorial Board Member, Naor, Moni, Editorial Board Member, Pandu Rangan, C., Editorial Board Member, Steffen, Bernhard, Editorial Board Member, Terzopoulos, Demetri, Editorial Board Member, Tygar, Doug, Editorial Board Member, Goos, Gerhard, Founding Editor, Hartmanis, Juris, Founding Editor, Carlet, Claude, editor, Guilley, Sylvain, editor, Nitaj, Abderrahmane, editor, and Souidi, El Mamoun, editor
- Published
- 2019
- Full Text
- View/download PDF
11. Model Uncertainty
- Author
-
Onatski, Alexei and Macmillan Publishers Ltd
- Published
- 2018
- Full Text
- View/download PDF
12. An Efficient Identification Scheme Based on Bivariate Function Hard Problem
- Author
-
Boon Chian Tea, Muhammad Rezal Kamel Ariffin, Amir Hamzah Abd Ghafar, Siti Hasana Sapar, and Mohamat Aidil Mohamat Johari
- Subjects
active and concurrent attacks ,Bivariate Function Hard Problem ,identification scheme ,provable security ,symmetric encryption ,Mathematics ,QA1-939 - Abstract
Symmetric cryptography allows faster and more secure communication between two entities using the identical pre-established secret key. However, identifying the honest entity with the same secret key before initiating symmetric encryption is vital since the communication may be impersonated. Tea and Ariffin, in 2014, proposed a new identification (ID) scheme based on the Bivariate Function Hard Problem (BFHP) that proved secure against impersonation under passive, active and concurrent attacks via the BFHP-hardness assumption. In this paper, we upgrade the ID scheme and improve some of its settings. Next, we provide the security proof against impersonation under active and concurrent attacks in the random oracle model via the hardness assumption of the One-More BFHP. Finally, we include an additional discussion about the computational efficiency of the upgraded ID scheme based on BFHP and present its comparison with other selected ID schemes.
- Published
- 2022
- Full Text
- View/download PDF
13. A New Identification Scheme based on Syndrome Decoding Problem with Provable Security against Quantum Adversaries
- Author
-
Bagus Santoso and Chunhua Su
- Subjects
identification scheme ,post-quantum ,quantum rando ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Recently, in order to guarantee security against quantum adversaries, several identification (ID) schemes based on computational problems which are supposed to be hard even for quantum computers have been proposed. However, their security are only proven against non-quantum adversaries. In this paper, we proposed a novel four-pass code-based identification scheme. By using quantum random oracle model, we provide a security proof for our scheme against quantum adversaries which aim to impersonate the prover under concurrent active attacks, based on the hardness assumption of syndrome decoding (SD) problem. Our security proof is interesting in its own right, since it only requires a non-programmable quantum random oracle, in contrast to existing security proofs of digital signatures generated from ID scheme via Fiat-Shamir transform which require programmable quantum random oracles.
- Published
- 2019
- Full Text
- View/download PDF
14. Deterring Certificate Subversion: Efficient Double-Authentication-Preventing Signatures
- Author
-
Bellare, Mihir, Poettering, Bertram, Stebila, Douglas, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, and Fehr, Serge, editor
- Published
- 2017
- Full Text
- View/download PDF
15. Strongly Deniable Identification Schemes Immune to Prover’s and Verifier’s Ephemeral Leakage
- Author
-
Krzywiecki, Łukasz, Słowik, Marcin, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Farshim, Pooya, editor, and Simion, Emil, editor
- Published
- 2017
- Full Text
- View/download PDF
16. A NP-Complete Problem in Coding Theory with Application to Code Based Cryptography
- Author
-
Berger, Thierry P., Gueye, Cheikh Thiécoumba, Klamti, Jean Belo, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, El Hajji, Said, editor, Nitaj, Abderrahmane, editor, and Souidi, El Mamoun, editor
- Published
- 2017
- Full Text
- View/download PDF
17. Identification of the Relationship between Maritime Autonomous Surface Ships and the Operator's Mental Workload.
- Author
-
Yoshida, Masanori, Shimizu, Etsuro, Sugomori, Masashi, Umeda, Ayako, and Nazir, Salman
- Subjects
SHIPS ,HUMAN error ,MARINE accidents ,SUPPLY chains ,COLLISIONS at sea - Abstract
Shipping is an indispensable tool for the sustainable global supply chain, and seafarers play a key role in safe navigation. Maritime autonomous surface ships (MASS) have been expected to reduce marine accidents by human error of the seafarers. On the other hand, MASS may have adverse effects on operators' mental workload (MWL) and increase safety risks in some cases. This research aims to provide a scheme for identifying the relationship between MWL and MASS in the maritime that can be utilised for rulemaking and technological development. The provided scheme identifies the factors that affect the MWL of operators and sub-elements of MWL through gap analysis. Five factors related to MASS operation were defined, in addition to general factors. The case study was carried out by utilising the scheme on typical cases focusing on the normal navigational situation. The NASA task load index method was used to measure MWL. Ten deck officers with various ranks, including the third officer and captain, participated in the case study. The results suggested that various causes such as conflicted situations, machine–human interfaces, mechanical-style movements of the ship, reliability of MASS, and visibility constraints affect the MWL of operators. It also confirmed the verification of the identification scheme. [ABSTRACT FROM AUTHOR]
