The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Serious concerns have been raised about stealthy leakage of users privacy in mobile apps, and many recent approaches are also proposed to detect privacy leak in these apps. However, more and more benign mobile apps have to send out user's privacy for legitimate functions or user intention. To evade detection, new mobile malware starts to mimic privacy-related behaviors of benign apps that provide...
The QR decomposition (QRD) has been extensively adopted in the transceiver processor of Multiple input multiple output orthogonal frequency division multiplexing (MIMO-OFDM) systems. The antenna configuration of future MIMO-OFDM system is very flexible. Therefore, the QRD architecture should also has the flexibility feature to decompose various dimensional channel response matrices. However, the existing...
Many-core system is main architecture trend currently. One of the dominating challenges for on-chip manycore system is the memory wall. However traditional research primarily focus on the limited bandwidth. To solve this problem, many-core system is aided with large cache, and a lot of complex approaches about memory and cache are adopted aiming at relaxing the pressure of bandwidth and improving...
P2P technology has been widely applied in many areas due to its excellent properties. Some botnets also shift towards the decentralized architectures, since they provide a better resiliency against detection and takedown efforts. Besides, modern P2P bots tend to run on compromised hosts in a stealthy way, which renders most existing approaches ineffective. In addition, few approaches address the problem...
The rapid development of Peer-to-Peer (P2P) technology brings challenges to quality of service (QoS), network planning and access control. An accurate classification of P2P traffic is vital for addressing those challenges. Traditional port-based and payload-based methods fail to cope with emerging port disguise and payload encryption techniques. In this paper, we present Peer Sorter, a system for...
The emerging of virtualization and cloud computing requires a solution to ensure virtual machines' security. With virtual machine introspection (VMI) technology, it is possible to transparently monitor the virtual machines. Currently, most solutions concern only one particular aspect of virtual machine monitoring, such as network or memory. In this paper, we design and implement a comprehensive monitoring...
To encode the malware behavior reports to accessible forms for further automatic analysis methods like data mining and machine, we proposed a lightweight design of malware behavior representation named BBIS (Bytes-Based Instruction Set), which can utilize least single-byte characters to represent the items in dynamic behavior reports. BBIS is able to build flexible mapping table for different application...
Being the core technology of IaaS (Infrastructure as a Service) cloud computing data center, server virtualization can virtualize servers with surplus resources to multiple virtual machines with diverse configurations according to users' demands. This can significantly improve the utilization of computing resources. Traditional intrusion detection techniques are no longer suitable for security detection...
Geometric constraint problem can be transformed to an optimization problem. We can solve the problem with niche improved particle swarm. Classical particle swarm optimization is likely to be trapped into local minima as well as premature. A niche improved particle swarm optimization (NIPSO) based on niche theory was developed. After the update of the particle velocity and position, the outlier particle...
We study the frequency-dependent nonlinear optical properties of the orthorhombic (wurtzite) ternary nitride tetrahedral semiconductors, i.e. ZnGeN2 and the related ternary nitrides based on the Linear Augmented Slater-Type Orbitals (LASTO) method.
This investigation proposes a small ultra wideband (UWB) antenna for wireless universal serial bus (USB) dongle application. Halving the symmetrical triangle antenna to miniaturize antenna area and optimize the structure of ground and radiator, a new asymmetrical triangle UWB antenna is created. The impedance bandwidth of proposed antenna ranges from 2.77 to 10.64 GHz in measurement, which covers...
The starting point of Motuo highway is Zhamu Bridge in Zhamu Town of Bomi County, and the end point of it is Lianhua Square of Motuo County. The whole length of highway is 117.3km. After Galongla Tunnel has been completed, a series of landslides along the highway can not be ignored. According to the field observation in 2006, 2007 and 2008, there were 66 landslides and rockfalls. In this paper, the...
The selection of rural railway route requires the utilization of multi-source data such as topography, geology, environment and remote-sensing data, etc.. Based on the data capture, integrative management and spatial analysis of ARCGIS, the multi-source information management system on railway geological environment has been designed. In this system, multi-source data of different data type, scale...
Based on analyzing the advantages and disadvantages of existing multi-class support vector machines, we construct an improved multi-class support vector machines based on binary tree structure, adopting a new metrics to determine the classification order which determines each sub-classifier and its location, the new metrics synthesizes mixed degree and distance between classes. Then we do a measuring...
A small Monopole antenna, which suitable ultra wideband and wireless LAN application is presented. The proposed antenna is designed to operate over 2.34 to 12 GHz for return loss values below -10 dB in the whole frequency range. The proposed antenna consists of a diamond shaped radiator and rectangle ground. Good return loss and radiation pattern are obtained in the frequency band of interest. The...
In the paper, a printed small antenna for ultra-wideband (UWB) communication system application suitable for integration in wireless universal serial bus (WUSB) dongles is presented. The proposed antenna has bandwidth of 8.41 GHz form 2.74 GHz up to 11.15 GHz with return loss values below -10 dB in the whole frequency range. The proposed antenna consists of two symmetrical triangle metals and rectangle...
This paper describes a doubly balanced Gilbert Cell mixer designed in CMOS technology. A 100 mV input signal was applied at both RF and LO port at different frequencies and their simulation curves were studied, the output voltage is approximately 300 mV. Gilbert cell mixer was designed till to the layout. For the IF filter, passive elements were studied.
The classification of unstructured P2P multicast video streaming is the premise for playing online linkage and real-time evidence in the process of network monitoring management. A new classification method is demonstrated, and some real-time protocol behavior features are figured in this paper, which is found out through distinguishing packet type and transmission direction. With these accessible...
The growth rate and kinetics of the intermetallic formation, intermetallic grain morphology, and micro-structural evolution for the solder with I-Ag, OSP and ENIG finish were investigated. Comparing the intermetallic thickness growth rate in Sn3.5Ag0.7Cu solder joint on PCB Cu metallizations with I-Ag, OSP and ENIG finish, the OSP had the highest intermetallic growth rate followed by I-Ag and ENIG...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.