The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power consumption has become an important issue in embedded system. Reducing the total number of signal transitions during each bus cycle has great effect on power consumption. In this paper, we proposed an instruction scheduling method which is based on the Particle Swarm Optimization (PSO) Algorithm to reduce the signal transitions. We formulate the low-power instruction scheduling problem to the...
After the analysis of the working principle of WAPI, its security weaknesses are pointed out: it does not securely realize the goal of identity authentication and key agreement. According to the security weaknesses, the key agreement part is improved without changing the framework of WAPI. The improved protocol is not only SK-secure but also UC-secure, thus realizing identity authentication and key...
K-anonymization is a technique that prevents linking attacks by generalizing and suppressing portions of the released raw data so that no individual can be uniquely distinguished from a group of size of k. In this paper, we study single-attribute generalization for preserving privacy in publishing of sensitive data, and present multi-attribute generalization definition in process of generalization...
Data Publishing generates much concern over the protection of individual privacy. K-anonmization is a technique that prevents linking attacks by generalizing and suppressing portions of the released raw data so that no individual can be uniquely distinguished from a group of size of k. We study generalization for preserving privacy in publishing of sensitive data and metric method for information...
It is necessary to reduce the steps of generalization in order to minimize information loss in privacy preserving data publishing, but sometimes the anonymous table on basis of the method could still be attacked. To solve the problem, the condition of attack is analyzed, and a m-threshold model is presented to decide whether the value of quasi-identifier attribute would be continuously generalized,...
A new face recognition algorithm based on image fusion is presented in this paper. Each original image sample is divided into a certain number of subimages and all training subimages from the same position construct a series of new training sub-pattern sets where Principal Component Analysis (PCA) method is used to extract local projection sub-feature vectors separately, then a set of projection sub-spaces...
This paper presents a modified algorithm named MOFRT (modify O(1) for real-time) based on the Linux kernel 2.6.11 for real-time tasks. Researchers in the real-time system community have designed and studied many advanced scheduling algorithms. However, most of these algorithms have not been implemented since it is very difficult to support new scheduling algorithms on most operating systems. To solve...
This paper sums up kind, characteristic and suitable terms of various kinds of oil feeding system of submarine cable project in the world, analyzes composition, operation, control and maintain of oil feeding system of Qiongzhou strait submarine cable, and calculates key parameters such as oil pressure, oil flow, oil reserve, etc
Potential differences between somatodendritic and axonal dopamine transporters were examined by comparing the binding constants of [ 3 H]WIN 35,428 [2β-carbomethoxy-3β-(4-fluorophenyl)tropanel] binding to membranes prepared from the rat ventral mesencephalon, containing A9 and A10 dopamine cell bodies, and from the nucleus accumbens. Saturation analysis of [ 3 H]WIN 35,428 binding,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.