- Published
- 2021
- Full Text
- View/download PDF
18. Relay‐based identification scheme for processes with non‐minimum phase and time delay.
- Author
-
Pandey, Saurabh and Majhi, Somanath
- Abstract
This study presents the frequency‐domain and state‐space approaches for modelling and identification of processes exhibiting non‐minimum phase and time delay characteristics. An asymmetrical relay is fed back to unknown process to bring sustained oscillatory responses or limit cycle at the process output. Utilising the relay settings and limit cycle information, a set of mathematical expressions for the identification of process dynamics in terms of non‐minimum phase second‐order plus time delay, non‐minimum phase first‐order plus time delay, non‐minimum phase integrating first‐order plus time delay models is deduced. As compared to the methods reported in recent literature, the proposed set of explicit expressions is completely free from the simultaneous solution of a set of non‐linear equations and does not need any prior guess for initial value of the unknown process model parameters. Simulations of benchmark examples from literature and experimental results from coupled tanks system are included to demonstrate the efficacy of the proposed relay‐based identification algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
19. From Identification to Signatures, Tightly: A Framework and Generic Transforms
- Author
-
Bellare, Mihir, Poettering, Bertram, Stebila, Douglas, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Cheon, Jung Hee, editor, and Takagi, Tsuyoshi, editor
- Published
- 2016
- Full Text
- View/download PDF
20. Schnorr-Like Identification Scheme Resistant to Malicious Subliminal Setting of Ephemeral Secret
- Author
-
Krzywiecki, Łukasz, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, Bica, Ion, editor, and Reyhanitabar, Reza, editor
- Published
- 2016
- Full Text
- View/download PDF
21. Leakage-Resilient Identification Schemes from Zero-Knowledge Proofs of Storage
- Author
-
Ateniese, Giuseppe, Faonio, Antonio, Kamara, Seny, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Weikum, Gerhard, Series editor, and Groth, Jens, editor
- Published
- 2015
- Full Text
- View/download PDF
22. Fast Low Frequency Fault Location and Section Identification Scheme for VSC-Based Multi-Terminal HVDC Systems
- Author
-
Seyed Hassan Ashrafi Niaki, Habib Panahi, Majid Sanaye-Pasand, and Reza Zamani
- Subjects
Network topology ,Identification scheme ,Computer science ,business.industry ,Electrical engineering ,Fault currents ,Energy Engineering and Power Technology ,Low frequency ,HVDC transmission ,Fault (power engineering) ,Current measurement ,Topology ,voltage source converter (VSC) ,hybrid AC/DC systems ,Fault location ,Transmission line measurements ,Terminal (electronics) ,Section (archaeology) ,multi-terminal DC (MTDC) network ,least squares error (LSE) ,Electrical and Electronic Engineering ,business - Abstract
Penetration of DC networks is rapidly increasing in modern power systems. As transient behavior of DC grids is different from that of AC ones, AC grid protection schemes might not be applicable to protect DC networks. Exact fault location is vital for protection of DC networks to reduce repair cost and achieve fast power recovery. This paper proposes a novel topology independent multi-terminal DC scheme to identify fault section and location for DC transmission systems. Voltage and current signals measured at the terminals are analyzed by the least squares error (LSE) algorithm. Then, the proposed scheme uses low frequency components of the signals to locate DC faults offline. Unlike some other methods, it does not require sophisticated sensors and hardware to capture very high frequency content of the signals. Hence, the proposed scheme can be implemented in practice without additional measuring infrastructure. The performance of the proposed scheme is evaluated under various fault conditions for different topologies of DC networks in both overhead lines and cables. Numerous simulations carried out demonstrate that the proposed scheme is quite accurate and provides excellent performance under different fault resistances, sections, and locations.
- Published
- 2022
23. Rank AGS Identification Scheme and Signature Scheme
- Author
-
Nurul Nur Hanisah Adenan, MUHAMMAD REZAL KAMEL ARIFFIN, Sook Chin Yip, Ji-Jian Chin, Vaishnavi Nagaraja, Timothy Tzen Vun Yap, and Terry Shue Chien Lau
- Subjects
code-based cryptography ,General Mathematics ,Computer Science (miscellaneous) ,signature scheme ,identification scheme ,Engineering (miscellaneous) ,public-key cryptography ,post-quantum cryptography ,rank metric - Abstract
The identification protocol is a type of zero-knowledge proof. One party (the prover) needs to prove his identity to another party (the verifier) without revealing the secret key to the verifier. One can apply the Fiat–Shamir transformation to convert an identification scheme into a signature scheme which can be used for achieving security purposes and cryptographic purposes, especially for authentication. In this paper, we recall an identification protocol, namely the RankID scheme, and show that the scheme is incorrect and insecure. Then, we proposed a more natural approach to construct the rank version of the AGS identification protocol and show that our construction overcomes the security flaws in the RankID scheme. Our proposal achieves better results when comparing the public key size, secret key size, and signature size with the existing identification schemes, such as Rank RVDC and Rank CVE schemes. Our proposal also achieves 90%, 50%, and 96% reduction for the signature size, secret key size, and public key size when compared to the Rank CVE signature scheme.
