The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Intrusion Detection System (IDS) has recently emerged as an important component for enhancing information system security. Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns from the network traffic data. In this paper, we propose a novel signature searching to detect intrusion based on...
This paper discusses the fundamental limitations imposed by the intrinsic characteristic of plants. The plant is stable of unstable. The performance is about minimum tracking energy for tacking error asymptotically approaching zero. Using a time-domain integral of the square of the input as a performance index, we derive relations that represent fundamental limits on the achievable performance for...
Information technologies such as data mining and social network analysis have been widely used in law enforcement to solve crimes. Recent research indicates that geographic profiling also plays an important role in facilitating the investigation of crimes. However, lack of integration makes those systems less helpful in practice. In this paper, we propose an integrated system called PerpSearch that...
Three kinds of pulverized coals were burnt in a laboratory-scale drop tube furnace, and an 8-stage Andersen particle impactor was employed for separating and sampling the ash particles after the pulverized coals combusting, in order to study the enrichment characteristics of trace elements in primary particulate matter during coal combustion. The PM samples were analysed by ICP-AES, the concentration...
Applying the data envelopment analysis to evaluate the efficiency of independent innovation of China's large and medium-sized industrial enterprises(LME),and the inefficient decision making units were modified. The result shows that: the value of the independent innovation performance has no obvious correlation with each provincepsilas economic development level. In addition, the reasons for the inefficient...
The EAST superconducting tokamak is an advanced steady state experimental device being built at ASIPP in China from 2000 to around 2006. The paper gives a description for the power supply (PS) of poloidal field (PF) in EAST. Design and test results for the thyristor switch network are emphasized with transient analyses.
Utilizing the contourletpsilas advantages of multiscale, localization, directionality and anisotropy, a new method for multi-focus image fusion using wavelet based contourlet transform and region was proposed. In the contourlet transform, the Laplacian pyramid transform was replaced by the wavelet transform to obtain non-redundant wavelet-based contourlet transform. The source image is decomposed...
This paper is to investigate the lightning shielding performance of the HVDC transmission line when taking the DC operation voltage into account. Firstly, the equivalency of the scale experiment is discussed from the following aspects: (a) the determination of test scale factor; (b) the electric field simulation of downward leader; (c) nominal field simulation of the HVDC transmission line. Secondly,...
Routing in delay tolerant networks (DTNs) is a challenging problem in networking research. Existing DTN routing solutions have used many approaches to increase the success rate of message delivery, such as meeting probabilities between nodes, packet replication and flooding. One important feature of these protocols is using local connection information to find the ldquobestrdquo path with high likelihood...
Crosstalk delay-noise which occurs due to the simultaneous transitions of victim and aggressor drivers is very sensitive to their mutual alignment. Hence, during static noise analysis, it is crucial to identify the worst-case victim-aggressor alignment which results in the maximum delay-noise. Although several approaches have been proposed to obtain the worst-case aggressor alignment, most of them...
Nanojoule femtosecond laser pulses were used to modify the refractive index of living corneas. By doping with Sodium Fluorescein to increase two-photon absorption, laser scanning speed could be greatly increased while inducing large RI modifications.
This paper investigates the tracking performance of continuous-time, multi-input multi-output, linear time-invariant systems in which the output feedback is subject to an additive white Gaussian noise corruption. The problem under consideration amounts to determining the minimal error in tracking a Brownian motion random process, which emulates a step reference signal in the deterministic setting...
As semantic Web technologies are increasingly used to empower knowledge management systems (KMSs), there is a growing need for mechanisms and automated tools for checking content generated by semantic-web tools. The content in a KMS includes both the knowledge management (KM) schema and the data contained within. KM schemas can be viewed as ontologies and the data contained within can be viewed as...
The root of material flow accounting and analysis (MFA) could be traced back to social metabolism theory in 1857, but it was ameliorated by Abel Wolman, Kenneth Boulding, and Donella Meadows studying Industrial Metabolism during 1960s-1970s. By using MFA, the inherence of resources and economic developing could be impersonally evaluated and it also can be used to help governments to shape their developing...
A well-known appliance production enterprise X of China plans to operate a new type of appliance maintenance service model Y based on the current situation and prospect of the appliance maintenance service industry market. Y is going to create an independent third-party appliance maintenance service brand and its service model will be chain operation which is a new type of Chinapsilas appliance maintenance...
Comparator based switched capacitor technique is a new topic because of its suitability of scaling and its inherent low power consumption. Since CBSC technique suffers from the overshoot due to the comparator delay, this paper gives a detailed analysis on the overshoot signal, and a common mode feedforward circuit is proposed to correct the overshoot error. A 10-bit 100 MS/s pseudo differential pipelined...
Research on coordination among population(P), resources(R), environment(E) and development(D) (PRED) has comprehensive and extensive contents, which serves as the core of sustainable development. According to the characteristics of urban PRED system, 50 representative cities and 20 indexes from both positive and negative sides are selected to establish an index system, which applies multiple indexes...
Bonding is an essential step to enclose microchannels or microchambers in lab-on-a-chip. Ultrasonic bonding was studied as a deformation-free technique to realize high efficiency bonding of microfluidic chips. Based on viscoelastic dissipation theory, the main influential factors of heat generation rate during ultrasonic bonding was theoretically analyzed and numerically calculated using finite element...
Raman spectroscopy has been used to study the femtosecond laser micromachined regions inside silicone-based hydrogel polymers. No significant changes in the Raman spectrum are observed even when index change is as large as +0.06.
A problem of stabilization of cluster unit in wireless sensor and actor network is discussed in this paper. Through modeling WSAN (wireless sensor and actor network) as a new multiple input single output model, this problem is transferred to stabilization of multi-sensor and single controller system with long but bounded multiple random time-delay and packet-loss. Using theories of jump linear system,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.