The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Bell-LaPadula model is the most classical multilevel security access control model, however, the existence of the response blind area in Bell-LaPadula model is a great threat for system. In this paper we propose an improved Bell-LaPadula model combining with obligation mechanism. Response mechanism is also introduced in the improved model which can resolve the disadvantage of response blind area....
A new intrusion detection mechanism in SELinux based on dual-Markov chain and triggered by critical system calls is put forward in this paper. The mechanism integrates access control with intrusion detection by Linux Security Module (LSM) in SELinux and considers both the global behaviour characteristics and local behaviour characteristics. Theoretical analysis and experimental results show that the...
The study of new energy vehicles is only one direction for the strategic development of vehicles. Marketing activities are indispensible and urgent in realizing industrialization and marketization of new energy vehicles. STP(Segmentation, Targeting, positioning) marketing strategies refer to important marketing theories for new energy vehicles entering the market. This paper will offer accurate location...
In this paper, we give some results on relatively countable compactness with relative properties P is relative compactness and provide an example to demonstrate that these conditions can not be weaken.
This paper presents a new framework to calculate the continuous brain blood vessel skeleton curve of binary images and gray-scale images. The main idea of the method is: the minimum cost path between any two skeleton points is a skeleton line. Algorithm using two different intermediate functions, one is Euclidean distance field and another is deformed gradient vector flow, gained two different energy...
In view of some critical defects existing in P2P network such as stability and security issues, a novel approach called OSREMP is proposed to evaluate the reputation based on semantic ontology, the existing reputation models mostly predict the performance of peer based on transaction history records, lacking of comprehensive consideration on the credibility of resources and various malicious acts...
At present, there are three kinds of difficult integration problems in building automation systems. One is the integration between building automation systems (BAS) and existing enterprise applications. The second is the integration of building automation systems which adopt different international standardized protocols (e.g. BACnet or LonTalk). The third is the integration of building automation...
In the paper, an overall dynamic mathematical model of a 260t/h circulating fluidized bed (CFB) boiler was described, which included the sub-system mathematical models of the combustion chamber, the cyclone separator and the back-feeder in the 260t/h CFB boiler. Based on the mathematical models, using the SIMUCAD platform, a simulation environment of the boiler was developed, which can simulate the...
By analyzing threatens faced by the secure chip nowadays, we point out several disadvantages existing in current commonly adopted settle means, and present a system architecture scheme of the secure chip based on the trusted computing theory. This scheme, which can satisfy the requests of code downloaded by the user himself and multi-cryptographic function services, not only possesses security attributions...
The paper presents an improved single neuron-based adaptive PI controller (SNPI) designed for regulating a heating, ventilation and air-conditioning (HVAC) system in a test room, which can be represented by a First-order-plus-dead-time (FOPDT) model. The characteristics including nonlinear and time-varying dynamics in HVAC systems have been considered. By using an improved learning algorithm, which...
The paper describes a web-based remote control system for an air conditioner experimental rig, which provides a unified and flexible Web-based interface to access the experimental rig located remotely. The hardware and software infrastructure of the control system is presented. The rig is composed of two test rooms, in which temperature and humidity are required to keep constant. The weakness using...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.