- Published
- 2023
- Full Text
- View/download PDF
24. Identification of the Relationship between Maritime Autonomous Surface Ships and the Operator’s Mental Workload
- Author
-
Masanori Yoshida, Etsuro Shimizu, Masashi Sugomori, and Ayako Umeda
- Subjects
maritime autonomous surface ships (MASS) ,mental workload ,identification scheme ,navigation ,regulation ,stress ,Technology ,Engineering (General). Civil engineering (General) ,TA1-2040 ,Biology (General) ,QH301-705.5 ,Physics ,QC1-999 ,Chemistry ,QD1-999 - Abstract
Shipping is an indispensable tool for the sustainable global supply chain, and seafarers play a key role in safe navigation. Maritime autonomous surface ships (MASS) have been expected to reduce marine accidents by human error of the seafarers. On the other hand, MASS may have adverse effects on operators’ mental workload (MWL) and increase safety risks in some cases. This research aims to provide a scheme for identifying the relationship between MWL and MASS in the maritime that can be utilised for rulemaking and technological development. The provided scheme identifies the factors that affect the MWL of operators and sub-elements of MWL through gap analysis. Five factors related to MASS operation were defined, in addition to general factors. The case study was carried out by utilising the scheme on typical cases focusing on the normal navigational situation. The NASA task load index method was used to measure MWL. Ten deck officers with various ranks, including the third officer and captain, participated in the case study. The results suggested that various causes such as conflicted situations, machine–human interfaces, mechanical-style movements of the ship, reliability of MASS, and visibility constraints affect the MWL of operators. It also confirmed the verification of the identification scheme.
- Published
- 2021
- Full Text
- View/download PDF
25. Quantitative Identification Scheme for Multiple Analytes With a Mode-Localized Cantilever Array.
- Author
-
Wang, Dong F., Zhou, Di, Liu, Shuyi, and Hong, Jing
- Abstract
This work proposes an identification scheme for two different analytes using a coupled three-cantilever array. In this scheme, for the first time, we put forward two key parameters including the localization degree $\text{X}_{\mathrm {k}}$ and norm of normalized eigenmode shifts $\vert \Delta u\vert $ to make qualitative and quantitative identification of mixed target analytes, respectively. Theoretical results, which have been verified by numerous simulations, indicate that the linear range (i.e., localization degree with respect to mass ratio) of this mass identification can reach approximately two orders of degree. Besides, we also studied the effect of the coupling factor on the resonance frequency and also proposed that the coupling factor possessed a lower limit to guarantee the resolution of mass sensing in either low vacuum environment or ambient pressure. Last but not least, this scheme could extend to identify analytes as many as possible in a confined space or certain sorts of analytes with a structure as simple as possible, which contributes to the application of gas sensors. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
26. Reinforcement-Learning-Based Spatial Resource Identification for IoT D2D Communications
- Author
-
Sungrae Cho, Woongsoo Na, and Nhu-Ngoc Dao
- Subjects
Scheme (programming language) ,Identification scheme ,Directional antenna ,Computer Networks and Communications ,Computer science ,Computer Science Applications ,Identification (information) ,Computer engineering ,Control and Systems Engineering ,Reinforcement learning ,Network performance ,Electrical and Electronic Engineering ,Omnidirectional antenna ,computer ,Information Systems ,Efficient energy use ,computer.programming_language - Abstract
The exponential growth of the Internet of Things (IoTs) has led to an increasing demand for intelligent IoT devices (IoTDs), requiring innovative network capacity expansion. Recently, several research has been conducted on the identification of hidden network resources for network capacity expansion. However, the spatial resource identification scheme through the omnidirectional antenna has limitations in terms of frequency efficiency compared to the scheme with the directional antenna. In this article, we propose a directional spatial-resource identification technique for device-to-device (D2D) communication. To find the optimal identification parameters, we design the objective function and apply a reinforcement learning. The training data used for reinforcement learning are collected in each report phase, and $Q$ -learning is applied to find the optimal beam set. Furthermore, based on the obtained frequency information, we propose a contention-based D2D communication scheme. The proposed contention-based D2D communication scheme can efficiently solve the deafness problem occurring in a directional D2D communication. Finally, we perform a simulation using optimum network performance (OPNET) to measure the performance and evaluate the effectiveness of the proposed technique. The simulation results show that the proposed schemes realize a better performance than the existing schemes proposed in previous works in terms of energy efficiency, frequency efficiency, aggregate network throughput, and deafness duration.
