The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The published papers on the journal of xi'an university of science and technology from 2007 to 2016 were collected from CNKI in this article. A total of 1511 papers were retrieved. These parameters were acquisited, such as title, author, organ, keyword, summary, PubTime, FirstDuty, fund, year, period, PageCount. Three LINUX servers were used to build Hadoop+Spark computing environment. By five aspects...
Due to the expensive hardware and complex management of the traditional middlebox, a concerted effort towards the virtualized middlebox has been launched in both academia and industry. In this paper, we propose a unified middlebox model, MBBrick, which is composed of three operation modules (classifier, rewriter, forwarder) and a control module (the mcontroller). We then design a language, MG, to...
Opportunistic Network (OppNet) is an emerging communication paradigm, by which nodes inside forward messages through personal contact opportunities. Recently, numerous studies have focused on predicting nodes meeting to promote routing efficiency and reduce transmission delay. However, individual privacy would likely be revealed to strangers or attackers during the execution of prediction. In this...
On the basis of studying the principle and application technology of P2P protocol, we design the private protocol of P2P application layer to meet the needs of P2P communication. This application layer protocol splits up video into three types of blocks in order to improve transmission efficiency. Besides, the protocol can be expanded when needed since there are some invalid bits in the state list.
Operating system (OS) experiments consolidate the understanding of the OS concepts and cultivate good engineering practices. Major challenges, however, including large class sizes, diverse software versions, and timely identification of difficulties from lab reports, hurt teaching quality. To address these, we designed an integrated environment to support OS experiments and automated the release and...
A typical Two-Party Authenticated Key Exchange Protocol aims to provide the information confidentiality between client and server in public network. The protocol has to satisfy some secure properties and possess the lower computational cost. The new protocol in this paper enhances the scheme of Chou, which has some flaws, such as the impersonation attack and public key problem. The enhanced scheme...
With the popularity of network, P2P-based Video on Demand (VoD) has become one of the main services in Internet. However, due to the huge amount of videos, how to access the video quickly is important since it affects the subscriber's experience. In this paper, a popularity-driven storing model is proposed to fasten the video discovery for a centralized P2P-VoD system. All videos are stored in a binary...
ARINC 653 provides a strong isolation mechanism for safety computing fields, such as aircrafts. seL4, a 3rd generation microkernel, was formally verified for its functional correctness and provides a desirable code base for partitioning operating systems. But there is a long way from seL4 to partitioning. We take the first step and focus on the temporal aspect, i.e., implementing a partitioned scheduler...
This paper is about the research on the industrial Ethernet communication between industrial PC (IPC) for a spinning machine and OMRON programmable logic controller (PLC) based on FINS protocol and Winsock in VC++. This proposed networked communication has been successfully designed, installed, commissioned and realized. This paper focused on reliable real-time communication transmission and integrated...
An efficient prospect to medical procedures such as diagnosis and therapy is by obtaining knowledge of medical experts from formal reports. Several studies have been carried out on finding differences in brain connectivity between schizophrenia patients and healthy controls with their results reported in natural language with tables and figures. In the area of biomedical research, natural language...
Link flooding attack (LFA), as a new type of DDoS attack, can degrade or even cut off network connectivity of a target area. This attack employs legitimate, low-density flows to flood a group of selected links. Therefore, these malicious flows can hardly be distinguished by traditional schemes. In this paper, we propose a scheme called Woodpecker, which makes the LFA more difficult to take effect...
In this paper, we propose an Error Tolerant Dual-Hydrophone Localization method, i.e., ET-DHL, in underwater sensor networks (USNs). To reduce the impact of the node uncertainty, measurement uncertainty, poor link quality and long latency for underwater localization problem, ET-DHL adds bit-level probability to process the binary sequence. Different from our previous work PCM, each dual-hydrophone...
Traditional Internet based on the IP routing has an innate deficiency when facing up with large numbers of concurrent distribution of video and other media content. Software-Defined Networking (SDN) and OpenFlow protocol try to improve data transfer efficiency and flexibility by separating the forwarding layer and control layer, and the content-based routing idea proposed by Content-Centric Networking...
This paper designs and implements a new indoor location system based on a novel type of WIFI fingerprint by fully considering the interference of signals affected by different mobile orientation and user's body. Simulation results show that our method is better than traditional methods in the aspect of positioning accuracy and resolution.
Cloud resource and its load have dynamic characteristics. To address this challenge, a dynamic self-adaptive evaluation method (termed SDWM) is proposed in this paper. SDWM uses some dynamic evaluation indicators to evaluate resource state more accurately. And it divides the resource load into three states - Overload, Normal and Idle by the self-adaptive threshold. Then it migrates overload resources...
Handheld and non-handheld devices, which are simultaneously online, constitute the regular clients of the campus wireless local area networks (WLAN). It is necessary to understand the patterns of the user distribution and the user behavior, and adopt better strategies to optimize the service, as well as to understand the students' daily life. This paper introduces a approach of understanding how campus...
In today's data centers supporting Internet-scale computing and I/O services, increasingly more network-intensive applications are deployed on the network as a service. To this end, it is critical for the applications to quickly retrieve requests from the network and send their responses to the network. To facilitate this network function, operating system usually provides an event notification mechanism...
Recently, Desktop Cloud has become a hot product of cloud computing. More and more companies and organizations have shifted toward desktop cloud from traditional office systems. However, most of the servers are not designed for specially. It is necessary to optimize the desktop cloud servers and a benchmark is needed to evaluate and compare various optimization schemes. In this paper, we present Cloud...
A remote medical image reading and diagnosis system based on cloud services is designed and implemented in this paper, using the WEB browser and DICOM WEB server with Web Access to DICOM Persistent Objects for data exchange. Infrastructure, platform, and software are provided as services through Internet, which is the main concept of cloud services. Based on cloud services, the system is capable of...
With the possibility of system crashes and network failures, the design of robust client/server interactions for collaborative process execution is a challenge. If a business process changes state, it sends messages to relevant processes to inform about this change. However, server crashes and network failures may result in loss of messages. In this case, the state change is performed by one party,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.