The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing is growing rapidly due to its features of low cost, space saving, sharing etc., yet security issues are still a major concern. Multi-cloud computing technology was developed, in part, to address security concerns. One technique could use the Shamir's secret sharing method which is based on risk diversification. This work offers a solution strategy allowing users to allocate their resources...
This work introduces a cloud shadow removal method for hyperspectral images (HSIs) based on hyperspectral unmixing. The shading is modeled by a spectral offset and a spectral-dependent attenuation. The offset and the attenuation are estimated by solving a nonconvex optimization problem, which exploits the linear mixing model (LMM). The mixing matrix of the LMM is estimated from the unshadowed image...
The superpixels provided by an unsupervised segmentation algorithm are sets of neighboring pixels homogeneous in some sense. Therefore it is very likely that, in a classification problem, most pixels in a superpixel belong to the same class, namely if the homogeneity criterion is compatible with the class statistics. Superpixels are, therefore, a powerful device to express spatial contextual information...
In this paper, we propose and evaluate a new fuzzy-based reliability system for Peer-to-Peer (P2P) Communications in JXTA-Overlay platform considering as a new parameter the sustained communication time. In our system, we considered four input parameters: Data Download Speed (DDS), Local Score (LS), Number of Interactions (NI) and Sustained Communication Time (SCT) to decide the Peer Reliability (PR)...
Cross-border e-commerce is a newly arising and burgeoning model of cross-border trade. This paper qualitatively analyzes the reasons of cross-border e-commerce's emerging based on transaction costs theory. First, we introduce cross-border e-commerce and describe the supply chains of B2C and B2B2C cross-border e-commerce models. Then we give an overview of the development of transaction costs theory...
Dynamic pressure wave generated by underwater pulse discharge are widely used in many industry applications including rock fragmentation, oil stimulation and acoustic source. A test stand was developed to measure the amplitude and waveform of dynamic pressure wave produced by underwater pulse discharge. Besides, the pulsations of underwater arc and the gaseous bubble generated by pulse discharges...
We propose a non-delegatable identity based strong designated verifier signature scheme. It combines an identity based Schnorr signature and an identification method. An OR proof technique glues the two parts. It is the second scheme secure in a strict model proposed by Huang et al. And it saves about half the communication and computation costs comparing to the first scheme.
Based on the theoretical analysis on the leakage process of natural gas pipeline, regarding pipeline and leakage point as a united hydrodynamic system, taking the influence between leakage point and flow in pipeline into account, and applies continuous equation, momentum equations and gas state equation, this paper establishes a leakage transient mathematical model before and after gas supply cutting...
Widespread information technique use has led to the emergence of email networks large-scale applications networks in cyberspace. But the traditional spam solutions for anti-spam are mostly static methods, and the means of adaptive and real time analyses the mail are seldom considered. Inspired by the theory of artificial immune systems (AIS), a novel distributed anti-spam model that leverages e-mail...
Computer-supported cooperative work (CSCW) is a research field where the role played by individuals as members of groups.The human being is not considered as an individual entity, but is considered as a being embedded into the society, where he/she works and interacts. Some classification appeared in order to find a way to classify all the CSCW systems, but it seemed the systems have become more and...
Binarization approaches are found promising in performing the task of email categorization. Amongst the standard binarization approaches, the one combining the some-against-rest binarization method and round robin assembling method is discovered most effective. However, two drawbacks are worth noting, i.e., effectiveness of the some-against-rest binarization method and computational complexity in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.