The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By analyzing the binary executable files comparing technique, this paper presents a method to detect vulnerabilities in Windows system based on security patch comparison. The technology is mostly used for detecting vulnerabilities which are patched by Microsoft but there is no clear location and detailed information of the vulnerabilities. Finally, the result of detecting MS15-034 vulnerability experiment...
Elementary school students' mathematical ability plays an important role in the development of their future, but the proportion of low-achieving elementary students in mathematics in Taiwan is high due to their aversion to mathematics. The aim of this study is to establish a learning system to help low-achieving students' learning in mathematics. A 3D game-based learning system was developed in this...
Meta-analysis is a quantitative research method for synthesizing research results. This paper explores the application of meta-analysis in educational technology research from 2000. A total of 37 articles from 14 SSCI journals were selected and analyzed with the basic information of the articles, including the publication year and type of cooperation. Then, the moderator variables, such as grade level,...
Because the phenomenon about unreasonable arrangement of college students' class hour is relatively common, the system designed a public colleges and universities ordering system based on WeChat. This system took use of convenience and openness of WeChat, which can tremendously simplify the development and promotion. At the same time, online ordering for the students provided a convenient way of eating,...
Compared to conventional control systems, network control system has advantages in lower installation costs and easier maintenance. Regarding computer control, a design for network control system is proposed based on CAN (Controller Area Network). Through optimizing the design of the network adapter, computer centralized control algorithm can be applied to a simple network control. After analyzing...
In the face of development trend that a single XML document data volume is increasingly big, involved a core problem of XML data query technology is how to effectively solve result that meet certain query semantic, and label used by corresponding document tree based on XML document is the key factor of affecting the query efficiency. This paper, all experimental processing is completed through MapReduce...
Increasing speed of digital equipment moves the electromagnetic compatibility (EMC) studies into a new point due to their broadband radiated emission characteristics. Beside preventing interception from electromagnetic radiation, it is desirable to identify the information source from the radiated emissions. In this paper, we analyzed the sources of the differences among LCD emanations by checking...
E-Learning is widely accepted to be the next generation of learning approach with extended features, while technology and theory step forward. However, the current model of e-Learning system lacks the scalable and sustainable infrastructure to support extended features. In this paper, we discuss the technical challenges faced in e-Learning and some common problems concerned by content providers. After...
Wind energy is a clean and renewable energy source which is rapidly growing globally. As the penetration level of wind power grows, the system operators need to consider wind power producers as strategic producers whose bidding behaviors will have an impact on the locational marginal prices. This paper proposes a bilevel stochastic optimization model to obtain the optimal bidding strategy for a strategic...
This paper proposes a probabilistic power flow analysis technique based on the stochastic response surface method. The probability distributions and statistics of power flow responses can be accurately and efficiently estimated by the proposed method without using series expansions such as the Gram-Charlier, Cornish-Fisher, or Edgeworth series. The stochastic continuous input variables following normal...
This paper proposes a robust optimization (RO) model for bidirectional dispatch coordination of large-scale plugin electric vehicles (PEVs) in a power grid in which the PEVs are aggregated to manage. The PEV aggregators are considered as a type of dispatchable demand response and energy storage resource with stochastic behaviors, and can supply load or provide ancillary services such as regulation...
This paper focuses on the coordination of a population of thermostatically controlled loads (TCLs) with unknown parameters to achieve group objectives. The problem involves designing the device bidding and market clearing strategies to motivate self-interested users to realize efficient energy allocation subject to a peak energy constraint. This coordination problem is formulated as a mechanism design...
This two-part paper considers the coordination of a population of thermostatically controlled loads (TCLs) with unknown parameters to achieve group objectives. The problem involves designing the bidding and market clearing strategy to motivate self-interested users to realize efficient energy allocation subject to a peak energy constraint. The companion paper (Part I) formulates the problem and proposes...
Logitech made the following statement in 2009: “Since the displacements of a mouse would not give any useful information to a hacker, the mouse reports are not encrypted.” In this paper, we prove the exact opposite is true—i.e., it is indeed possible to leak sensitive information such as passwords through the displacements of a Bluetooth mouse. Our results can be easily extended to other wireless...
To solve the problem of rapid perception of the collected content and non-contact measurement in integral imaging, computer virtual reconstruction algorithm of a three dimensional scene is proposed. Firstly, calculate the combined disparity map of an elemental image array using the region-based iterative matching algorithm according to the distribution characteristics of the homologous pixels in the...
Dempster-Shafer evidence theory provides a useful computational scheme for integrating uncertain information from multiple sources. However, the combination result can be paradoxical when the evidences seriously conflict with each other. In this paper, we present an improved D-S algorithm which verifies the weights of conflicting evidences. Firstly, we calculate the distance between any two of the...
Currently the research of face recognition mostly aim on little internal face of simple environment and carried out on single computer, which limited the application of face recognition. The emergence of big data technology make parallel compute more easy, which make big scale compute work could be accomplished in very short time. An dynamic face recognition system was put forward in this paper. The...
Due to the rapid growth of information acquisition in the era of the Internet of Things (IoT) and Cloud Computing, the concern about the security of private information raises a lot of interests. This paper investigates image sharing based on the concept of (k, n)-threshold strategy according to the Chinese remainder theorem (CRT). A secret image is distributed into n noise-like shadow images preserved...
Energy consumption of an office building is generally divided into energy consumptions from sockets, lights and air-conditioners, which are measured in each room of the office building by three ammeters installed inside, respectively. On the other hand, an office building generally consists of several types of rooms, i.e., office rooms, computer rooms, storage rooms, meeting rooms, etc., the energy...
Cognitive radio is an innovative technology which seeks to provide a new way to extend utilization of available spectrum. The spectrum detection is an essential problem for cognitive radio. Spectrum sensing is an efficient way to detect spectrum holes in cognitive radio network. In this paper, we present cyclostationary Detection Based on Non-cooperative spectrum sensing in cognitive radio network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.