The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, one fast method for analyzing printed circuits based on matrix high-dimensional interpolation schemes has been presented. By virtual of the bi-interpolation on the plane of the frequency direction and the dielectric constant direction, the proposed method can greatly reduce the global time consuming of matrix fillings, and it can greatly improve the efficiency of multi-parameter scanning...
Discrete complex image methods are of closed form methods for fast calculating Green's functions of stratified media, which have been widely discussed by many researchers. In the present paper, one fast non-uniform sampling matrix pencil method is proposed to improve the efficiency of discrete complex image methods. One numerical example and some comparisons are also provided, where a sampling scheme...
In this paper, a new ultra-wide band characteristic basis function method based on interpolation scheme(IN-UCBFM)has been proposed for analyzing the wide band electromagnetic scattering problems. By virtual of matrix interpolation for impedance matrices and wide-band characteristic basis functions based on interpolation scheme, the IN-UCBFM not only can greatly reduce the number of unknowns, but also...
To improve contour tracking performance for multi-axis precision motion systems, a position domain iteration learning control (PDILC) is presented in this paper. Traditional control approaches design controllers in time domain individually, thus suffer from poor synchronization of relevant motion axes and result in restriction for contour tracking tasks. Our approach is to combine the positon domain...
For Liao Hui and others proposed network terminal security assessment index system exists index weights unreasonable distribution problem, using Delphi method and AHP calculate each index weight and the weights of total ranking of lowest level indexes relative to the highest lever indexes, identified the indicators which have greatest impact to the assessment objectives and apply it to a host of information...
In this paper, an ultra-lightweight RFID mutual authentication protocol is proposed with its security proof based on GNY logic. The improved protocol solving problems of DoS caused by the attackers who replay messages, as well as improving the communication confidentiality of readers and tags in an open environment. The security analysis of the proposed protocol and its performances comparison show...
Blömmer, Otto, and Seifert presented a fault attack on elliptic curve scalar multiplication called the Sign Change Attack, which causes a fault that changes the sign of the accumulation point. As the use of a sign bit for an extended integer is highly unlikely, this appears to be a highly selective manipulation of the key stream. Here we describe two plausible fault attacks on a smart card implementation...
The traditional KNN algorithm for text classification has some insufficiencies, an improved KNN algorithm has been presented in this paper. By use of the clustering center vector, we put the distance of the be classified text and the text category into the similarity calculation formula, and take the ratio of the number of common features appear in two texts and the maximum number of respective features...
Visual attention model is a hotspot in the field of multimedia understanding. It is quite helpful for multimedia processing especially in the case that the human vision should be considered. In this paper, a novel information hiding algorithm based on Stentiford visual attention model is proposed. By embedding less information in sensitive region, the invisibility of image with hidden information...
According to the circulation process of financial indicators flow, data flow, capital flow involved in financial supervision work, based on the financial data center, designs a five-story architecture for the system including monitoring and analysis of budget preparation, monitoring and analysis of budget adjustments, monitoring and analysis of budget implementation, monitoring and analysis of accounts...
This paper analyses the requirements of file protection. It proposes an improved role-based access control model, which is based on the analysis of shortcomings of traditional RBAC model. This model improves the traditional RBAC model, and imports the concept of user group and object role, also presents the principal authorized the users and the roles. Finally produces the formal definition of the...
In the paper, the original image is divided into four parts by two different methods, which are taken as the observation signals in Independent Component Analysis (ICA) model. Then the watermark is embedded into DCT domain of the feature with the largest variance using iterative Adaptive Quantization Index Modulation (AQIM) and AQIM algorithms respectively. By comparing the performance of four kinds...
As the reactions of plasma particles produced by pulse discharge in water are complex, the software CEA2 is employed to simulate and compute the content of each species of product in the plasma channel by converting discharge energy into enthalpy. The respective content of OH and H2O2 is measured by chemical methods in the self-developed reaction device. It is found that experimentally-detected concentrations...
Traditional method of composing Web service is inflexible and inefficient because exogenous event can not handle in run-time. In this article, an expansion way is raised to settle this problem. A dynamic composite web service structure is given and an agent is used to handle the exogenous event when service is running. In order to dynamic reasoning activities of service, the agent language will be...
In this paper, a novel image watermarking scheme based on independent component analysis (ICA) is proposed. In the proposed scheme, the original image is sub-sampled firstly to obtain four sub-images, and the features of the original image are extracted by performing ICA to these sub-images, and then the feature, which has the largest variance, is selected out to be watermarked on its block DCT coefficients...
As Oppliger stated, secure messaging refers to the ability to provide data confidentiality, data integrity, data origin authentication, and non-repudiation of origin services for email. It is very important but poorly developed and has very limited application. We propose an email protocol assures non-repudiability which means that if the email is successfully sent, the sender cannot deny she/he has...
As a continuative effort of our WICS'05 paper, a new certified Email protocol is proposed. Email is a standard communication method nowadays but certified email is poorly developed and has very limited application. A certified email protocol assures non-repudiability which means that if the email is successfully sent, the sender cannot deny s/he has actually sent the mail and the recipient cannot...
Email has become a standard communication method nowadays. But when it comes to important correspondences containing sensitive governmental, commercial or medical information, certified delivery is required. We present in this paper a new certified email protocol which assures fair delivery, non-repudiability, confidentiality and timeliness. To achieve definite fairness, an offline TTP is employed...
This paper introduces a control system of loading manipulator in the filling and boxing line of a vinegar-producing factory. The system is composed of S7-300 PLC, touch panel, servo amplifier, servomotor and manipulator. S7-300 PLC is used as the central controller which controls servo amplifier and field actuator via Profibus control network. Manipulator can do accurate speed and position control...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.