The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this thesis, Shanxi Luan Environmental Energy AG Wang zhuang Coal as the basis, with theoretical analysis, numerical simulation of an integrated approach designed to stay on the optimal size of coal pillars, supporting a systematic program of optimal design, Reduce the loss of coal mine and to ensure safety efficient production, Used in the process of deep mining remain narrow pillar gob technology,...
A watermarking-based host correlation detection method is proposed in this paper. The idea is to embed some unique watermark into the flow by slightly adjusting the timing of selected packets in the flow. In the embedding phase, we use network flow grouping strategy to divide the IPDs (i.e., interpacket delay) into two different groups randomly, and then realize the watermark embedding by utilizing...
A fragile software watermarking scheme for integrity verification of software is proposed in this paper. The algorithm uses the idea of semantic-preserving code substitution for embedding the watermark. With the system, the generated watermark relates closely to the content of software, and the scheme has highly sensitive to different types of attacks. Furthermore, both watermark generating controlled...
With the development of the Internet, getting information through browsing Web pages has become a popular way. How to protect the integrity of a Web page is an urgent problem. As an effective method, a novel fragile watermarking scheme for tamper-proof of Web pages is proposed in this paper for solving the problem. In our scheme, the watermarks that are related to the content of the original Web page...
Pseudo random bit generator is widely used in BIST for test pattern generation. Typical pseudo random bit generator adopts linear feedback shift register (LFSR) as its basic circuit. Dynamic LFSR (DLFSR[1]) which has better cryptographic properties with respect to typical LFSR consumes more power. This paper forwards a low power DLFSR (LDLFSR) circuit which achieves comparable performance with less...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.