The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the electric car battery safety early warning ability and decrease the safe accident of electric vehicle charging, the electric vehicle charging safety factors are analyzed, the security early warning index selection ways and methods are studied, and a security early warning evaluation index system is set, the evaluation method of weight for safety index is discussed. Besides,...
Mobile crowd sensing is an emerging sensing paradigm where sensing applications buy sensor data from mobile smartphone users (workers) instead of deploying their own sensor networks to estimate some statistics of a spatial event. In many spatial monitoring applications, the crowdsourcer needs to incentivize smartphone users to contribute sensing data so that the collected dataset has good spatial...
Media transcoding is an important job in the streaming media processing. Huge amounts of media transcoding, a kind of data and computationally intensive work, are performed as a distributed way. In this paper, we model a distributed media transcoding system which is based on Hadoop and FFmpeg. To minimize the total completion time (i.e., makespan) and fully utilize resources, we propose a method to...
Base Station Cooperation (BSC), has been a promising technique for combating the Inter-Cell Interference (ICI) by exchanging information through a high-speed optical fiber back-haul to increase the diversity gain. In this paper, we propose a novel pilot symbol assisted data fusion scheme for Uplink BSC (UBSC). Furthermore, the proposed scheme exploits the pre-defined pilot symbols as the sample of...
In recent years, data dissemination privacy protection issues received extensive attention. A variety of privacy preserving anonymity models and technology, such as generalization, anatomy and slicing have been proposed. We present a new technique - overlapping slicing, it handles data attributes mainly based on the idea of fuzzy clustering. And we present a linear algorithm of processing data with...
This paper analyzes the Struts framework, the Hibernate framework, and the combined framework of Struts and Hibernate. The paper also discusses how to use the combined framework to realize the application and design of the management system for scientific research projects. This system can efficiently solve the problem of the poor expansibility and poor maintainability in the application of traditional...
A thermal management model of a rear engine compartment was established with STAR-CCM+.The on-site temperature measurement data were used to calibrate the established model and to demonstrate the validity of the simulation results. Boundary conditions and parameters were then readjusted to match the worst working condition. Flow and temperature fields for this condition were obtained through simulation...
In order to meet the complicated data connection between multi businesses, to meet the original business change on structure and application, to meet the multi-user management, we designed the unified database model of user-defined businesses based on those concepts of Business, ManageClass, Indice, Indice_Group, User, Instance and so on. This paper introduces the object-oriented database modeling...
Data streams contain a lot of client information that need to be carefully managed to protect privacy of clients. Most of existing privacy preserving methods, such as k-anonymity, was designed for static data sets. However these methods can not be applied on data streams directly. Moreover, in dada streams applications, there is a need to offer strong guarantees on maximum allowed delay between incoming...
For a more accurate calculation vehicle pre-braking speed by the regression analysis data of vehicle braking speed, comparing and analyzing with LS estimation algorithm, instrumental variable estimation algorithm, generalized least squares estimation algorithm and Cor-LS algorithm, LS estimation algorithms is used to study on parameter estimation of the vehicle braking model, introducing multiple...
Based on the theories of the intrusion trapping and natural language understanding, oriented e-government affairs security issues, this paper proposed a content-based self-feedback model at the point of attackers. By this model, the concrete information under attacking can be focused and the attack methods would be ignored in a standard honey trap. With the supporting of honey nets, The target sensitivity...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.