-
Theoretical Re-Study on One-Way Barcode Communication Between Networks and Its Application Prospects
Issue:
Volume 3, Issue 2, June 2018
Pages:
19-25
Received:
28 June 2018
Accepted:
19 July 2018
Published:
16 August 2018
Abstract: Information communication between networks is greatly growing, and its security becomes more important. In this article, a new way of network security communication, namely bar code communication was investigated. It used the general principle of the computer to quantify the information and generate the barcode instantly, and it was showed by using the micro-display. Then the micro-camera is used to identify the barcode on the display to restore the original information in the optical principle. Faster and more efficient communication technologies, such as the principle of macro wireless communication technology, can receive complete information to achieve the purpose of information transmission. The bar code information communication method was one-way and irreversible, and it was safe and can ensure communication security between networks. It is the fourth communication method different from wired, wireless and medium modes: one-way bar code communication mode (referred to as “one-way communication”).
Abstract: Information communication between networks is greatly growing, and its security becomes more important. In this article, a new way of network security communication, namely bar code communication was investigated. It used the general principle of the computer to quantify the information and generate the barcode instantly, and it was showed by using...
Show More
-
An Exploration to Edition Identification of Ancient Chinese Maps
Issue:
Volume 3, Issue 2, June 2018
Pages:
26-32
Received:
5 June 2018
Accepted:
25 July 2018
Published:
18 August 2018
Abstract: Among the Chinese ancient resources collections, map is one remarkable kind of it. How to identify the edition of the maps has become the important work of the collation. Based on the Compilation Program of “Ancient Chinese Maps Collected in Peking University Library”, this article analyzes a large number of ancient Chinese maps, and summarizes four valuable methods of map edition identification. First, taboo clues can be taken as the guidance for identifying the edition year of ancient Chinese maps; Second, the toponymic evolution information is obviously an important analysis point in the textual research of editions; Third, edition identification through background investigation, such as background associated with map compilation history or thematic maps, even including divergent associated background investigation; Fourth, relevant important archives could also play a key role in the identification of edition year. In the conclusion, the author emphasizes that comprehensive clues shall be applied in an overall analysis and research for editions of ancient Chinese maps in actual collation work. It also showed that the textual research on maps highlights its own peculiarity while sharing some same features as that of ancient Chinese books. This work requires accumulated practical experience during the actual work, as well as constant learning to increase comprehensive knowledge.
Abstract: Among the Chinese ancient resources collections, map is one remarkable kind of it. How to identify the edition of the maps has become the important work of the collation. Based on the Compilation Program of “Ancient Chinese Maps Collected in Peking University Library”, this article analyzes a large number of ancient Chinese maps, and summarizes fou...
Show More
-
3D Firework Reconstruction from a Given Videos
Issue:
Volume 3, Issue 2, June 2018
Pages:
33-41
Received:
16 September 2018
Published:
18 September 2018
Abstract: Reconstruction of a 3-dimension(3D) firework show from a given videos is a key technology in light source simulation in computer graphics, which can be more effective and real than traditional method. Although the firework model is already very mature, however, to our best knowledge, there is not any existing method that can reconstruct a firework show from a given video. And due to the lack of camera arguments and depth message, reconstruction is very challenging. In this paper, a method is proposed to solve the problem. A rendering model which requires some parameters which describe the color and position information of firework as input and generates a 3D firework show as output is constructed, and then the problem becomes getting the parameters needed for the rendering model from the given video. The parameters are divided into two groups according to the relevance, and then different neural networks including 3D Convolution Neural Network (3D-CNN) and Recurrent Neural Network(RNN) are designed respectively to extract these parameters needed by our rendering model from a given video. It is found to be practicable and effective to reconstruct a 3D firework from a given video by testing this work with some firework videos in various perspective.
Abstract: Reconstruction of a 3-dimension(3D) firework show from a given videos is a key technology in light source simulation in computer graphics, which can be more effective and real than traditional method. Although the firework model is already very mature, however, to our best knowledge, there is not any existing method that can reconstruct a firework ...
