The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As a major part of household electricity load in summer, air conditioning (AC) consumption demonstrates enormous demand response (DR) potentials and numerous AC based DR programs are carried out annually. Understanding electricity consumption behaviors is one of the key elements for utilities to design more cost-effective DR programs. So studying on the AC electricity usage habits is of great significance...
Breast cancer has become the highest incidence of malignant tumors to global women. The breast cancer risk classification model can help reduce the incidence rate of breast cancer. For the large population of Chinese women, it is important to build an apt classification model and only the respondents in the high risk group will accept further diagnosis to filter out the breast cancer patients to lower...
Low probability of intercept (LPI) has currently become a central issue in modern electronic warfare. In this paper, the problem of task-dependent adaptive radar jamming waveform design based on LPI is investigated. Firstly, the achievable signal-to-interference-plus-noise ratio (SINR) and mutual information (MI) are derived to evaluate the target detection and parameter estimation performance, respectively...
With mobile video data traffic increasing, enhancing video quality of experience (QoE) has become an important issue. HTTP Adaptive Streaming (HAS) is a solution to give the user better experience by providing different video rates in changeable bandwidth. To infer the HAS QoE in LTE network, HAS engine we designed can produce video rates reflecting the viewer's subjective feeling adequately. Using...
Blocker tags are initially introduced to protect regular tags in certain ID ranges, called blocking ranges, from unwanted scanning in RFID systems. But if misused, blocker tags can cause blocking attacks that corrupt the communication between interfered regular tags and readers. Previous approaches can only detect blocking behavior. However, they cannot distinguish malicious blocking from legitimate...
Matching algorithm for Place Names is one of the most important research topics in the construction of digital gazetteers. Taking account of the morphological characteristics of Chinese Place Names and ontology method, we first pretreat the Chinese Place Names to remove illegal characters, decompose the Chinese Place Names into special names and generic terms, and then use both the Levenshtein Distance(LD)...
In this paper, analyzing Hebei University of Engineering Stadium project, judging the qualification of the tenders by using AHP based on the thoroughly analyzing of the indicators of the index system, establishing the evaluation model, testified the efficiency and science of the model, summarizing the prerequisite of the reasonable lowest bid, formulating the reasonable lowest bid of bid in construction...
The characteristics of Bragg wavelength movement in the core-etched process of fiber Bragg grating (FBG) are theoretically calculated and analyzed under several different conditions. The numerical analysis shows that, the Bragg wavelength decreases non-linearly and more and more faster as the decrease in core diameter, furthermore, the decreasing speed and decreasing degree in Bragg wavelength are...
Large IT service providers track service requests and their execution through problem/change tickets. It is important to classify the tickets based on the problem/change description in order to understand service quality and to optimize service processes. However, two challenges exist in solving this classification problem: 1) ticket descriptions from different classes are of highly diverse characteristics,...
The application of information and communication technologies (ICTs) in college teaching curriculum is an important component of higher education reform in China. More and more people focus their attentions on the development and effectiveness evaluation of using ICTs to support teaching and learning in Chinese universities. Several basic ICTs including computer network, multimedia, video on demand...
In mobile ad hoc networks (MANETs), hierarchical key management structure has some distinct features and becomes popular in many applications. In a MANET where security requirement is high, node states should be considered when constructing a private key generator (PKG). In this paper, we propose a distributed hierarchical key management scheme in which nodes can get their keys updated from optimally...
Hierarchical key management schemes would serve well for military applications where the organization of the network is already hierarchical in nature. Most of the existing key management schemes concentrate only on network structures and key allocation algorithms, ignoring attributes of the nodes themselves. Due to the distributed and dynamic nature of MANETs, it is possible to show that there is...
In mobile ad hoc networks (MANETs), identity (ID)-based cryptography with threshold secret sharing is a popular approach for the key management design. Most previous work for key management in MANETs concentrates on the protocols and structures. How to optimally conduct node selection in ID-based cryptography with threshold secret sharing merits further investigation. In this paper, we propose a distributed...
This article established an index system for measuring the economic openness degree in Henan Province from three aspects like level of trade in goods, level of foreign capital utilization as well as level of trade in service. Then it conducted an empirical and comparative analysis on six central provinces in China by using factor analysis method. The conclusions are: Hubei and Hunan both belong to...
New applications such as real-time deep packet inspection require high-speed regular expression (regex) matcher, and the number of regexes in pattern store is increasing to several thousands, which requires a memory efficient solution. In this paper, a kind of hardware based compact DFA structure for multiple regexes matching called CPDFA is presented. According to statistics of regexes in Snort and...
This article aims to analyze the problems of housing mortgage loans. And it establishes an index system of credit risk evaluation according to the differences between developers and lenders. Based on artificial neural network, it establishes a credit risk evaluation and forecast model in housing mortgage loans, which will lay a foundation for the change of credit risk evaluation pattern and for the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.