The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
Multi-tiered Parallel I/O systems that combine traditional HDDs with emerging SSDs mitigate the cost burden of SSDs while benefiting from their superior I/O performance. While a multi-tiered parallel I/O system is promising for data-intensive applications in high-performance (HPC) domains, placing data on each tier of the system to achieve high I/O performance remains a challenge. In this paper, we...
A novel academic recommendation algorithm, MTAR (multi-type academic recommendation), which integrates resource content and user behaviors, is proposed to process five types of academic resources at the same time, which can quickly and precisely recommend academic resources of interest to users. The MTAR algorithm profiles five kinds of academic resources from four features including resource type,...
We propose a design of visible light communication which is based on the white LED power source. The design possesses effective software flowchart and the optimized circuit of the hardware modules which include power supply, signal amplification, LED driver, Audio signal transmission, Audio signal reception, filter and amplifier and Audio output. The testing of the design shows our system can realize...
We demonstrate the disaster resilience of electric power applications for software defined disaster recovery center networking (SD-DRCN) based on elastic optical network. The overall feasibility and performances of the architecture are verified in our study.
Semi-supervised learning methods can largely leverage the image annotation problem using both labeled and unlabeled data, especially when the labeled information is quite limited. However, most of them suffer the expensive computation stemming from the batch learning on large training dataset. In this paper we proposed a highly efficient semi-supervised annotation approach with the partial label propagation...
Computer file is the main target of computer viruses. In order to protect the user files, User's intentions is introduced in this paper, its main idea is that whether meet the user's intentions is the sole criterion to determine whether a program contains malicious. In addition, through make some access control rules for application files, the application files can be greatly protected. The paper...
Based on the research of technology that through which virus attacks the application, we find that an important reason of the application vulnerable to be attacked is the lack of effective access control to application files. In view of this problem, this paper build a protection model of Application files, combined with system snapshot technology. This model can give the application files real-time...
Reconfigured Parallel Test Grid (RPTG) technology advanced a novel theory to improve test and ATE using efficiency. In order to analyze the function and efficiency of RPTG, it is important to simulate the RPTG environment authentically. Based on parallel and reconfigured characteristic of RPTG, HLA-based layered analytic simulation architecture was put forward. This solution can exploit the parallelism...
In the SaaS application, users can order corresponding software services from the service provider according to their application needs and adjust their services content in use based on the changes of the enterprise development, with strong elasticity and expansibility. However, despite of so advanced concept of SaaS, there are still some problems in the SaaS field constraining the wider use of SaaS...
This paper focuses on tag recommendation. In many tagging systems, tags are highly interdependent. Conventional methods do not exploit dependencies between tags when computing the relevance score of a candidate tag for a new resource. In this paper, we take into consideration the relationship between candidate tags and propose a continuous conditional random fields (CRF) model for tag recommendation,...
The highly efficient Boyer-Moore's string matching algorithm utilizes information on multi-occurrences of string suffixes in a pattern string to avoid backtracks in searching the pattern string. One hypothesis is that Boyer-Moore's algorithm even benefits more from highly self-repetitive patterns. In this paper, the author studies how multi-occurrences of string suffixes affect the performance of...
Future network systems and embedded infrastructure devices in ubiquitous environments will need to consume low power and process large amounts of network packet traffic. In order to meet necessary high processing efficiency requirements, future processors will have many heterogeneous cores with reduced reliability due to low voltage, small transistor sizes, semiconductor wearout, and environmental...
A real time network is introduced to the development of a test system of SINS/GPS (ship's inertial navigation system/Global Position System) integrated navigation system. Because only the three-axis angular motions can but the three-axis linear motions can't be emulated by three-axis revolving table, the complete navigation computing is accomplished by external compensation of linear motions. A navigation...
Modern automated test system of aerodrome is often faced with the challenge of high expends and low using efficiency. And as most ATE is in huge size and weigh, it's hard to replace them. Parallel test net (TN) architecture is proposed in this paper. TN could combine all test equipment in aerodrome to satisfy the requirements of airplane test. In order to solve the problem that tests is numerous at...
With the improvement of software security, attacks based on RPC vulnerabilities declined, however, attacks based on client application software vulnerabilities have increased. Such client application software includes Web browsers, email client and office. The spread of malware using these software vulnerabilities has become a severe threat to todaypsilas Internet. In allusion to this kind of threat,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.