The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Power attack is an important side-channel attack (SCA) method based on the correlation between measured power profile and internal switching activities. Various techniques have been proposed to prevent power attack. It has been noted that the on-chip power grid (PG) has a vital effect on the effectiveness of power attack by inducing a noise in the power profile. However, there is a lack of study on...
In recent years, formal methods have been adopted to detect the hardware Trojans (HT). However, they generally suffer from the time-consuming and error-prone development for property, lack of self-learning system to counter with the future HT types, and high computational complexity due to the growth of design scales. To overcome the above limitations, we propose an automatic security property generation...
DDoS attacks bring huge threaten to network, how to effectively detect DDoS is a hot topic of information security. Currently, there are some methods designed to detect DDoS attacks, but the detection rate of them is low. Moreover, DDoS detection is easily misled by flash crowd traffic. In this paper, a new method to detect DDoS attacks based on RDF-SVM algorithm is proposed. By considering the importance...
An effective optimization approach for the electromigration (EM) reliability in power grid (PG) has been presented in this paper. With core technology development and the key feature size of integrated circuits decreasing, it is more serious for the EM-induced failure occurrence in the entire PG. However, previous PG studies focus on supply noise optimization and neglect the EM influence in lines,...
The extensive use of sensors and communication devices in smart grid has greatly increased the quantity of surge protection devices (SPDs). Meanwhile, it puts forward higher requirements for the informatization level of monitoring and maintenance of SPDs. In order to realize the intelligent management of SPDs, the SPDs real-time monitoring system for the smart grid is developed. Specifically, the...
With the development of smart grid, higher requirements have been put forward on information transmission and feedback ability, which leads to continuous increase of all sorts of communication equipment in smart grid. In order to ensure the safe and stable operation of the communication devices,the test of the overvoltage tolerance level is necessary. This paper researches an overvoltage test system...
Cooperative application execution among mobile devices has recently received significant attention in mobile cloud computing. However, it may incur extra traffic among devices, e.g., exchanging the results of the tasks, especially for data-dependency tasks. In this paper, we focus on the task execution in a chain structure, where each task must be executed based on the output result of its precedent...
The gasification of biomass to obtain a syngas provides a competitive means for clean FT (Fischer-Tropsch) liquid fuels from renewable resources. The feasibility of the process depends on the upgrading of raw fuel gas from gasifier to desired syngas. In this paper, partial oxidation reforming of biomass raw fuel gas with addition of 3-8mol% O2 were investigated over nickel based monolith catalysts...
As a fundamental task, document similarity measure has broad impact to document-based classification, clustering and ranking. Traditional approaches represent documents as bag-of-words and compute document similarities using measures like cosine, Jaccard, and dice. However, entity phrases rather than single words in documents can be critical for evaluating document relatedness. Moreover, types of...
Side Channel Attack (SCA) aims to extract the secret information from cryptography chips by analyzing the leakage of physical parameters. Power analysis based SCA is a popular approach to obtain secret keys by monitoring the power consumption of cryptography chips. However, most SCA evaluation methods are performed on FPGA platforms while many parasitic physical effects cannot be revealed before the...
Life cycle asset management is one of the most significant concepts of modern distribution network planning. The paper firstly elaborates the basic concept of life cycle cost (LCC) of distribution network planning. Then a distribution network life cycle cost model, considering the initial investment, operation, maintenance and disposal costs, is constructed with the 10kV medium voltage power line...
Supporting study of a method to solve cloud computing security issue with private face recognition. The method has three parts: user part provides face images; cloud initialization part has a face subspace and templates database; cloud private matching identification part contains the core algorithm of the method, comparing two encrypted numbers under double-encrypted conditions. The experimental...
The causation of cancer often involves the joint deregulation of multiple biological processes. Thus, it is interesting to extract multi-function features of cancer genes and study their functional coordination involved in tumorigenesis. Here, based on Gene Ontology, we proposed a heuristics strategy to extract multi-function features which are significantly overrepresented with cancer genes. We showed...
The functional knowledge of cancer proteins and cancer pathways is currently limited and not detailed enough, remaining as a major hurdle to cancer studies. Particularly, many cancer proteins are only annotated to high-level general GO categories. Here, we apply an efficient algorithm, by constructing function-specific protein-protein interaction sub-networks, to find finer functions of the cancer...
New product development is playing a key role in the performance of entrepreneurial firms. New product development strategy crafting is becoming more and more important. However, the research on the relationship between new product development strategy and the performance of entrepreneurial firms is still questionable yet. The problem is that the previous researches are conducted independently and...
Selecting differentially expressed genes (DEGs) is one of the most important tasks in microarray applications. However, the sample sizes typically used in current cancer studies may only partially reflect the widely altered gene expressions in cancers. By analyzing three large cancer datasets, we show that, in each cancer, a wide range of functional modules are altered and have high disease classification...
Selecting feature genes for disease prediction is one of the most important applications of microarray technology. However, gene lists obtained in different studies for a same clinical type of patients often differ widely and have few genes in common. Recent researches suggest that gene lists ranked by fold change are more reproducible than by t-test. Here, based on the resampling method, we use training...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.