- Published
- 2022
27. Nonlinear Identification for 4-DOF Ship Maneuvering Modeling via Full-Scale Trial Data
- Author
-
Guoqing Zhang, Xianku Zhang, and Chunyu Song
- Subjects
Nonlinear system ,Consistency (database systems) ,Identification (information) ,Identification scheme ,Control and Systems Engineering ,Computer science ,Control theory ,Convergence (routing) ,Hyperbolic function ,MathematicsofComputing_NUMERICALANALYSIS ,Inversion (meteorology) ,Electrical and Electronic Engineering ,Data modeling - Abstract
This research involves a 4-DOF ship maneuvering modeling with full-scale trial data. In order to avert the inversion of the multi-innovation matrix in the traditional multi-innovation least squares algorithm, a new novel is proposed based on the recognition concept new multi-innovation least squares algorithm to identify the innovation of the stochastic gradient hyperbolic tangent nonlinearity. A lot of work and efforts have been made to ensure the consistency and final convergence. Combined with relevant data and statistical indicators, the author derives a more effective hyperbolic tangent nonlinear innovation identification scheme to identify ship maneuvering motion. Compared with the previous results, this design scheme has significant computational advantages, with higher accuracy, faster identification speed, higher computational efficiency, and requiring fewer parameters. At the same time, the example is given to illustrate the effectiveness of the algorithm, especially for identification applications with full-scale trial data.
- Published
- 2022
28. Identification of IPMSM Flux-Linkage Map for High-Accuracy Simulation of IPMSM Drives
- Author
-
Seung-Ki Sul, Yong-Cheol Kwon, and Joohyun Lee
- Subjects
Harmonic analysis ,Identification scheme ,Computer science ,Control theory ,Harmonic ,Inverter ,Digital control ,Electrical and Electronic Engineering ,Synchronous motor ,Flux linkage ,Discrete Fourier transform - Abstract
This article proposes a precise identification scheme of an interior permanent-magnet synchronous motor (IPMSM) flux linkage through experimental tests considering motor nonlinearities, such as the magnetic saturation and spatial harmonics. In the proposed scheme, the flux linkage is identified based on the voltage equation of IPMSM. The fundamental and harmonic electromotive force in the rotor reference frame is obtained in real time by applying a discrete Fourier transform with the phase compensation of the time delay due to digital control and pulsewidth modulation. The effect of the inverter nonlinearity is compensated using an experimentally obtained lookup table. Based on the identified flux-linkage map, a flux-based IPMSM model that accurately simulates motor behavior can be constructed. The effectiveness of the proposed flux-linkage identification scheme is verified through the comparison of simulation and experimental results.
- Published
- 2021
29. Efficient Small-Batch Verification and Identification Scheme With Invalid Signatures in VANETs
- Author
-
Zhenhua Liu, Ming Yuan, Baocang Wang, and Yingying Ding
- Subjects
Identification scheme ,Computer Networks and Communications ,Computer science ,Automotive Engineering ,Aerospace Engineering ,Data mining ,Electrical and Electronic Engineering ,computer.software_genre ,computer - Published
- 2021
30. Simplified murine multipotent progenitor isolation scheme: Establishing a consensus approach for multipotent progenitor identification
- Author
-
Nina Cabezas Wallscheid, Grant A. Challen, Eric M. Pietras, and Robert A.J. Signer
- Subjects
Scheme (programming language) ,Cancer Research ,Identification scheme ,Computer science ,Crowdsourcing ,Personalization ,Mice ,Antigens, CD ,Experimental Hematology ,Genetics ,Animals ,Isolation (database systems) ,Molecular Biology ,Tissue homeostasis ,computer.programming_language ,business.industry ,Multipotent Stem Cells ,Cell Biology ,Hematology ,Flow Cytometry ,Hematopoietic Stem Cells ,Data science ,Hematopoiesis ,Identification (biology) ,business ,computer - Abstract
The mouse hematopoietic system has served as a paradigm for analysis of developmental fate decisions in tissue homeostasis and regeneration. However, multiple immunophenotypic definitions of, and sometimes divergent nomenclatures used to classify, murine multipotent progenitors (MPPs) have emerged in the field over time. This has created significant confusion and inconsistency in the hematology field. To facilitate easier comparison of murine MPP phenotypes between research laboratories, a working group of four International Society for Experimental Hematology (ISEH) members with extensive experience studying the functional activities associated with different MPP phenotypic definitions reviewed the current state of the field with the goal of developing a position statement toward a simplified and unified immunophenotypic definition of MPP populations. In November of 2020, this position statement was presented as a webinar to the ISEH community for discussion and feedback. Hence, the Simplified MPP Identification Scheme presented here is the result of curation of existing literature, consultation with leaders in the field, and crowdsourcing from the wider experimental hematology community. Adoption of a unified definition and nomenclature, while still leaving room for individual investigator customization, will benefit scientists at all levels trying to compare these populations between experimental settings.
