The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A fire safety evaluation index system of underground parking area was proposed. To solve the problem of uncertainty in underground parking area fire safety assessment, the paper introduced D-S evidence theory and AHP to the assessment. The weights of each index were obtained by AHP and the quantitative value of the security level of each evaluation index was calculated using the D-S evidence theory...
A traceback attack was recently developed on Freenet, which can identify the originating machine of a content request message, even if a single content request message has been issued by a content retriever. The traceback attack exploited a few fine-grained design and development decisions made in Freenet, including the unique identifier (UID) based mechanism to prevent routing loops of content request...
Freenet is a popular peer to peer anonymous network, with the objective to provide the anonymity of both content publishers and retrievers. Despite more than a decade of active development and deployment and the adoption of well-established cryptographic algorithms in Freenet, it remains unanswered how well the anonymity objective of the initial Freenet design has been met. In this paper we develop...
The social relief system is an important part of the social security system. There have been dual economic and social structure in the current management system, function process and so on. Some social relief forms have not linked up effectively or convergence degree has not tighted enough so that it has not play the whole integrated strength, like the minimum standard of living for urban residents...
The network dynamic evaluation is in the proven prescription legal science has truthfully given the trusted degree of the network from the real network to the simulation experiment evaluation concrete model and the realization process. The network modelling process uses the extraction real network data, establishes the simulation environment, under the simulation environment destructive collapse test...
The openness and anonymity of the Internet have given rise to online fraud, which has severely affected the development of China's e-commerce. This paper analyzes the impact of relevant factors on trust in e-commerce of China and proposes that China should draw on the experiences of developed countries to establish and improve relevant legal system, combing personal credit system with the ID card...
By using of chaotic map and block-wise independent technology, a new chaotic fragile watermarking algorithm is proposed in this paper. Firstly, location key is looked as logistic chaotic initial value to iterate and create location matrix, according to this matrix we can generate mapping image and identify the embedding location of watermarking in image blocks. Then watermarking sequence related with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.