The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays the Internet is closely related to our daily life. We enjoy the quality of service the provided by The Internet at the same time, but also suffer from the threat of network security. Among the many threats, SQL injection attacks are ranked in the first place. SQL injection attack refers to “when the user sends a request to the server, the malicious SQL command will be inserted into the web...
Accurate fault location is beneficial for the stability of power distribution network. With the access of distributed energy resource, such as distributed generations, electric vehicles, controllable load and so on, traditional fault and protection device has been unable to completely adopt to the new situation of distribution network protection, which requires new technologies and devices. In this...
Power electronic systems do not always operate under ideal condition because of the conflict between computational efficiency and simulation precision. In addition, there is significant computation burden in real-time simulation of voltage source converter closed-loop control. Hence, the power electronic real-time co-simulation design based on FPGA+DSP+PC architecture is put forward. The design adopts...
Dual basis functions (DBFs) have been used widely in conjunction with primary basis functions (PBFs) in the Method of Moments (MoM) for solving electromagnetic integral equations. The DBFs are designed approximately orthogonal to the PBFs, and hence, the DBFs and PBFs reside in different functional spaces. This results in an asymmetry in the impedances of Magnetic Field Integral Equation (MFIE). A...
Geology field trip is an important teaching step for the majors of geology, natural resources prospecting engineering and geographical sciences to learn geology knowledge and grasp field working skills. There are some problems in the traditional geology field trip teaching. Inspired by the Google Maps Street View, the author proposes applying the Image-Based Rendering (IBR), a branch of Virtual Reality...
In recent years, the network infrastructure has been improved constantly and the information techniques have been applied broadly. Because the misuse detection and anomaly detection methods both have individual benefits and drawbacks, this paper supports the point that combines these two methods to construct the whole intrusion detection system by data mining technique. In this paper, we focus on...
Complexities and uncertainties is the main problem for software developers, while traditional design methods cannot solve this problem very well. However, Model-Driven Development can be a good solution to this problem. In this paper, a lymphocyte tracking system is realized based on MATLAB/Simulink and the TMS320DM642 platform using MDD; then the performance of the code that generated from the Simulink...
This paper introduces a new development flow named Model Based Design for biologic signal processing system designing on FPGA. An adaptive noise canceller based on LMS (Least Mean Square) algorithm is implemented on FPGA using this flow. The canceller removes the power-line interference from electrocardiogram (ECG) signal successfully. Finally, a performance evaluation and hardware resource utilization...
This paper presents a design approach of adaptive filter based on independent component analysis (ICA) algorithm for FPGA implementation. The design utilizes modular concept, and several modules can be put together for complex applications. Simulink/System Generator is used for FPGA hardware design based on ICA algorithm. The ICA-based filter is successful for removing noise component from audio signal.
The author designs and implements a real-time monitoring system for inspecting car with MapX based on the technologies of RFID, GPS and GIS. In the thesis, the architecture and function frame are introduced, then the key technologies of implementation are discussed in detail. The practice proves that the system is stable and efficient. The system could not only offer real-time and precise position...
In filed geological observation, field outcrop reflects the lithology, the stratum attitude, the diastrophism and the mineral resource directly or indirectly. It has great significance on geological research. It is also the most important data in Geological Information System. However, there are some disadvantages in current system such as bad visibility and weak User Experience, etc. Because the...
Ajax is one of the core technologies of RIA, which implements the asynchronous interaction between the browser and the Web server. In traditional field geological map system of B/S mode, the disadvantages such as low visiting speed and bad security of such kind of field geological map system have emerged. To solve the problem of low visiting speed caused by the large-volume data of filed geological...
Mining hidden valuable knowledge from financial data is more and more important to students in universities of finance and economics. However, data mining curriculum learning is difficult for them because of the lack of computer special skills. This paper proposes a teaching model based on schema theory to teach data mining curriculum. It introduces characteristics of data mining curriculum, and then...
Vehicle License Plate of GA36-2007 has overcome most defects of GA36-1992, but there are still some disadvantages on visibility, uniqueness and intelligence. At present the automatic vehicle identification system is limited on image identification technology, which still has many shortages. In this paper, we propose a new type design of vehicle license plate and develop a matched secure automatic...
Multicast is an efficient and natural way of communicating information via Internet, but its security is identified as one of the most important problems to solve for the successful deployment of group communication applications. First of all, in secure multicast group members must be able to verify that the data received is indeed sent by an authorized sender, and this is called dasiadata origin...
Anycast is a communication mode in which the same address is assigned to a group of servers and a request sent for a service is routed to the 'best" server. Because the group management and the routing protocol in the anycast are not so mature, there are distinct and significant security vulnerabilities in both the anycast model including denial of service, theft of service, eavesdropping, and...
Because group management protocol and routing protocol of anycast are not so mature, when communicating it is easy to be attacked by malicious programs such as masquerading and denial of service, etc. Aiming at security of anycast, we propose a new secure anycast group management architecture based on others' research in this paper. We setup a Certificate Authentication Server in the group management;...
In order to overcome the shortages of visibility, uniqueness and intelligence existing in traditional vehicle license plate, we propose a new type design of license plate and develop a matched secure automatic identification system. We adopt new accumulating energy self-luminous material and RFID technology in the system, moreover secrete starting address and random number initialization are implemented...
Multicast authentication is a vital component in secure group communications, but authenticating real-time multicast streams over lossy channels or unreliable networks is very difficult due to the packet losses, expensive overheads and high delays. So this paper introduces a novel approach to multicast authentication based on LMCM (Layered Multiple Chaining Model). By the theoretical analyses, it...
Anycast is a new communication mode in the standards of IPV6. A host can communicate with the "nearest" member in the destination group through anycast. Because the group management and the routing protocol in the anycast are not so mature, when communicating it is easy to be utilized by some attacks such as masquerading and denial of service, etc. Utilizing the correlative secure technology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.