- Published
- 2021
31. Modified grey wolf optimizer-based support vector regression for ship maneuvering identification with full-scale trial
- Author
-
Jinxin Zhu, Zhaochun Liu, Yao Meng, and Xiufeng Zhang
- Subjects
Hyperparameter ,State variable ,Identification scheme ,Computer science ,Mechanical Engineering ,Nonparametric statistics ,Particle swarm optimization ,Ocean Engineering ,Oceanography ,Support vector machine ,Mechanics of Materials ,Robustness (computer science) ,Firefly algorithm ,Algorithm - Abstract
This study explores a nonparametric identification scheme for a ship maneuvering mathematical model. To overcome the difficulty in setting support vector regression (SVR) hyperparameters, a modified grey wolf optimizer algorithm is proposed. The algorithm introduces a nonlinear convergence factor and an adaptive position update strategy to enhance the search ability, which contributes toward identifying optimal hyperparameters. Using these optimal hyperparameters, SVR can predict the state variables pertaining to ship motion with high precision. The prediction of the motion state variables of the vessel YUKUN is considered as an illustrative example to verify the algorithm’s generalization ability and robustness. The prediction results indicate that, compared with the SVR based on the firefly algorithm and the particle swarm optimization, the proposed scheme offers the advantages of robustness, fewer iterations, and smaller prediction errors.
- Published
- 2021
32. Wavelet-based multiresolution analysis coupled with deep learning to efficiently monitor cracks in concrete
- Author
-
Sébastien Jacques, Ahcene Arbaoui, Abdeldjalil Ouahabi, Madina Hamiane, Université Mohamed Akli Ouelhadj de Bouira (UMAOB), Imagerie et cerveau (iBrain - Inserm U1253 - UNIV Tours ), Université de Tours-Institut National de la Santé et de la Recherche Médicale (INSERM), GREMAN (matériaux, microélectronique, acoustique et nanotechnologies) (GREMAN - UMR 7347), Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Tours-Centre National de la Recherche Scientifique (CNRS), Royal University for Women (RUW), Université de Tours (UT)-Institut National de la Santé et de la Recherche Médicale (INSERM), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Tours (UT)-Centre National de la Recherche Scientifique (CNRS), Jacques, Sebastien, Université de Tours (UT)-Institut National des Sciences Appliquées - Centre Val de Loire (INSA CVL), and Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Centre National de la Recherche Scientifique (CNRS)
- Subjects
Identification scheme ,010504 meteorology & atmospheric sciences ,Computer science ,Multiresolution analysis ,0211 other engineering and technologies ,TA630-695 ,02 engineering and technology ,01 natural sciences ,Convolutional neural network ,Wavelet ,crack monitoring ,TJ1-1570 ,Mechanical engineering and machinery ,[SPI.MECA.GEME] Engineering Sciences [physics]/Mechanics [physics.med-ph]/Mechanical engineering [physics.class-ph] ,wavelet-based multiresolution analysis ,021101 geological & geomatics engineering ,0105 earth and related environmental sciences ,[SPI.ACOU]Engineering Sciences [physics]/Acoustics [physics.class-ph] ,[SPI.ACOU] Engineering Sciences [physics]/Acoustics [physics.class-ph] ,Artificial neural network ,Structural engineering (General) ,business.industry ,Mechanical Engineering ,Deep learning ,Ultrasonic testing ,deep learning ,Pattern recognition ,non-destructive ultrasonic testing ,[SPI.MECA.GEME]Engineering Sciences [physics]/Mechanics [physics.med-ph]/Mechanical engineering [physics.class-ph] ,[SPI.GCIV]Engineering Sciences [physics]/Civil Engineering ,Mechanics of Materials ,Pattern recognition (psychology) ,[SPI.GCIV] Engineering Sciences [physics]/Civil Engineering ,concrete ,Artificial intelligence ,business - Abstract
International audience; This paper proposes an efficient methodology to monitor the formation of cracks in concrete after non-destructive ultrasonic testing of a structure. The objective is to be able to automatically detect the initiation of cracks early enough, i.e. well before they are visible on the concrete surface, in order to implement adequate maintenance actions on civil engineering structures. The key element of this original approach is the wavelet-based multiresolution analysis of the ultrasonic signal received from a sample or a specimen of the studied material subjected to several types of solicitation. This analysis is finally coupled to an automatic identification scheme of the types of cracks based on artificial neural networks (ANNs), and in particular deep learning by convolutional neural networks (CNNs); a technology today at the cutting edge of machine learning, in particular for all applications of pattern recognition. Wavelet-based multiresolution analysis does not add any value in detecting fractures in concrete visible by optical inspection. However, the results of its implementation coupled with different CNN architectures show cracks in concrete can be identified at an early stage with a very high accuracy, i.e. around 98%, and a loss function of less than 0.1, regardless of the implemented learning architecture.