Show More
-
Example Based Light Sources Generation Method for 3D Scenes
Issue:
Volume 3, Issue 2, June 2018
Pages:
42-49
Received:
16 September 2018
Published:
18 September 2018
Abstract: Lighting design is very important to improve rendering quality for some 3D scenes that are used in the VR applications with night simulation. Determining the properties of the light sources requires a large amount of artwork, especially when the number of lights is large. Most virtual scenes always have some geometric objects with similar structures and shapes. Based on this observation, this paper proposes an example based light source generation method by using local geometric similarity. An example model decorated with light source and a target model are input to this method. First this paper segments both model into parts with SDF segmentation algorithm, and find matched parts between the example model to the target. Then two methods are applied to transfer the light sources decorated on the parts of the example model to the corresponding parts of the target model. Minimum spanning tree based light transfer method is used to generated light sources for target parts with the same pattern as lights layout on its corresponding parts from the example model. While texture synthesis based method tiles the light texture generated from the example parts on the surface of the target parts. At last, the position and colors of the light sources are refined. The results demonstrated that this method can quickly and effectively edit light sources for large-scale scenes, reduce the amount of art work and achieve good visual effects.
Abstract: Lighting design is very important to improve rendering quality for some 3D scenes that are used in the VR applications with night simulation. Determining the properties of the light sources requires a large amount of artwork, especially when the number of lights is large. Most virtual scenes always have some geometric objects with similar structure...
Show More
-
Fully Homomorphic Public-Key Encryption Against Ciphertext Square Attack with Two Ciphertexts
Issue:
Volume 3, Issue 2, June 2018
Pages:
50-65
Received:
12 July 2018
Accepted:
4 September 2018
Published:
8 October 2018
Abstract: A fully homomorphic public-key encryption (FHPKE) is the important cryptosystem as the basic scheme for the cloud computing. Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, some fully homomorphic encryption schemes were proposed. In the systems proposed until now the bootstrapping process is the main bottleneck and the large complexity for computing the ciphertext is required. The existence of an efficient fully homomorphic cryptosystem would have great practical implications in the outsourcing of private computations, for instance, in the context of cloud computing. In recent year Yagisawa proposed fully homomorphic encryptions without bootstrapping which have the weak point in the enciphering function or not immune from “ciphertext square attack” which is the attack proposed in this article. In this article, a new FHPKE against “ciphertext square attack” is proposed which does not need the bootstrapping and does not require the large complexity for enciphering. The scheme has the following features; (a) its security bases on computational difficulty to solve the multivariate algebraic equations of high degrees; (b) it requires two ciphertexts corresponding to a plaintext. We describe concretely how to construct the proposed system over octonion ring. It is shown that proposed system is immune from “ciphertext square attack”, “m and -m attack” and the Gröbner basis attacks and the complexity to encipher and decipher is not large.
Abstract: A fully homomorphic public-key encryption (FHPKE) is the important cryptosystem as the basic scheme for the cloud computing. Since Gentry discovered in 2009 the first fully homomorphic encryption scheme, some fully homomorphic encryption schemes were proposed. In the systems proposed until now the bootstrapping process is the main bottleneck and th...
Show More
-
Research on Scheduling Strategy of AFDX End System Based on Time/Event Trigger
Ziran Shen,
Leilei Yin,
Yi Li,
Yuanyuan Xu
Issue:
Volume 3, Issue 2, June 2018
Pages:
66-74
Received:
17 October 2018
Published:
18 October 2018
Abstract: To meet different time delay requirements of different data, three scheduling strategies based on event, time and event-time are studied in this paper. The network calculus method is used to derive the maximum delay upper bound of virtual link based on three scheduling strategies, the relationship between the maximum delay upper, virtual link parameters, time scheduleparameters and the frame length is compared, the difference between the alternate scheduling strategy and the Time-Triggered or event-triggered scheduling is studied. The AFDX (Avionics Full-Duplex Switched Ethernet) virtual network model is established toverifythetheory based on OPNET, thedeterminist of theTime-Triggered link, the maximum delay of the event-triggered link and the efficiency of the end system transmission are compared under different scheduling strategies. Also, the applicable occasions of different scheduling strategies are studied. The results show that the event and time alternate scheduling strategy not only ensures the certainty of Time-Triggered link transmission, but also reduces the event triggering. The maximum delay upper bound of the link effectively improves the data processing capability and transmission efficiency, ensures the stability and certainty of the periodic signal transmission, and is suitable for the aviation bus system with different kinds of data with different delay requirements.
Abstract: To meet different time delay requirements of different data, three scheduling strategies based on event, time and event-time are studied in this paper. The network calculus method is used to derive the maximum delay upper bound of virtual link based on three scheduling strategies, the relationship between the maximum delay upper, virtual link param...
Show More