The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a novel anomaly detection method of network worms. The algorithm detects unknown worms by multidimensional worm abnormal detection technology, extracts its feature string via analyzing worm data with leap-style and creates new rules to detect the corresponding worm in case that the unknown worm attacks again. The paper has realized the automatic detection of unknown worms. Experiment...
Materials design is the most important and fundamental work on the background of materials genome initiative for global competitiveness proposed by the National Science and Technology Council of America. As far as the methodologies of materials design, besides the thermodynamic and kinetic methods combing databases, both deductive approaches so-called the first principle methods and inductive approaches...
A method of manipulating xml data using SAX parser is proposed to deal with uncertain type of mass data in this paper. It is event-driven, and it is appropriate to deal with floods of unknown type of data. XML can be wide used in the wireless data transmission field and this parse method can improve the analyze efficiency very much.
We analyze the problem of Trusted Network Connection (TNC) and descript Direct Anonymous Attestation protocol (DAA). A new key distribution scheme based on host integrity and identity is taken out for identity verify, host integrity checking and group key distribution. After this, we bring forward members join protocol and members remove protocol. At Last this paper analyzes the security of this scheme.
In this paper we indicate the concept of dynamic data flow graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.
Acquiring positioning centers and number from the nerve slice images automatically is one of the key to extracting the edges of fascicular groups. Essentially that is to cluster those pixels in the nerve slice image which represent the fascicular groups. Because those pixels are distributed discretely and the fascicular groups often split and converge quickly while extending, this paper designs the...
Mutual information (MI) has obvious potential for feature selection, but this has not been fully exploited in the past. In order to make numerical computation easier and more accurate, the MI of the whole multi-dimensional data can be decomposed into an amount of one-dimensional MI and one-dimensional conditional MI components. This paper reveals that using one-dimensional MI components to replace...
We have discussed the three types of millimeter waveguides for reducing the transmission loss. The diffusion-bonding hollow-waveguide array of copper achieves 60% antenna efficiency for 31.4 dBi gain at 93.7 GHz. The hollow waveguide of laser-curing resin with copper electroplating with 25 mm length achieves -0.1 dB transmission at 94GHz. The dielectric half-filled parallel plate waveguide is expected...
The automatic text classification method aims to assign text files to one or more predefined categories according to the text information contained by all kinds of text format files. SVM is recognized as one of the most effective text classification methods for its high accuracy, but its black-box feature causes that the description of each category can not be given and explained. In this paper, a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.