期刊文献+
共找到3篇文章
< 1 >
每页显示 20 50 100
基于DBN图像识别的机房巡检系统设计研究 被引量:3
1
作者 刘明峰 刘孙俊 +2 位作者 郭顺森 李祥新 吴珺 《测控技术》 CSCD 2018年第11期45-49,共5页
针对电力系统信息化问题提出了一套智能化机房巡检系统,硬件结构包括轨道车装置、云台及工业相机等,软件系统基于Windows平台进行开发,采用B/S三层架构。鉴于服务器信号灯本身较小并发光,且在一幅图像中往往分布有多个多种状态的信号灯... 针对电力系统信息化问题提出了一套智能化机房巡检系统,硬件结构包括轨道车装置、云台及工业相机等,软件系统基于Windows平台进行开发,采用B/S三层架构。鉴于服务器信号灯本身较小并发光,且在一幅图像中往往分布有多个多种状态的信号灯等问题,给出了一种新的更加有效的信号灯图像特征——RGB极大比值(RGBMR)的提取算法。运用深度置信网络(DBN)对信号灯图像进行评估识别,RGBMR特征数据的一部分用于DBN模型的训练,另一部分则用于测试。大量的实验分析,以及与图像HSV空间特征和BPNN网络识别效果的对比研究证明,所提算法能更准确地识别信号灯状态图像,该系统能有效地应用于机房巡检中。 展开更多
关键词 机房巡检系统 服务器信号灯识别 RGB极大比值 无监督训练 深度置信网络
在线阅读 下载PDF
SECURITY ANALYSIS AND IMPROVEMENT OF A NEW THRESHOLD MULTI-PROXY MULTI-SIGNATURE SCHEME 被引量:2
2
作者 Lu Rongbo He Dake Wang Chanji 《Journal of Electronics(China)》 2008年第3期372-377,共6页
Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. How... Kang, et al. [Journal of Electronics(China), 23(2006)4] proposed a threshold multi-proxy multi-signature scheme, and claimed the scheme satisfies the security requirements of threshold multi-proxy multi-signature. However, in this paper, two forgery attacks are proposed to show that their schemes have serious security flaws. To overcome theses flaws, an improvement on Kang, et al.’s scheme is proposed. 展开更多
关键词 Proxy signature Threshold proxy signature Multi-proxy multi-signature Forgery attack
在线阅读 下载PDF
A SECURE PROXY SIGNATURE SCHEME BASED ON ELLIPTIC CURVE CRYPTOSYSTEM
3
作者 Hu Bin Jin Chenhui 《Journal of Electronics(China)》 2006年第1期54-57,共4页
Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy sign... Proxy signature is a special digital signature which enables a proxy signer to sign messages on behalf of the original signer. This paper proposes a strongly secure proxy signature scheme and a secure multi-proxy signature scheme based on elliptic curve cryptosystem. Contrast with universal proxy signature schemes, they are secure against key substitute attack even if there is not a certificate authority in the system, and also secure against the original signer's forgery attack. Furtherlnore, based on the elliptic curve cryptosystem, they are more efficient and have smaller key size than other system. They can be used in electronics transaction and mobile agent environment. 展开更多
关键词 Digital signature Proxy signature Multi-proxy signature Elliptic curve cryptosystem
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部