The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Contrary information is recorded in the process of Ribonucleic Acid transcription, which is similar to the anti-synchronization process. In this paper, the anti-synchronization of coupled Boolean networks is investigated. Firstly, the definition of anti-synchronization is introduced, and the drive-response Boolean networks dynamics are translated into linear representations with the semi-tensor product...
Cognitive radio (CR) is an effective way to improve the utilization of spectrum resource. This paper focuses on the resource allocation in cooperative relay cognitive radio networks and proposes an optimized resource allocation algorithm. In the algorithm, when the channel between the primary source and destination is good, the primary user (PU) selects a best sub-channel to transmit its data directly,...
Data encryption is an effective way to ensure the data security in the cloud. To make retrieval of such encrypted data easy for multiple users, searchable encryption in the multi-user setting is addressed. However, it introduces a new critical requirement: access control. Cipher text-Policy Attribute-Based Encryption (CP-ABE) is a promising technique to solve this issue, but it also faces several...
With the growing demands for automotive auxiliary functions, more and more complex applications have been developed based on OSEK/VDX OS. However, how to check the developed applications is becoming a challenge for developers. Although some invaluable formal methods have been proposed to check actual software, these methods cannot be directly employed to check OSEK/VDX applications. In this paper,...
There exists a specific security issue in symmetric searchable encryption that, when doing CKS(Conjunctive Keywords Search), the trapdoors and search results may reveal the relationships between the keywords being searched. For example, if the search result of keywords set A is the superset of keywords set B's, it indicates A is a subset of B by a high chance. Most existing search methods that support...
Currently the development of large scale electric vehicles have become governments' focus of attention. Based on the research of charging and discharging power models, the paper puts forward the island formation strategy and establishes the distribution system reliability model with the electric vehicles. The Monte Carlo time sequential simulation is used to evaluate the effects of different vehicle...
The paper focuses on the study of environmental effects that electric vehicle might cause if they were connected to the distribution grid. A comprehensive evaluation index system is proposed in a quantitative way to describe the environmental effects, such as the pollutant reduction validity and greenhouse gas reduction validity. In order to ensure the economical efficiency of the system, the comprehensive...
To accelerate the processing for the integration, registration, representation and recognition of point clouds, it is of growing necessity to simplify the surface of 3-D models. Simplification is an approach to vary the levels of visual details as appropriate, thereby improving on the overall performance of applications. This paper proposes a saliency detection based points sampling method for mesh...
To accelerate the processing for integration, registration, representation and recognition of point clouds, it is of growing necessity to simplify the surface of 3-D models. This paper proposes a Retinex theory based points sampling method and the effectiveness of the sampling results are demonstrated by the registration. The points sampling considers both the local details and the overall shape of...
With the more uncertainty of the internal and external environment, the enterprises are aware of the importance of the risk early-warning management. However, currently, the development of the risk early-warning management system of enterprises in China is relative laggard. Based on this background, this article builds integrated risk early-warning system the enterprise risk management system. The...
Taking the material flow analysis theory and the ecological footprint theory as the basis of environmental stress assessment of mineral resources exploitation, this thesis builds an assessment index system composed of four index categories of aggregates, bearing capacity, intensity index and efficiency index, which includes nine indexes of region environmental load of mineral resources exploitation,...
Based on the in-depth analysis of urban network's characteristics, a comprehensive model composed of an evaluation index system and a novel evaluation methodology is described for studying environmental effects that planning schemes might cause if they were implemented. The novel model focuses on various typical perspectives, such as pollution emissions, carbon emissions and environmental coordination...
With regards to the best type selection of foundation pit, this paper provides scientific theoretical basis to find the optimization in terms of the analysis and comparison based on the mathematical model. The mathematical model established in this paper observes the construction of several support schemes in a certain place. It determines the optimal support scheme by the comparison of A values,...
How to evaluate the image perceptual quality is a fundamental problem in image and video processing, and various methods have been proposed for image quality assessment (IQA). This letter presents a novel IQA metric, which is based on the image primitive features produced in the earliest processing stage of human visual system. The procedures involved in the proposed method include computing the response...
Toyota suffered the large-scale recall crisis in 2010, but the origin of lean production way of TOYOTA “high quality, low cost, customer first” doesn't change, and it still has great vitality. In this paper, a mechanism model between the lean production and the enterprise competitiveness is built, two cases of well-balance mixed production for various model types are studied, and the experience of...
Node localization in the wireless sensor network (WSN) proves to be a crucial technique. In some special occasions, the precisions of conventional techniques cannot meet our needs due to the multipath influence. In this paper, a novel node localization scheme based on time reversal(TR) has been proposed. We match the signal to the scattering environment thus it will enhance the accuracy of the position...
In order to solve the problem of taxonomies overlap in software vulnerability, a method of vulnerability classifying based on text clustering in NVD (National Vulnerability Database) is proposed, and Cluster Overlap Index is used to evaluate Simplekmean, BisectingKMeans and BatchSom clustering algorithms. 45 main vulnerability clusters are selected from approximate 40,000 vulnerability records according...
The region of economic circle, based on central cities of developed economy and strong urban functions as the core, is covered by the central cities and a number of neighboring cities with which they have strong economic ties. In order to achieve equilibrium state between transportation efficiency of traffic network and transportation requirement of economic circle, the relationship between economic...
The purpose of this study is to determine the most efficient service provider of the real estate online marketing. Nowadays, with the rapid development of residential real estate market, real estate online marketing has been widely applied, and its efficiency evaluation has been an important task in the process of project. Our study first creates the index system and uses this index system to filter...
Meta-level facilities of Maude allow us to develop formal tools with less effort than conventional programming languages. We present a modular implementation of a translator with meta-level facilities of Maude. The translator takes a behavioral specification and produces behaviorally equivalent rewrite theory specifications. The implementation of the translator is modular so that multiple translation...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.