The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of computer technology, it has been widely used in many fields such as politics, economy, military affairs, culture, and education and so on. The society has entered into the information age with the development of computer and network technologies, however, the security problem of information has become the fundamental mater. As we all know, the basic principle of Von Neumann...
As the network technology and applications continue to evolve, computer networks become more and more important. However, network users can attack the network infrastructure (such as domain name service and routing services, etc.). The networks can not provide the minimum required quality of service for control. Network situation can not be aware in a timely manner. And network maintaining and upgrading...
One of the motivations for virtualization technology is the desire to develop new services to enhance system security without trusting both the applications and the operating systems. An intrusion detection system is an example of such service that can help to isolate users from malicious attacks. In this paper, we propose hybrid-based intrusion detection architecture in virtual computing environment...
A critical step in fingerprint recognition is to skeletonize the fingerprint image for minutiae extraction, which is recognized as "thinning" in image processing. The speed and reliability of the thinning process are important for the whole fingerprint identification system. In this paper, to accelerate the thinning process, a fast hardware thinning algorithm is implemented on the Xilinx...
In recent years, virtualization technology has been widely applied to traditional computing environment. As it provides strong flexibility, the security in face of attacks to network services becomes a significant challenge. In this paper, we propose a novel architecture to detect intrusion in virtual computing environment and implement a prototype, named VNIDS. In this system, a particular VM is...
This paper proposes a realistic data grid system named JobGrid to construct information platform for Chinese college graduates employment, which supports centralized transaction processing to ensure consistent, effective operation in data access, control, monitor and analysis, and distributed data management to provide heterogeneous data integration, conversion, exaction and export. JobGrid has implemented...
How to extract effective discriminant features of high-resolution range profile (HRRP) is one of the issues for radar automatic target recognition (RATR). In this paper, a novel method for extracting discriminant features is proposed by using kernel optimal transformation and cluster centers techniques (KOT-CC). In addition, to alleviate the effect of independent noises on the discrimination, we propose...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.