5,478 Hits in 2.9 sec

Fast and Fuzzy Private Set Intersection [article]

Nicholas Kersting
2014 arXiv   pre-print
Private Set Intersection (PSI) is usually implemented as a sequence of encryption rounds between pairs of users, whereas the present work implements PSI in a simpler fashion: each set only needs to be  ...  This is typically orders of magnitude faster than ordinary PSI at the cost of some "fuzziness" in the matching, which may nonetheless be tolerable or even desirable.  ...  Use Cases for Fast PSI Private Set Intersection techniques promise to enjoy a large number of potential applications, but these are made more feasible by a fast protocol such as the one proposed.  ... 
arXiv:1405.3272v2 fatcat:urxgckegcvac5nywvp7uoegoxi

A privacy-preserving fuzzy interest matching protocol for friends finding in social networks

Xu An Wang, Fatos Xhafa, Xiaoshuang Luo, Shuaiwei Zhang, Yong Ding
2017 Soft Computing - A Fusion of Foundations, Methodologies and Applications  
of Cryptography and Information Security (No GCIS201610).  ...  Acknowledgements This work is supported by the National Natural Science Foundation of China (6127249261572521), the Natural Science Foundation of Shaanxi Province(2014JM8300) and Guangxi Key Laboratory  ...  Therefore, this protocol is very efficient and can support large scale data sets. Conclusion This paper presented two fuzzy matching protocols based on Private Set Intersection protocol.  ... 
doi:10.1007/s00500-017-2506-x fatcat:l5pwtfbmobgoxhqz7lbznajbq4

Traffic Control Prediction Design Based on Fuzzy Logic and Lyapunov Approaches to Improve the Performance of Road Intersection

Sadiqa Jafari, Zeinab Shahbazi, Yung-Cheol Byun
2021 Processes  
Due to the increasing use of private cars for urbanization and urban transport, the travel time of urban transportation is increasing.  ...  The state-space dynamics are utilized to formulate both the vehicle's average waiting time at an isolated intersection and the length of queues.  ...  Fuzzy mathematics includes fuzzy sets and related mathematical operations.  ... 
doi:10.3390/pr9122205 fatcat:m6ies7chbjginpyyike4o7e2ue

Special issue: Security and Cryptography for Networks – SCN 2020

Clemente Galdi, Vladimir Kolesnikov
2022 Journal of Computer Security  
The paper Private Identity Agreement for Private Set Functionalities by Benjamin Terner, Benjamin Kreuter and Sarvar Patel explores an interesting twist on private set intersection.  ...  In Fast Threshold ECDSA with Honest Majority, Ivan Damgård, Thomas P.  ... 
doi:10.3233/jcs-219000 fatcat:4ardxnetmvb4lgbzghf3pxw3nm

New Fuzzy Bus Signal Priority Control System Design Based on Wireless Sensor Networks

Yang Wang
2014 Open Automation and Control Systems Journal  
And this algorithm can reduce average vehicle delay at intersection, and realize the optimal control balance between bus priority and other vehicles.  ...  Taking into consideration that TSP maybe interfere other vehicles when giving the priority to public transport vehicles, this paper puts forward a fuzzy control algorithm which decides what kinds of traffic  ...  Therefore the bus signal priority control of BRT in intersection is most important for realization of fast, punctual and reliable BRT.  ... 
doi:10.2174/1874444301406011312 fatcat:rtmev2pbkfdlln3bhw2ek4zeku

Vehicle Classification Based on Multiple Fuzzy C-Means Clustering Using Dimensions and Speed Features

Saleh Javadi, Muhammad Rameez, Mattias Dahl, Mats I. Pettersson
2018 Procedia Computer Science  
In addition, it is fast and efficient for big data analysis.  ...  In addition, it is fast and efficient for big data analysis. Abstract Vehicle classification has a significant use in traffic surveillance and management.  ...  Each linguistic term is associated with a fuzzy set over the theoretical interval [0,100] and the membership functions are defined as µ L 1 (z) to µ L 5 (z) as suggested in [11, 12] (see Fig. 1 ).  ... 
doi:10.1016/j.procs.2018.08.085 fatcat:a25vehdphnahfnnmyzofqmnbji


Maria Tymoshenko, Kristina Marintseva
2017 Vìsnik Nacìonalʹnogo Avìacìjnogo Unìversitetu  
Methods: methods of urban, territorial and transport planning and the fuzzy set theory.  ...  Rule Viewer and Surface Viewer graphic tools were used for developing a fuzzy conclusion system in the interactive mode.  ...  A fuzzy variable is described by set ( ) Q U N , , , where N is the variable name.  ... 
doi:10.18372/2306-1472.72.11982 fatcat:e65inc5pavhjdngq2l6rug7izm

Message in a Sealed Bottle: Privacy Preserving Friending in Social Networks

Lan Zhang, Xiang-Yang Li, Yunhao Liu
2013 2013 IEEE 33rd International Conference on Distributed Computing Systems  
cheat each other to pretend to be matched), and efficient in both communication and computation.  ...  Our rigorous analysis shows that our mechanism is privacy-preserving (no participants' profile and the submitted preference-profile are exposed), verifiable (both the initiator and the unmatched user cannot  ...  The first category is based on private set intersection (PSI) and private cardinality of set intersection (PCSI) [12] , [20] .  ... 
doi:10.1109/icdcs.2013.38 dblp:conf/icdcs/ZhangLL13 fatcat:4mmycpnvnbeu7pk2yh6vbyw6gu

