排序方式: 共有28条查询结果,搜索用时 0 毫秒
1.
The need for acquiring the current-year traffic data is a problem for transport planners since such data may not be available
for on-going transport studies. A method is proposed in this paper to predict hourly traffic flows up to and into the near
future, using historical data collected from the Hong Kong Annual Traffic Census (ATC). Two parametric and two non-parametric
models have been employed and evaluated in this study. The results show that the non-parametric models (Non-Parametric Regression
(NPR) and Gaussian Maximum Likelihood (GML)) were more promising for predicting hourly traffic flows at the selected ATC station.
Further analysis encompassing 87 ATC stations revealed that the NPR is likely to react to unexpected changes more effectively
than the GML method, while the GML model performs better under steady traffic flows. Taking into consideration the dynamic
nature of the common traffic patterns in Hong Kong and the advantages/disadvantages of the various models, the NPR model is
recommended for predicting the hourly traffic flows in that region. 相似文献
2.
数字签名用来保证原始数据完整性和有效性,一个数字签名方案包括数字签名生成算法和数字签名验证算法.简短地介绍了盲签名、代理签名的基本思想和基本性质,并给出如何通过非对称密码算法的思想来实现这些签名方案,提出并详细介绍了一种基于离散对数问题的有存根的(免责声明)代理盲签名方案,讨论了基于离散对数问题的密码学算法的可能攻击方法,在此基础上给出了协议实现时的一些有益的建议. 相似文献
3.
讨论了分布式多层应用体系的结构、特点及实现技术,介绍了分布式PowerBuilder结构,并详细说明了如何用PowerBuilder7.0具体地实现多层结构应用系统. 相似文献
4.
铁路计算机网络安全系统基于"应用分区、网络分层、安全分级"的思想,实现铁路计算机网络基础设施、网络边界和局域网环境的安全保障.介绍构成铁路计算机网络安全系统平台的铁路行业数字证书认证、统一用户管理和资源管理、访问控制、病毒防护和应用系统的安全服务5个子系统及其应用,并结合铁路信息化发展提出进一步建设铁路计算机网络安全保障体系的构想. 相似文献
5.
An Efficient Provable Secure ID-Based Proxy Signature Scheme Based on CDH Assumption 总被引:1,自引:0,他引:1
IntroductionMambo, et al.[1]first introduced the conceptof proxy signature. In their scheme, an originalsigner delegates his signing right to a proxy signerin such a way that the proxy signer can sign anymessage on behalf of the original signer and theverifier can verify and distinguish proxy signaturefrom original signature. Proxy signature is of greatuse in such a case that a manager needs to autho-rize his secretary to sign documents on behalf ofhimself before his leaving for a vacation. Du… 相似文献
6.
7.
Proxy signature has drawn great concerns.However, there still remains a challenge to construct a provably secure and effcient proxy signature scheme.In this paper, we propose an effcient proxy signature scheme based on factoring, and prove that it is secure in the random oracle.Furthermore, we present a new type of proxy signature, called Proxy Signature with Untrustworthy Proxy Signer, and construct a concrete scheme. 相似文献
8.
一种基于离散对数的群代理多重签名方案 总被引:5,自引:0,他引:5
在代理签名方案中,代理签名人可代理原始签名人生成签名。然而在已知的代理签名方案中,要么是一个原始签名人授权于一人,要么是一个原始签名人授权于多人,要么是多个原始签名人授权于一人。本文在门限多重代理签名以及代理多重签名的基础上,设计了一种群代理多重签名方案。在这种方案中,多个原始签名人授权于多个代理签名人,只有多个代理人合作才可以代表多个原始签名人生成签名。 相似文献
9.
针对已有的门限代理签名方案不能有效地抵抗签名人协作攻击和伪造攻击,以及在某些场合实用性不强的缺点提出了改进方案.在代理签名生成阶段要求每个实际签名人提供自己的私钥信息,在形成的代理签名中不仅包含每个代理签名人的秘密信息,还包含了每个实际签名人的秘密信息,从而能有效抵抗协作攻击和伪造攻击.另外,用椭圆曲线密码机制替换了已有的方案中用的ElGamal离散对数密钥机制,使系统效率更高. 相似文献
10.
Within the transportation research literature, the attempt to understand and predict the level of car ownership is probably one of the most popular areas of study. The primary reason for this is understandable, having access to a vehicle increases an individual’s (or their household’s) travel options, leading to greater mobility. Secondary reasons for this scrutiny include the need to predict future transport investment in road infrastructure and the commercial demand for new vehicles. This paper attempts to predict the level of household car ownership as a function of the characteristics of the household and the individuals that make up the household. The primary data source for this study comes from the 2001 United Kingdom Census and the analysis methods used are from the discipline of data mining. The results of this study are in line with those from previous research but show a potential to predict the higher levels of household car ownership with greater accuracy than other similar studies. 相似文献