The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a database system with tenant technology on Eucalyptus platform for a rural drinking water supply system. This database use a sharing model to store data and a tenant placement algorithm to properly put tenants in virtual machine therefore it can ensure the service quality for the tenants with the minimum use of hardware resources. The experiment results show that the tenant placement...
Currently, cloud computing is experiencing the rapid development. However, cloud migration is firstly required for the adaptation of some application systems to new cloud computing environments. Consequently, theories and strategies of the cloud migration research have emerged to be hot spots. In spite of the availability of many successful economic plans and technical schemes in this field, few guiding...
With the security situation in Cyberspace constantly becoming worse, Cyber threat detection has attracted a lot of researching attentions. In this paper, existing detection technologies are firstly reviewed. Secondly, a framework of capturing the abnormal traffic of botnets is proposed. Major modules and key detection techniques are presented at the same time. The hidden threat detection in physically...
Out of step with the rapid growth of China's electricity load demand, the infrastructure of power grid in many areas is not strong enough to insure the security of power system operation. In this case, considering the strict N-1 conditions of lines and transformers, the situation that there is no feasible solution for the security-constrained unit commitment (SCUC) might occasionally occur. In order...
The leak of sensitive data on computer systems poses a serious threat to organizational security. Organizations need to identify the exposure of sensitive data by screening the content in storage and transmission, i.e., to detect sensitive information being stored or transmitted in the clear. However, detecting the exposure of sensitive information is challenging due to data transformation in the...
In this paper, an efficient video encryption scheme is proposed for protecting H.264 bitstream. The issues on the compressed domain video encryption have been pointed out and fully addressed. In the proposed scheme, only the most significant bits for video reconstruction in H.264 bitstream are extracted and encrypted, to optimize the trade-off between security level and computational complexity. For...
The algebraic method with computerized symbolic computation is applied to construct a series of travelling wave solutions for the generalized KP_BBM equation. Compared with most existing symbolic computation methods such as tanh method and sine-cosine method gives new and more general solutions. And the result implies that the tupes of the solution not only depend on the parameters of the nonlinear...
Relative stability concept of balanced solution is introduced to Hua's macroeconomic model in the paper, we researched necessary and sufficient condition and meaning of relative stable balanced solution for Hua's macroeconomic model, and introduced there isn't causal indeterminacy for Hua's macroeconomic model which have relative stable balanced solution, so we solved the problem that imperfection...
The worm is still one of the most serious threat to the Network security. The logical worm propagation model could characterize the propagation of Internet worms more exactly, and could be more helpful to carry out the worm protection, detection and suppression technology research. In the initial phase of this paper, a heterogeneous network oriented worm propagation model namely Enhanced-AAWP was...
With the most concentrated netizens and sound network infrastructure, campus has its own superiority and characteristics in campus e-commerce development. Combining SWOT method, this paper analyzes the internal merits and demerits as well as external opportunities and challenges in campus e-commerce and puts forward some relevant strategies on the development of the campus e-commerce.
As the development of software development and software engineer, software becomes more and more complicate, the application domain is also getting more and more widespread. Therefore, people pay more and more attention on software quality. In numerous evaluation standards of software quality, software reliability is one of the most important, and the software security is the most difficult to forecast...
A major issue in the resource allocation problem, also known as the data and service allocation problem, in a networked organization is the key problem in Web services distribution. A detailed investigation is carried out of the resource allocation model of allocating data and application services across a distributed networking system. The data and application service allocation problem is modeled...
According to the low efficiency of system testing, the longer test cycle, the single form of the test results, no standardized documents of tested results and other drawbacks of the traditional penetration testing system, this paper design and implement of an XML-based penetration testing system. The system uses SNMP, PING, Telnet and other ways to explore resource, is based on OVAL, CVE to assess...
PRESENT, proposed by A. Bogdanov et al. in CHES 2007, is an ultra-lightweight symmetric cipher for extremely constrained environments such as RFID tags and sensor networks. In this article, a representative platform, 0.25 μm 1.8 V standard cell circuit is proposed to complement the PRESENT, the simulation-based ASIC experimental environment is built to acquire power data. According to the fact that...
This paper consists of a survey of various e-business, e-marketplaces, graphics and imaging processing, pattern recognition, computer vision, access control, authentication, authorization, etc. applications based on the intelligent computing, and also a summary of the recent techniques such as still artificial neural networks, swarm intelligence, artificial immune systems, fractal geometry, artificial...
Recently trusted network becomes hot topic in network security domain. By introducing the concept of "trusted attribute", we proposed grade division scheme, which was called hierarchy trusted network framework (HTNF). Also we detailedly explained the partition rules of trusted attributes and the approach to grade division. We discussed the potential applications of presented framework, and...
Collaborative design is one of core processes for networked manufacturing, so how to safely transfer design information in the network has important significance. In order to provide the confidentiality of transmission information on the level of design team in collaborative design system, a new broadcast encryption scheme based on designerpsilas identity is presented. The new scheme is based on broadcast...
Although trusted computing group proposed the concept of trusted remediation, the detailed implementations are not given, and also how to build isolated environment was not involved. A new trusted remediation model called TRNM was put forward. Also the implementations of the presented model were given. Moreover, the communication and authentication process of presented model were discussed. Simulations...
Based on the ideology of "using the monitor data to reflect the production safety and using the risk analysis and safety evaluation methods to guide safety management to realize the objection of mine coal safety state warning and assistant decision-making support system", with Bofang coal mine of Shanxi Orchids Corporation's practical experience in safety state management, we set up a warning...
Based on artificial immune theory, a new model of active defense for analyzing the network intrusion is presented. Dynamically evaluative equations for self, antigen, immune tolerance, mature-lymphocyte lifecycle and immune memory are presented. The concepts and formal definitions of immune cells are given, the hierarchical and distributed management framework of the proposed model are built. Furthermore,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.