The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the Hess signature scheme, a new efficient ID-based verifiably encrypted signature scheme was proposed. The scheme had the less pairing operations, and adjudicator signed a guarantee to avoid refusing to extract the common signature when resolving conflicts, thereby exchange signature protocol's fairness was enhanced. Compared with the other schemes, the proposed scheme was more efficient...
As many ID-based verifiably encrypted signature schemes have key escrow problem and low efficiency, we propose a new efficient verifiably encrypted signature scheme using pairing operation. The half-trust private key generator generates user's private key components, and user generates another private key in the scheme, thus the key escrow is solved, the private key generator is prevented forging...
Analyses the mechanism of detecting the Inter-turn short-circuit in Rotor winding fault with detecting coil, extracts the signal feature with wavelet transform algorithm. Hybrid programming of MATLAB and VC++ used in this paper directly embed MATLAB M document into the VC environment and make them run normally without MATLAB. The signal collecting, system frame constructing and interface drawing can...
The traditional firewalls are static and passive and they have been unable to meet the security requirements of the increasingly complex network environment. According to the biological immune principle, we present an active firewall model with multi-layer based on immunological principle and introduce the method and technique used on each layer of the firewall. The firewall will protect the computer...
Requirement changing control and its sphere of influence analysis are requirements engineering force to be resolved. Based on CBD, this paper proposed the relevant theory about requirement evolution process based on the Evolutionary Component of Software Requirement (SR-EC), analyzed the ripple effect and its dissemination during the requirement evolution by using feedforward neural network, this...
Intrusion detection is actually a classification problem of detecting the normal and abnormal data separately. However, the data needed for intrusion detection are very large and complex. In this paper, we solved this problem very well, using SVDD (support vector data description) algorithm, and carried out simulation experiments in the network datasets, got a high detection rate and a low false alarm...
Based on the ARM7, the intelligent circuit breaker model was designed. As the core of the Samsung S3C44B0X, electrical signal collecting and processing are intelligently controlled. The functions of electrical parameters measurement, on-line detection and long- range communications are realized. The system is designed in modular, divided into data acquisition, switching control, data analysis, forecasting...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.