- Published
- 2021
33. Development of a Front Identification Scheme for Compiling a Cold Front Climatology of the Mediterranean
- Author
-
E. Bitsa, H. Flocas, J. Kouroutzoglou, M. Hatzaki, I. Rudeva, and I. Simmonds
- Subjects
cold fronts ,climatology ,mediterranean ,identification scheme ,frontal tracking scheme (fts) ,medfts ,Science - Abstract
The objective of this work is the development of an automated and objective identification scheme of cold fronts in order to produce a comprehensive climatology of Mediterranean cold fronts. The scheme is a modified version of The University of Melbourne Frontal Tracking Scheme (FTS), to take into account the particular characteristics of the Mediterranean fronts. We refer to this new scheme as MedFTS. Sensitivity tests were performed with a number of cold fronts in the Mediterranean using different threshold values of wind-related criteria in order to identify the optimum scheme configuration. This configuration was then applied to a 10-year period, and its skill was assessed against synoptic surface charts using statistic metrics. It was found that the scheme performs well with the dynamic criteria employed and can be successfully applied to cold front identification in the Mediterranean.
- Published
- 2019
- Full Text
- View/download PDF
34. An Improved Threshold Ring Signature Scheme Based on Error Correcting Codes
- Author
-
Cayrel, Pierre-Louis, El Yousfi Alaoui, Sidi Mohamed, Hoffmann, Gerhrad, Véron, Pascal, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Özbudak, Ferruh, editor, and Rodríguez-Henríquez, Francisco, editor
- Published
- 2012
- Full Text
- View/download PDF
35. Blind Identification of LDPC Codes Based on a Candidate Set
- Author
-
Huang Zhiping, Zhou Jing, and Li Longqing
- Subjects
Set (abstract data type) ,Identification (information) ,Identification scheme ,Basis (linear algebra) ,Computer science ,Modeling and Simulation ,False alarm ,Electrical and Electronic Engineering ,Low-density parity-check code ,Communications system ,Algorithm ,Computer Science Applications ,Parity bit - Abstract
Modern communication systems tend to use different channel codes to find a balance between communication speed and quality. Accordingly, the blind identification techniques of encoders have drawn much research interest. In this letter, we propose a blind identification scheme for the Low-Density Parity Check (LDPC) coded communication systems based on a known candidate set. The proposed scheme can adaptively adjust the length of the received sequence to approach an arbitrary probability of missed detection and false alarm for codes in the candidate set, where the latter probability has received little attention by the existing methods. On this basis, the proposed scheme can determine whether there are unknown codes in the received vector, which is useful in practical applications. The performance of the proposed scheme is investigated using system simulations.
- Published
- 2021
36. Efficient fault identification scheme of compensated transmission grid based on correlated reactive power measurements and discrete wavelet transform
- Author
-
Ragab A. El-Sehiemy, Ghada M. Amer, and Mohamed I. Zaki
- Subjects
Discrete wavelet transform ,Identification scheme ,Transmission (telecommunications) ,Computer science ,Electronic engineering ,AC power ,Fault (power engineering) ,Grid based - Abstract
The early fault identification in high-voltage power systems is a substantial aspect not only to minimize equipment failure but also to increase both the reliability and stability in power system. Subsequently, the aim of this paper is to propose the adaptive fault-identification scheme based on multi-resolution analysis technique. The proposed method is dependent on monitoring both voltages and currents from single-ended measuring system. The correlation among the reactive power computation and discrete wavelet transform is used to generate the significant criteria which are used to discriminate between short-circuit currents and energizing heavy loads behaviour. Different transmission network configurations are investigated to assess the dependability, security, and reliability of fault identification relay as well. The correlative protection scheme attains the accurate results under healthy disturbances, and therefore it is superior to other conventional approaches. In addition, a selective study is applied to different mother wavelets to find the best one. The response of the proposed scheme to the compensated transmission line is also verified at a wide range of compensation levels with faults before and after compensated bank. Simulation tests have been handled via ATP-EMTP to investigate the proper practicability and adaptability of the fault-identication relay.
