The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Localization method based on position fingerprint can effectively solve the problems such as high dependence of model and low positioning accuracy in robot auditory system. However, this method requires a large number of reference points to achieve high precision positioning. To solve the problem of low precision under low fingerprint density, a position fingerprint localization method based on linear...
SQL Injection Vulnerability (SQLIV) has been the top-ranked threat to the Web security consistently for many years. Penetration tests, which are a most widely adopted technique to detect SQLIV, are usually affected by testing inaccuracy. This problem is even worse in inferencebased, blind penetration tests for online Web sites, where Web page variations (such as those caused by inbuilt dynamic modules...
The penetration test is a crucial way to enhance the security of web applications. Improving accuracy is the core issue of the penetration test research. The test case is an important factor affecting the penetration test accuracy. In this paper, we discuss how to generate more effective penetration test case inputs to detect the SQL injection vulnerability hidden behind the inadequate blacklist filter...
The hosting of databases on virtual machines (VMs) has great potential to improve the efficiency of resource utilization and the ease of deployment of database systems. This paper considers the problem of on-demand allocation of resources to a VM running a database serving dynamic and complex query workloads while meeting QoS (Quality of Service) requirements. An autonomic resource-management approach...
Discrimination power analysis (DPA) is a statistical analysis combining discrimination concept with discrete cosine transform coefficients (DCTCs) properties. Unfortunately there is not a uniform and effective criterion to optimize the shape and size of premasking window on which the effect of DPA excessively relies. Proper premasking is an auxiliary process to select the feature coefficients that...
Directing at the complex structure, cockamamie production technology and great operation difficulty of vertical roller mill, this paper constructs the fault expert system to guide and optimize the grinding process. First, the expert database is established with fuzzy cluster analysis, principal component analysis (PCA) and tendency analysis. With support vector machine (SVM) regression, the multiple...
Privacy is considered to be a critical issue for providing high quality ubiquitous network services to users over the Internet. User's privacy should be protected and access to privacy information must be controlled in accordance with user's privacy preferences. Existing privacy-aware access control strategies often store all the privacy access control policies on the server side and thus fail to...
XML database has been paid increasingly more attention by each institute or database firm along with the rapid development of XML technology. To evaluate the performance properly occupies an important position in XML database development, selection and using. This paper studies the proposal to use TPC-C in XML database benchmark, as well as specializes in the table schema, queries especially directed...
Because of the excellent performance of the HMM (hidden Markov model), it has been widely used in pattern recognition. Due to the high false alarm rate in the classical intrusion detection system (IDS) based on HMM, a fuzzy approach for the HMM, called fuzzy hidden Markov models (FHMM) is proposed. it is introduced with the fuzzy logic to the HMM. The robustness and accurate rate of the IDS based...
Due to the continuously sintering furnace affected by many factors, it is very difficult to establish a precise mathematical model, designed for the expert control system based on temperature field analysis for the continuously sintering furnace temperature control. The analysis data were stored in the database of expert system as correct values of the continuously sintering furnace temperature parameters...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.