The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes two classes of new pseudorandom number generators from block ciphers, called HTR and HBC. They are provably secure in the PRG-CIA (pseudorandom generator against chosen-input-attacks) sense, assuming that the underlying block cipher is a secure pseudorandom permutation (PRP). HTR is a parallel structure, while HBC is a cascade structure. Therefore, the implementation efficiency...
In this paper, a software is designed for assisting the detection of pipes on showing wave propagation in pipes. This software could estimate the detection-parameters on given pipe diameters, pipe material, pipe defects and detection-method. Meanwhile, this software simulates the ultrasonic propagation path and calculates the ultrasonic propagation time. At last, this software could simulate the ultrasonic...
During equipment tests, there exist many software faults such as incorrect design, inaccurate boundary, awful mistake managing, which result in equipment faults frequently. By systematic analysis of software test process and the equipment software's characteristics of close relation with the environment, user and operation, it is proved that there exist disadvantages among software verification tests'...
A criticality analysis method based on cloud model is proposed. First normal cloud model of each evaluating target and its weight is built, and then evaluating matrix is calculated through the cloud model, finally evaluating result is presented. Example shows that this method is more practical and provides more information than that of traditional RPN method. This method provides an effective method...
According to the equipment trials at base, there are many software faults such as incorrect design, inaccurate boundary, awful mistake managing, which often results in equipment faults frequently. Through the systematic analysis of software test process, this paper analyzes the disadvantages upon software process management, testers and test environment. Finally, it brings forward some improvements...
Aiming at the security problems of the important disclosed files on Intranet, an intelligent transparent encryption model is proposed. This model can unify policies of rank management security for all hosts on Intranet. Combined with the security assessment process, evaluating secret level of documents in the host, this model decides whether to file for dynamic encryption. Through the practical application...
Geometry model, as a mapping on physical space to calculating space, is a foundation of numerical simulating. Aiming at a complicated object, reverse engineering technology was applied to model cylinder head. Using Pro/Engineering modeling software, inlet port, outlet port, up water jacket and bottom water jacket geometry bodies were modeled one by one. Finally, by Boolean calculation, a cylinder...
The article described the real-time measuring and control subsystem (MCS) of a certain actuation system briefly first. According to the structure and the specific developing requirements for the subsystem, the article gave the software design thinking based on Labview and 1553B communication standard. The article then introduced the design guidelines, software structures and design details specifically...
Non-grid-connected wind power system is a complex system, which includes several subsystems such as wind turbine subsystem, non-grid-connected electric generator subsystems, non-grid-connected wind power control subsystem, gas-solid coupling vibration subsystems, and high energy-consuming special load subsystems. It is a multi-objective, multi-factor, higher-order non-linear dynamics of large-scale...
This paper gives an introduction to the Bayesian networks for the exploration of implementing a Bayesian belief network for an automated breast cancer detection support tool. It is intuitive that Bayesian networks can be employed as one viable option for computer-aided detection by representing the relationships between diagnoses, physical findings, laboratory test results, and imaging study findings...
This paper puts forward an algorithm to compensate the pose error of a 6-DOF (six degrees of freedom) parallel manipulator based on stereo vision. Firstly, under the principle of rigid motion, the position and orientation are expressed by coordinates of three feature points which are not in a same line. At the same time, the position and orientation of the moving platform at current moment are also...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.