E-service quality of Internet based banking using combined fuzzy AHP and fuzzy TOPSIS

2016 Tehnički Vjesnik  
The survey was carried out with the banking specialists and managers in both public and private banks inTurkey.  ...  In this study, we employed a fuzzy based prioritization using AHP and TOPSIS methods to the e-banking service quality indicators.  ...  between M1 and M2 [19] where d is the highest intersection point Fig. 1 ) [19] .  ... 
doi:10.17559/tv-20140801181553 fatcat:iqzlxmta35aflcuk2uqayaqwa4

A Cyber-Physical Systems Approach to Collaborative Intersection Management and Control

Jose A. Guzman, Felipe Nunez
2021 IEEE Access  
The communication with the simulation and between the intersections runs over a private WiFi network managed by a high end router (Tp-Link Archer c5400x) to ensure a fast information flow and a good QoS  ...  For fuzzification, three fuzzy sets are assigned to each input variable and five fuzzy sets to the congestion output ∈ [0, 100], all with triangular membership functions.  ... 
doi:10.1109/access.2021.3096330 fatcat:qjmcvymluvcrjk4jtvvwpl4ate

Research on Assessment Methods for Urban Public Transport Development in China

Linghong Zou, Hongna Dai, Enjian Yao, Tian Jiang, Hongwei Guo
2014 Computational Intelligence and Neuroscience  
The weight of each index is determined through the AHP and the degree of membership of each index through the fuzzy assessment method to obtain the fuzzy synthetic assessment matrix.  ...  To overcome this shortcoming, fuzzy mathematics method is used for describing qualitative issues quantitatively, and AHP (analytic hierarchy process) is used to quantify expert's subjective judgment.  ...  Acknowledgments This research was funded by Volvo Research and Education Foundations.  ... 
doi:10.1155/2014/941347 pmid:25530756 pmcid:PMC4235122 fatcat:jxte5j5gyrbgfhjcv2sahasq7q

Multi-Agent and Fuzzy Inference-Based Framework for Traffic Light Optimization

Abdelouafi Ikidid, El Fazziki Abdelaziz, Mohammed Sadgal
2021 International Journal of Interactive Multimedia and Artificial Intelligence  
This paper presents a traffic simulation framework based on agent technology and fuzzy logic.  ...  network, through both inter-and intra-intersection collaboration and coordination.  ...  The concentration T (1) at a given segment is the number of vehicles N (in private vehicle units, PVUs) using this segment at a time t, relative to the segment length. (1) An intersection has a set of  ... 
doi:10.9781/ijimai.2021.12.002 fatcat:xpgkn6b55bcdbluesyc5o2vkky

Alarm Association Rules Mining in Distributed Database [chapter]

Chao Chen, Tongyan Li
2013 Lecture Notes in Electrical Engineering  
In First step apriori algorithm is used to find the association of requested dataset and in second step the fuzzy association rules are taken place by applying the fuzzy operations.  ...  Association rules are very crucial part in data mining which tell the relationship between two item sets by using the apriori algorithm so that it will give the frequent item sets.  ...  The second diagram shows the mapping between the global database and different sites. Global datasets can have multiple number of sites which has their own database.  ... 
doi:10.1007/978-1-4614-4981-2_219 fatcat:vaf3d6kvznad7kypq3afv3zl5a

Message in a Sealed Bottle: Privacy Preserving Friending in Mobile Social Networks

Lan Zhang, Xiang-Yang Li, Kebin Liu, Taeho Jung, Yunhao Liu
2015 IEEE Transactions on Mobile Computing  
each other to pretend to be matched), and efficient in both communication and computation.  ...  Our analysis shows that our mechanism is privacypreserving (no participants' profile and the submitted preference-profile are exposed), verifiable (both the initiator and any unmatched user cannot cheat  ...  The first category is based on private set intersection (PSI) and private cardinality of set intersection (PCSI) [16] , [27] .  ... 
doi:10.1109/tmc.2014.2366773 fatcat:dxfkhvg76vcbfhvwr6z2xbtbla

Venture Capital and the Use of Convertible Securities and Control Rights Covenants: A Fuzzy Set Approach

Maria Do Rosario Correia, Raquel F. Ch. Meneses
2019 European Journal of Business Science and Technology  
We use an innovative methodology - a fuzzy set Qualitative Comparative Analysis - that considers both quantitative and qualitative factors for obtaining a solution that best fits the empirical data.  ...  In this study we investigate the use of convertible securities and control rights covenants for a sample of 15 Portuguese venture capital firms.  ...  According to Ragin (2008) two or more fuzzy sets can be compounded through the logical and (intersection of sets) or joined together through the logical or (union of sets).  ... 
doi:10.11118/ejobsat.v5i1.152 fatcat:g5jm7dhojjc2de6z7uc6illkyq
« Previous Showing results 1 — 15 out of 5,478 results