The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To the best of our knowledge, all most previously proposed schemes based on smart cards which have the tamper resistance assumption for the smart card. However, many researches have shown that the secrets stored in a smart card can be breaches by analyzing the leaked information or monitoring the power consumption. This article will propose a new mutual authentication scheme based on nonce and smart...
In order to realize efficient information sharing and interoperability among varying platforms or large-scale systems, in this paper, we present an approach to SOA-based service integration which makes the service granularity flexible to change. Through choreographic description of local fine-grained component service, and provision of this description in form of SOA to an entity that executes it,...
This article takes example from the related literature and summarizes the influence factor of undertaking software outsourcing to the software industry competitive power to human capital, market concentration, market demand and corporate R&D ability. We research how software outsourcing affects Chinese software industry competitive power through the four intervening variable in theory and empirical...
In recent year, along with the fast development of service industry, the function of undertaking international transfer of service industry to the promotion of human capital is appearing. This article first analyzes how the international transfer of service industry promotes Chinese service industry's human capital from theory angle, and then we further check the preamble theoretical analysis from...
In this paper, a new image compression algorithm that is based on DT-CWT and SPIHT is presented. Approximate shift invariance, good directional selectivity, computational efficiency properties of DT-CWT make it a good candidate for image compression. A modified SPIHT algorithmic, named as simple SPIHT, is introduced in order to increase its efficiency for image compression. The proposed simple SPIHT...
When city emergencies happen, one of the most important tasks of emergency rescue is to find the shortest path to the emergency in shortest time, scientific and rational path plays an important role in improving rescue efficiency. According to the needs of city emergency rescue and basing on the analysis of the classical algorithm for solving the shortest path problem (Dijkstra algorithm), this article...
Computerised facial aging estimation, which has the potential for many applications in human-computer interactions, has been investigated by many computer vision researchers in recent years. In this paper, a feature-based discriminant subspace is proposed to extract more discriminating and robust representations for aging estimation. After aligning all the faces by a piece-wise affine transform, orthogonal...
In order to investigate the effects of CPAM/bentonite microparticle retention system on reducing pollution load of papermaking white water, the dynamic drainage jar was used to simulate the wet end of low grammage fresh-keeping case board production. The turbidity and CODcr of the filtrate were measured to express the pollution load of white water. Results showed that the turbidity and CODcr of white...
This paper generalized the concept and the methods of Data Mining which based on drug suppression intelligence, analyzed the systemic construction and the work flow of Data Mining, pointed out the actuality of the Data Mining.
Through the discussion about the characteristic of the network environment and the library under network environment, this passage analyzes the personality characteristics of knowledge-based librarians in the libraries under network environment and presents the best structural model of knowledge-based librarians. And there comes to the conclusion that only the formation of the best talent structure...
With the arrival of the network and digital age, the library's holdings of resources has undergone a drastic change in which the proportion of digital resources occupy an instantly increase. The digital resources are easy to share and retrieve. This article discusses the need for integration of university library's digital resources, the principles and contents of integration. several integrated model...
The excellent control system of winder could significantly increase production capacity, improve paper quality, as well as reduce paper losses. The AC and high speed winder had a high-precision and automatic drive control system, which consisted of 6SE70 inverter as AC drive control device, Siemens S7-400 PLC as controller, and touchscreen OP270 as screen displaying the given input and current status,...
In this paper, we present an application-level I/O caching, prefetching, asynchronous system to hide access latency experienced by HPC applications. Our solution of user controllable caching and prefetching system maintains a file-IO cache in the user space of the application, analyzes the I/O access patterns, prefetches requests, and performs write-back of dirty data to storage asynchronously. So...
This paper presented an ultra-high g protective device. This device was installed in the 152 howitzer and impacted 1 m thick concrete target with 613 m/s speed. Both the design of the device and the experiment of penetration were described in detail. Numerical simulation utilizing ANSYS/LS_DYNA was carried out with the same penetration condition. The Matlab software was used to analyze the volume...
Person recognition using facial features, e.g., mug-shot images, has long been used in identity documents. However, due to the widespread use of web-cams and mobile devices embedded with a camera, it is now possible to realize facial video recognition, rather than resorting to just still images. In fact, facial video recognition offers many advantages over still image recognition; these include the...
We demonstrated that the InGaN/GaN multiple quantum wells (MQWs) light-emitting diodes (LEDs) with micro-hole arrays exhibit better performance in optoelectrical properties than do the conventional LEDs. With injection current of 20 mA, by employing the micro-hole array on top surface of the LED structure, the room-temperature output power conversion efficiency and external quantum efficiency were...
Comprehensive consideration of the financial indicators and non-financial factors, establishing the effective financial early-warning system is the important aspect of modern enterprise financial management. On one hand, this paper based on the AHP method makes qualitative indexes quantitative, and thinks the non-financial factors have a influence on financial early-warning system; On the other hand,...
Finite positions method is presented in this paper for complete balancing of shaking forces for planar and spatial mechanisms as well as the solutions to its equations. By using the method, only correctly formulated single-linked-chains (SOC) with proper connection and leaf components are needed to substitute into the equations to solve the parameters, which will be used to fully balance the shaking...
A new concept of vibration sieve based on parallel kinematic mechanism (PKM) is proposed in this paper and a novel 2-DOF spatial parallel mechanism is also designed here. The screen box fixed on the moving platform of the parallel mechanism poses an independent vertical translation and two rotations (one rotation is independent and the other is derivative). The trajectory of the screen-surface appears...
We have developed a new method to produce thin-entrance-window Silicon Drift Detectors. To produce the desired thin-entrance-window a double implantation was used. This implantation consists of Boron ions (dose of 1??1014/cm2 at 10 keV) plus a second implant of Phosphorus ions (with a dose of 4??1012/cm2 at 50 keV or dose of 9??1011/cm2 at 80 keV) through 500 ?? of silicon dioxide. The second Phosphorus...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.