The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet Information Server as one of today's popular server, providing a powerful Internet and Internet service function, it works as the Windows NT family of operating systems to provide a set of services, such as Windows NT Server4.0 and Windows Server 2000 and so on. IIS stringent security mechanisms for the establishment of a high-security server have laid a solid foundation. Therefore, to explore...
This article has analyzed the origin of the network behavior deviated from the norm, and it has proposed a system of network data behavior of examination. This system is between the firewall and the boundary router. It is responsible to monitor the network data stream about the financial service, and it makes the message return to original state effectively. It catches the suspicious network activity...
In 2007, Sunder Lal and Tej Singh gave an ID-based multi-proxy multi-signcryption scheme. By analysis, we discover that Sunder Lal and Tej Singh's scheme wrongly used two types of undefined bilinear pairing calculations, which caused that the calculation of Lal and Tej Singh's scheme is unfeasible. Against the error, we give an improved scheme. To avoid of using these undefined calculations and make...
This paper identifies the problem which existed in the application of the current inventory information system in the enterprise at present, analyzed and designed the inventory information system again based on workflow technology. Through analyzing the workflow relation data, the inventory management information system is developed under the control of the workflow engine, including the data structure...
Fuzzy-rough sets of existing mode are too abstract to the practical problems. It is not of much practical significance. But, the rough-fuzzy sets of existing mode for dynamic data processing capability are poor. This paper proposes new rough-fuzzy sets, which have integrated the advantages of the rough sets and fuzzy sets of data processing better, and have more practical significance for the settlement...
A threshold multi-secret sharing scheme against cheating among weighted participants of special access right based on Chinese remainder theorem and LUC cryptosystem is introduced , it permits that multiple secrets be shared in one secret sharing session. The sub-secret of every participant can be used many times, and the secrets can be renewed without renewing the sub-secrets of the participants....
The paper used OptiSystem3.0 simulation software to simulate 32 dense wavelength division multiplexing system, and the FRA and EDFA hybrid amplification were used in the DWDM transmission system. Compared with the use of a separate EDFA amplifier we could obtain wider gain and higher-noise ratio. Through the simulation, the simulation of the visual apparatus results were analyzed and compared and...
Residuated lattice is an important non-classical logic algebra, and L-fuzzy rough set based on residuated lattice can describe the information with incompleteness, fuzziness and uncomparativity in information system. In this paper, the properties of L-fuzzy rough sets based on residuated lattice are given as the expansion of ref.
In his paper, Prof. Ye Dongyi pointed out that the reduction approach introduced by Hu Xiaohua etc. will give wrong result in some situation. In this paper we come to a conclusion by analysis that the reduction approach is to keep boundary region partition unchangeable virtually. It is just different from the reduction approach given by Ye Dongyi. Then, we analyze the logic characteristic of boundary...
The paper makes improvement to the condition omega(x,y) which the elements in discernibility matrix introduced by Skowron satisfy. Thus we can get two advantages: the verification to the condition is simpler; the elements satisfying the condition in discernibility matrix are less. Then the complexity of computing reduct with discernibility function decreases. Such property is effective not only to...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.