The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
MD5 and SHA-1 are two known message digest algorithms widely used in the information security. A novice method of evaluating them is proposed here to analyze the collision rate of those two message digests. Computer-simulating technology is a key to this method and used to establish the statistical evaluation model in which data blocks are produced by a random number generator and corrupted by natural...
A new timing evaluation model based on random number generating mechanism is proposed here to analyze the time-consuming of the known cryptographic algorithms: triple-DES, AES and RSA. In this model for evaluation, there are two evaluating modes: different plaintexts in the same key (DPSK), the same plaintext in different keys (SPDK). As the basis of the evaluating model, the plaintext and the corresponding...
It is well known that information retrieval systems based entirely on syntactic contents have serious limitations. In order to achieve high precision and recall on IR systems, the incorporation of natural language processing techniques that provide semantic information is needed. For this reason, by determining the semantic for the constituents of documents, a clustering method is presented in this...
Text categorization is an important research direction of current information retrieval. The traditional text classification method use the support vector machine (SVM) and the Bayes classification algorithm (etc). On the basis of Rough Set on text categorization, this paper put forward the idea of variable precision rough set model for Chinese text categorization, which use the attribute reduct algorithm...
It is beneficial, for both customers and carriers, to provide optical virtual private network for workflow-based distributed computing applications. We formulate the schedule system and also propose a rescheduling scheme under dynamic shared OVPN scenario.
This paper proposes one kind of MD5-based error-detecting mechanism. The 128-bit MD5 code is compressed into 16-bit error-detecting code in order to substitute for that computed with CRC or checksum. In this mechanism, computer-simulating technology is used to simulate natural and manual attacks. The evaluation method is to corrupt the data of each packet which is produced by a random number generator...
The novelty method is used for analyses and diagnoses of product line. The virtual design and modeling method are introduced through the real case. In simulation environment, it showed that there were some bottle-neck processes because of defective manufacturing technology. After produce line rebuilt in simulation, the average manufacturing technology time was about 41.2s. The utility ratio of machines...
In this paper we use software engineering methods and Shannon's communication model to investigate computer network architecture. We get a new type of computer network architecture and some significant conclusions. At the first phase of the life cycle of software engineering, that is, requirement analysis, we get a series of unexpected conclusions. For example, a variety of computer network architectures...
We propose a novel resource demand model and a BFS-based algorithm for multi-domain L1VPN. The proposed model and algorithm are implemented on AMSON testbed by combining PCE and service plane, and verified by experiment results.
Voltage flicker and harmonics are the types of power quality problems that are introduced to the power system as a result of arc furnacepsilas very large power input ratings. In order to propose solutions to minimize the adverse effects, developing an accurate electric arc model has a much needed task. Hence, a new time domain electric arc model is developed on the basis of the conservation of energy,...
A comparative study of graphene nanoribbon MOSFET (GNR-FET) using the extended Huckel theory (EHT) and tight-binding (TB) is conducted within the frame of the self-consistent ballistic non-equilibrium Greenpsilas function (NEGF) formalism. The bandgap variation in armchair-edged GNR (aGNR) induced by the length of the edge bond, as well as the transport characteristics with bond length relaxation,...
Trust is a critical issue in e-commerce and e-service environments. Some applications (such as eBay) have introduced various trust management mechanisms to provide valuable information to buyers prior to placing orders and making payments. While trust has been actively studied in the research community, some malicious sellers and fraudulent transactions still widely exist. A typical attack is to entice...
The reputation-oriented trust issue is critical to e-commerce applications and has drawn much attention from both industry and the research community. Existing e-commerce systems have introduced trust management mechanisms that provide some rating information to customers. However, more comprehensive mechanisms should be provided to more precisely depict the trust level of sellers on potential transactions,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.