- Published
- 2021
37. Public-Key Identification Schemes Based on Multivariate Quadratic Polynomials
- Author
-
Sakumoto, Koichi, Shirai, Taizo, Hiwatari, Harunaga, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Rogaway, Phillip, editor
- Published
- 2011
- Full Text
- View/download PDF
38. Identification Schemes from Key Encapsulation Mechanisms
- Author
-
Anada, Hiroaki, Arita, Seiko, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Nitaj, Abderrahmane, editor, and Pointcheval, David, editor
- Published
- 2011
- Full Text
- View/download PDF
39. Identification Schemes of Proofs of Ability Secure against Concurrent Man-in-the-Middle Attacks
- Author
-
Anada, Hiroaki, Arita, Seiko, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Heng, Swee-Huay, editor, and Kurosawa, Kaoru, editor
- Published
- 2010
- Full Text
- View/download PDF
40. Improved Zero-Knowledge Identification with Lattices
- Author
-
Cayrel, Pierre-Louis, Lindner, Richard, Rückert, Markus, Silva, Rosemberg, Hutchison, David, Series editor, Kanade, Takeo, Series editor, Kittler, Josef, Series editor, Kleinberg, Jon M., Series editor, Mattern, Friedemann, Series editor, Mitchell, John C., Series editor, Naor, Moni, Series editor, Nierstrasz, Oscar, Series editor, Pandu Rangan, C., Series editor, Steffen, Bernhard, Series editor, Sudan, Madhu, Series editor, Terzopoulos, Demetri, Series editor, Tygar, Doug, Series editor, Vardi, Moshe Y., Series editor, Weikum, Gerhard, Series editor, Heng, Swee-Huay, editor, and Kurosawa, Kaoru, editor
- Published
- 2010
- Full Text
- View/download PDF
41. A Lattice-Based Threshold Ring Signature Scheme
- Author
-
Cayrel, Pierre-Louis, Lindner, Richard, Rückert, Markus, Silva, Rosemberg, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Abdalla, Michel, editor, and Barreto, Paulo S. L. M., editor
- Published
- 2010
- Full Text
- View/download PDF
42. Improving Efficiency of an ‘On the Fly’ Identification Scheme by Perfecting Zero-Knowledgeness
- Author
-
Santoso, Bagus, Ohta, Kazuo, Sakiyama, Kazuo, Hanaoka, Goichiro, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, and Pieprzyk, Josef, editor
- Published
- 2010
- Full Text
- View/download PDF
43. Hierarchical Identity-Based Identification Schemes
- Author
-
Chin, Ji-Jian, Heng, Swee-Huay, Goi, Bok-Min, Ślęzak, Dominik, editor, Kim, Tai-hoon, editor, Fang, Wai-Chi, editor, and Arnett, Kirk P., editor
- Published
- 2009
- Full Text
- View/download PDF
44. Identity-Based Identification Scheme Secure against Concurrent-Reset Attacks without Random Oracles
- Author
-
Thorncharoensri, Pairat, Susilo, Willy, Mu, Yi, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Youm, Heung Youl, editor, and Yung, Moti, editor
- Published
- 2009
- Full Text
- View/download PDF
45. An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model
- Author
-
Chin, Ji-Jian, Heng, Swee-Huay, Goi, Bok-Min, Hutchison, David, editor, Kanade, Takeo, editor, Kittler, Josef, editor, Kleinberg, Jon M., editor, Mattern, Friedemann, editor, Mitchell, John C., editor, Naor, Moni, editor, Nierstrasz, Oscar, editor, Pandu Rangan, C., editor, Steffen, Bernhard, editor, Sudan, Madhu, editor, Terzopoulos, Demetri, editor, Tygar, Doug, editor, Vardi, Moshe Y., editor, Weikum, Gerhard, editor, Mjølsnes, Stig F., editor, Mauw, Sjouke, editor, and Katsikas, Sokratis K., editor
- Published
- 2008
- Full Text
- View/download PDF
46. Hypothesis Testing and Identification Systems
- Author
-
Mikael Skoglund, Tobias J. Oechtering, and Minh Thanh Vu
- Subjects
Theoretical computer science ,Identification scheme ,Computer science ,Testing ,Information science ,02 engineering and technology ,identification systems ,Library and Information Sciences ,Type (model theory) ,information-spectrum method ,Databases ,Compression (functional analysis) ,Converse ,0202 electrical engineering, electronic engineering, information engineering ,Equivalence relation ,constructive transformation ,Statistical hypothesis testing ,Sequence ,020206 networking & telecommunications ,Transforms ,Computer Science Applications ,Telekommunikation ,Capacity planning ,Identification (information) ,Mixture distribution ,soft-covering ,Task analysis ,Telecommunications ,Error probability ,strong converse ,excess relative information ,Information Systems - Abstract
We study hypothesis testing problems with fixed compression mappings and with user-dependent compression mappings to decide whether or not an observation sequence is related to one of the users in a database, which contains compressed versions of previously enrolled users' data. We first provide the optimal characterization of the exponent of the probability of the second type of error for the fixed compression mappings scenario when the number of users in the database grows exponentially. We then establish operational equivalence relations between the Wyner-Ahlswede-Korner network, the single-user hypothesis testing problem, the multi-user hypothesis testing problem with user-dependent compression mappings and the identification systems with user-dependent compression mappings. These equivalence relations imply the strong converse and exponentially strong converse for the multi-user hypothesis testing and the identification systems both with user-dependent compression mappings. Finally they also show how an identification scheme can be turned into a multi-user hypothesis testing scheme with an explicit transfer of rate and error probability conditions and vice versa. QC 20210621
- Published
- 2021
47. A Novel Identification Scheme of Lightning Disturbance in HVDC Transmission Lines Based on CEEMD-HHT
- Author
-
Fan Xie, Dongmeng Ye, and Zhiguo Hao
- Subjects
Identification scheme ,Computer science ,Geology ,Ocean Engineering ,Transmission system ,Fault (power engineering) ,Transient voltage suppressor ,Signal ,Lightning ,Hilbert–Huang transform ,Electric power transmission ,Control theory ,Energy (signal processing) ,Water Science and Technology ,Voltage - Abstract
For high-voltage direct current (HVDC) transmission systems that use overhead transmission lines, the lightning disturbance is the main reason for the line protection mal-operation. To avoid the impact of lightning disturbance on the safety and stability of DC line protection, the model of HVDC transmission system including lightning strokes is constructed. On this basis, the complementary ensemble empirical mode decomposition (CEEMD) and Hilbert transform are combined as a time-frequency analysis method to calculate the energy distribution of the signals. Then the low-to-high-frequency energy ratio of the 1-mode voltage signal in a 3 ms data window after the protection startup is used as the protection criterion for identifying lightning disturbance, and that of the current signal in 1 ms is used as the criterion to further distinguish lightning and non-lightning faults. Verified through simulation tests, the scheme appears good adaptability and accuracy in different situations.
