The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to prevent illegal users access the cloud data frequently, this paper puts forward trusted access control model based on role-task in cloud computing. It can prevent the illegal users accessing cloud data more effectively. Combining the advantages of the role access control model and the task access control model, the concept of reputation value will be introduced, and a certain threshold...
When transmitting BPSK modulated signal, GPS simulator can be used to calibrate hardware delay under a wide variety of conditions by determine the average measured time difference between the one pulse-per-second (1 pps) reference and the bi-phase modulated code transition point. In practice, an AM (Amplitude Modulation) phenomenon rather than ideal BPSK modulation code transition point can be observed...
Along with the country to vigorously promote quality education and the society for undergraduates' innovation ability requirements, how to cultivate undergraduates' innovation consciousness and practice ability has become the focus of attention in higher colleges. In this paper based on the analysis of our undergraduates' innovation ability on the basis of the status of undergraduates' innovation...
Aiming to the community demand for Creative talents, and on the basis of elaborating the TRIZ basic theoretical system, then to analysis the current Chinese College Students' creative abilities. Introducing the TRIZ theoretical into the model of the cultivation of undergraduates' innovation ability, and have structured the model of the cultivation of undergraduates' innovation ability. This model...
According to our previous study, it is believed that ultrafiltration with polyethersulfone (PES) flat-sheet membrane is suitable for the concentration process of alkaline peroxide mechanical pulping (APMP) plant's effluent. So we scaled up the concentrating experiment to a pilot-scale. Specifically, the cross flow velocity and volume reduction factor were optimized again for a higher flux and a lower...
This article presents a precise synchronization algorithm based on status tracking and locking mechanism. Tracking execution state of triple computer and running state of time base counter through dual state machine not only can implement precise synchronization of TMR computer, making status synchronization precision and time-base synchronization precision below 30ns, but also save valuable interconnection...
Attack model is the foundation for organizing and implementing attacks against the target system in Attack Resistance Test. By redefining the node of the attack tree model and redescribing the relation of the attack tree nodes, we build a penetration attack tree model which can describe, organize, classify, manage and schedule the attacks for Attack Resistance Test. The organization method of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.