The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the wide applications of tree structured data, such as XML databases, research of mining frequent sub tree patterns have recently attracted much attention in the data mining and database communities. Due to the downward closure property, mining complete frequent sub tree patterns can lead to an exponential number of results. Although the existing studies have proposed several alleviative solutions...
Physical layer security in wireless networks has received increasing attention in recent years. In this paper, we consider multiple-input single-output (MISO) fading wiretap channels, where the transmitter utilizes artificial noise-aided precoding (ANaP) transmission strategy to maximize the secrecy capacity of the channel. When the channel state information (CSI) of Eavesdropper's (Eve's) channel...
The intelligent mobile video supervising system based on DSP are introduced in this paper. Based on TMS320DM642 embedded platform, video capture and processing functions are designed. Based on streaming media technology and mobile communication technology, video relay and distribution functions are designed. Based on windows mobile, video monitoring and control functions are designed. With embedded...
We conceive a fair resource allocation scheme for multiuser multiple relay aided OFDMA networks. We study the optimization problem of subcarrier assignment under outage constraints. The outage constraints are transformed into the power constraints of the relays. A priority based proportional fairness multiuser scheduling approach is employed to achieve the complimentary rate fairness of all users...
The concept of capacity coefficient is introduced to evaluate the processing capacity of electromagnetic forming (EMF). An EMF system design method, including capacity coefficient design, inductance design and strength design, is developed by a finite element method. The geometry and size of the driving coil are optimized by the capacity coefficient design. The inductance design is aimed at obtaining...
With many security events taking place in recent years, scientists have realized vulnerability management is an important field and it brings critical effects to many information systems and services. One topic in this field is to identify similarity relationship between vulnerabilities. It can help us to alarm potential attacks. In this paper, we propose a text mining approach to compute a similarity...
On the basis of analyzing the disadvantages of a general-purpose method for the server program design, a new method of the serial server program design based on the semaphore in Linux is introduced. Then, an implementation framework proposed by this paper is depicted. The number of the child processes which produced by the server that designed by this methods will no longer have a linear correlation...
Current computing systems often employ sophisticated adaptation mechanisms that enable them to deal with overload conditions. Reduction of Quality (RoQ) attack, a novel category of attack being proposed recently, which exploits the adaptive behavior exhibited by various adaptation mechanisms, can cause different forms of damages to the victim system. For the widely used of adaptation mechanisms, RoQ...
A real-time discrete event simulation platform for Internet end-system targeted attacks, EA-CPNsim, is presented in this paper. This platform provides support for modeling the targeted end-systems behavior and the attack effect, helping the system administrator chooses and verifies the defense schemes, and evaluating the system consequences. EA-CPNsim is constructed based on the CPN tools, a widespread...
A novel product data management mode, CVPDS (Collaborative Visualization Production Development System), which is based on the cooperative design and visualization technology, is proposed in this paper. It also analyzes and establishes the system frame, discusses the key technology of cooperative visualization development and the implementing management flat; studies the realization method of 3D virtual...
A novel structure of the integrated cascode crystal oscillator is presented by analyzing the discrete oscillator circuits in this paper. A temperature-independent voltage source, which is suitable for integrated circuits, was used for biasing of the buffer amplifier, while eliminating the bypass capacitor. Both the oscillator circuits and the buffer amplifier use the common divider resistance. The...
In active noise control, the Filtered-x LMS algorithm has been widely used,but it is inefficient to the nonlinear noise control; then the Filtered-s LMS algorithm using the FLANN structure to solve the nonlinear problem, but these two algorithms need identification of secondary path and may converge to local minima; this paper using FLANN structure and genetic algorithm (S-GA) ,which don’t need identification...
In response to the roller bearing fault of the engineering vehicle, the excellent characteristics of time-frequency of wavelet packet is used to decompose the fault signal. Then we extract the necessary of the fault signals. Finally, we carry out the recognition of fault types using multi-class support vector machine and dynamic clustering algorithm brought forward in the paper. It is such a algorithm...
The paper aims at present the acute toxic effect of water-accommodated fraction (WAFs) of No.0 diesel oil on embryos and larvae development of sea urchin, Hemicentrotus pulcherrimus by adopting embryonic development technology. The experiment was carried out with six concentrations. The results indicate that the water-accommodated fractions have evident toxic effect on two - arm and four - arm larvae...
Aiming at the overlapping phenomenon that exists among the cells in the actual mice macrophages image, this paper presents the method of image segmentation based on Otsu threshold and watershed of distance transform. The image is first segmented by Otsu threshold algorithm. Then erosion and dilation morphological operators are used to get rid of noises. Finally, the watershed algorithm based on distance...
Knowledge visualization and retrieval are the key techniques to implement effective knowledge management. Traditional research on knowledge map emphasizes on building global view of knowledge base, but ignores its support to knowledge retrieval. In this paper, a searchable knowledge map model is proposed. Based on this model, we extent the search-ability of knowledge map and propose three practical...
An important target in ontology evolution is to guarantee ontology consistency when changes occur. Most of previous work focused on providing general methods for handling abstract changes, but ignored detailed methods for the specific changes, especially those property range changes which often arise in practice. This paper presents a process to apply a request change, by focusing on the specific...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.