Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Configuration tool design based on control-oriented multi-core real-time operating system
JIANG Jianchun, CHEN Huiling, DENG Lu, ZHAO Jianpeng
Journal of Computer Applications    2016, 36 (3): 765-769.   DOI: 10.11772/j.issn.1001-9081.2016.03.765
Abstract470)      PDF (747KB)(339)       Save
With respect to single-core operating system, multi-core real-time operating system is more functional and complicated. Aiming at the problem that multi-core operating system is difficult for configuration, tailoring and transplantation, a new configuration tool for the application of multi-core real-time operating system, which can improve the application development efficiency of multi-core real-time operating system and reduce the error rate was proposed. First, based on a multi-core real-time operating system named CMOS (Control-oriented Multi-core Operating System), which was independently developed by Chongqing University of Posts and Telecommunications, the configuration tool was hierarchically designed. According to the demand of CMOS, a visualized configuration tool was designed to finish interface generation engine and automatical code generation. Afterwards, in order to ensure the correctness of the configuration logic, configuration correlation detection was proposed. The simulation results show that the CMOS configuration tool is suitable for CMOS operating system because of the short processing time for code generation and low error rate. Compared with the method of troubleshooting by developers manually, correlation detection accelerates the speed of troubleshooting with quickly locating the error code and ensure the generation correctness of configuration file. Thus the configuration tool can promote the application of CMOS multi-core operating system.
Reference | Related Articles | Metrics
Provably secure undeniable signature scheme based on identity
WANG Xiong, DENG Lunzhi
Journal of Computer Applications    2016, 36 (10): 2738-2741.   DOI: 10.11772/j.issn.1001-9081.2016.10.2738
Abstract441)      PDF (749KB)(429)       Save
Concerning the low efficiency of identity-based undeniable signature schemes, a new identity-based undeniable signature scheme was proposed. Under the assumption that it is hard to solve the Computational Bilinear Diffie-Hellman (CBDH) problem and the Decisional Bilinear Diffie-Hellman (DBDH) problem, the proposed scheme was proven to be unforgeable and invisible in the random oracle model, and it reduced the number of bilinear pairing operations. Analysis shows that the proposed scheme is more efficient than undeniable signature schemes proposed by Libert, Duan and Behnia, and it is more suitable for the computation-constrained environment.
Reference | Related Articles | Metrics
Face recognition method based on relative gradient
Hong-zhi GAO Kun DENG Lu YAO Yun-long ZHAO
Journal of Computer Applications    2009, 29 (11): 3037-3039.  
Abstract1773)      PDF (794KB)(1139)       Save
Based on the original relative gradient operator, the authors proposed a new relative gradient operator and combined it with 2DPCA or 2DFLD. A face recognition algorithm based on this new relative gradient operator was also put forward. Experimental results on AR and Yale_B face database show that, the method has robustness to the complex change like various expression and lighting condition. The recognition accuracy of the method is much higher than 2DPCA, 2DFLD and face recognition based on the original relative gradient operator. What is more, experiments were done on three different sizes of windows, which confirms that, when the window size is 3×3, the recognition result is relatively the best.
Related Articles | Metrics