- Published
- 2021
48. Fast protection strategy for DC transmission lines of MMC-based MT-HVDC grid
- Author
-
Sihua Wang, Yu Wang, Lijun Zhou, Tian Wang, and Tianyu Chen
- Subjects
Inductance ,Identification scheme ,Electric power transmission ,Control and Systems Engineering ,Computer science ,Electronic engineering ,Energy Engineering and Power Technology ,High voltage ,Transmission system ,Electrical and Electronic Engineering ,Fault (power engineering) ,Grid ,Energy source - Abstract
Multi-terminal high voltage DC (MT-HVDC) grid has broad application prospects in connecting different energy sources, asynchronous interconnection of power grids, remote load power supply, and other fields. At present, the key technologies that affect the development of MT-HVDC transmission system include swift fault identification and location in the DC line and its rapid isolation. Traditional fault monitoring relies on line communication, which cannot guarantee the rapidity and reliability of protection; moreover, it may even cause device damage. A fault identification scheme based on a single-terminal transient is presented in this paper. This scheme calculates the line inductance by using the rise rate of fault current at the initial stage of the fault, and determines the occurrence of the fault by comparing the observed line inductance with the set value, which lays a foundation for calculating the location of the fault point using distance protection. A simulation model on the PSCAD/EMTDC platform is built; the simulation example verifies that the proposed scheme can identify faults under dissimilar conditions while maintaining a low error level on the premise of no communication lines so as to meet the protection requirements of the MT-HVDC grid.
- Published
- 2021
49. A Mediterranean cold front identification scheme combining wind and thermal criteria
- Author
-
Maria Hatzaki, George P. Latsas, Ian Simmonds, J. Kouroutzoglou, George Galanis, Irina Rudeva, Helena A. Flocas, and E. Bitsa
- Subjects
Mediterranean climate ,Atmospheric Science ,Cold front ,Identification scheme ,Climatology ,Thermal ,Geology - Published
- 2021
50. A Novel Approach for QoS Enhancement with Revision Scheme Using SeDSR Protocol in Wireless Sensor Networks
- Author
-
J. T. Thirukrishna, Balaganesh Duraisamy, and Senthil Kumar Swami Durai
- Subjects
Identification scheme ,Network packet ,Computer science ,business.industry ,Routing table ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,End-to-end delay ,Packet forwarding ,020206 networking & telecommunications ,02 engineering and technology ,Computer Science Applications ,Packet loss ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Cache ,Electrical and Electronic Engineering ,business ,Wireless sensor network ,Computer network - Abstract
Wireless Sensor Networks (WSNs) is an emerging technology that pays more attention to the monitoring and acquiring of data in a deployed environment. Sensor networks often perform end to end transmission, so strong requirements should be defined to avoid data loss. The strong requirements may be precisely defined in terms of Quality of Service (QoS). The data transmission resumed, and the routing mechanism performed a vital role to forward the packets. The route path cache requires a crucial responsibility for on-demand routing standards that enhance the Quality of Service. The path identification stage is employed in the on-demand routing standard. The path identification scheme defines the path cache policies that are employed to move packet forwarding in an efficient manner. Therefore, the intention is to design a fresh scheme for path cache revisions. In a traditional scheme, nodes are little aware of path faults and they are engaged in the routing by revising their routing table. While SeDSR, based on the scattered cache substitution scheme, the source node relays the path fault data of the size of 50 bytes to all their adjacencies. Therefore, all the adjacency substitutes the stale path in their cache. The designed scheme enhances the performance employing diverse QoS metrics such as Packet loss, energy utilization, packet delivery and End to End delay.
- Published
- 2021
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.