The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SQL Injection (SQLI) is an attack method that is easy to achieve but often leads data leak and malicious control of the system, so anti SQLI is very important for applications using database. This paper proposes an algorithm for detecting SQLI based on statements sequence digest (SSD). Abstract SQL statement, SSD and its calculating method are defined; algorithms for building SSD and detection SQLI...
To reduce the dimensionality of the Gabor feature, this paper explores texture information from Gabor coefficients and presents two kinds of new Gabor texture representations for face recognition: Gabor real part-based texture representation (GRTR) and Gabor imaginary part-based texture representation (GITR). Specifically, GRTR and GITR are obtained using the generalized Gaussian distribution (GGD)...
An extension of local binary pattern, named Number Local binary pattern (NLBP), is presented for texture analysis. First, the method divides the patterns into uniform and non-uniform according to the uniform measure. Second, the non-uniform pattern is further divided into different groups based on the numbers of ‘1’ bits and ‘0’ bits. The experiment shows that NLBP achieves a good texture discrimination...
With the development of the third generation wireless communications technology, application fields of GPRS (General Packet Radio Service) are expanding. The data collection and wireless technology form wireless data acquisition and launch systems. It is widely used in water, electricity, gas and other auto-detection systems. In this paper, two parts are included. In hardware design part, wireless...
With the rapid development of network technology, the traditional centralized network management can't meet the needs of network management any more. So network management will evolve from centralized model, where all the management functions take place on a single network management station, to distributed models where management functions are distributed over a large number of nodes. In this paper,...
One of the most challenging tasks for face recognition lies in the so-called one sample per person problem. Numerous face recognition techniques will suffer serious performance drop or even fail to work in this situation. To solving it, a method based on wavelet transform and virtual information (WV-based) is proposed in this paper. First, it performs the wavelet transform on face images, then it...
The intelligent computer assisted instruction (ICAI) is now a hot topic of computer assisted instruction. One of the difficulties is how to judge static and dynamic behavior of students in order to adjust teaching strategies according to individual difference of students and to raise learning effect. In this paper, the structured student leaning model based on ICAI is put forward, so that teaching...
One difficulty in distance teaching is how to determine static and dynamic abilities of student, which teaching strategies can be adjusted according to individual differences and learning effect can be improved. This paper proposes a structured student learning model. Teaching system can teach students according to their aptitude based on this model. The distance teaching adaptability can be achieved...
Model transformation is the core of MDA and plays an important role in implementing MDA especially. On the foundation of defining the core concept of MDA and dividing the model into three kinds of JPIM (Platform Independent Model of JEE) , JPSM (Platform Specific Model of JEE) and JCM (Code Model of JEE) afresh according to JEE (Java Enterprise Edition) platform, this paper puts forward an approach...
With the rapid expansion of network, the centralized strategies based on ANMP are not appropriate in large-scale networks. This paper analyses the structure and mechanism of the active network management system, introduces a pattern of active network management, and studies structure, management mechanism, design outline and each connection of the management system. This paper also studies the network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.