The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cyberspace is a complicated system of computer, network and other information environments. To evaluate its security defence ability, the offensive and defensive features in cyberspace were discussed in this paper, firstly. Then index system and evaluation model were proposed. Based on analytic hierarchy process method, cyberspace security defence system was decomposed from its ability aspect. Fuzzy...
With the growth of data center (DC) size, the network topology becomes complicated and the maintenance workload increases significantly. To evaluate the workload, this paper presents a metric named MNT, Maintainability of Networking Topology. MNT consists of numbers of definitions of DC network model, such as cost of maintaining a node, cost of maintaining a link and recursive level. They can quantify...
In view of the occlusion problem between virtual scene and real object, we propose an augmented reality method based on occlusion recovery. To avoid the negative influence of shadows on occlusion subtraction, we firstly design a occlusion subtraction approach for foreground objects. Secondly, we recover the foreground occlusion based on stereo vision and interpolation technology. Finally, we recover...
A method of clustering ensemble is transforming the clustering ensemble problem into the clustering problem among objects in a nominal information table. The basic problem is to give a method which is used to calculate the distance between the nominal attribute value. In this paper, DILCA method is adopted to calculate the distance between the nominal attribute value. Using the correlation between...
As the system size expansion, P2P-based E-Learning system where study participants can not effectively found the learning resources, can not reflect the dynamic learning characteristic of the participants, and individualized. Based on the analysis of semantic web and ontology modeling, we proposed learning resources personalized recommendation system based on semantic P2P technology to improve the...
In view of existence problems in present Educational resource management system, Educational resources management platform based on the knowledge management was supplied in this paper. And the overall construction design proposal of Platform was given. The characteristics of knowledge management and the function of each component in the structure is analyzed. Knowledge Evaluation and knowledge ranking...
Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves the aim that SVM can accurately predict the abnormal state of system. By the use of this method, the limitation of traditional machine learning method...
This article presents a precise synchronization algorithm based on status tracking and locking mechanism. Tracking execution state of triple computer and running state of time base counter through dual state machine not only can implement precise synchronization of TMR computer, making status synchronization precision and time-base synchronization precision below 30ns, but also save valuable interconnection...
We present an improved texture synthesis algorithm over arbitrary surfaces in this paper. The algorithm adopt the searching strategy of restriction degree to compute the texture coordinates of each triangular patch. It reduces the restrictive conditions as searching for the best matching patches and debases the complexity of the algorithm at the same time. Then aiming at the local boundary unmatching...
In the research of content-based image retrieval, the former work was focused on the choice and the extraction of ocular features principally. But this kind of retrieval system cannot meet the expectations of practical use, because it can neither make full use of people's subjectivity, nor integrate low-level image features with semantic contents of images. In order to solve this problem, this paper...
An integer wavelet based multiple logo-watermarking scheme for copyright protection of digital image is presented. A visual meaningful binary logo is used as watermark. The process of watermark embedding is carried out by transforming the host image in the integer wavelet domain. To construct a blind watermarking scheme, wavelet coefficients of HH and LL bands are modified depending on the watermark...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.