Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Distributed hash tables (DHTs) have been prevalent within the Internet community for many years. Crawling a DHT network allows researchers to monitor the behavior of peers, determine their geographic location, and predict their trend, etc. To characterize a DHT network accurately and comprehensively, the measurements should be conducted in the long term, which are rarely considered in the former studies...
Aphasia is a type of acquired language impairment caused by brain injury. This paper presents an automatic speech recognition (ASR) based approach to objective assessment of aphasia patients. A dedicated ASR system is developed to facilitate acoustical and linguistic analysis of Cantonese aphasia speech. The acoustic models and the language models are trained with domain- and style-matched speech...
In this paper, we study the problem of solving hard propositional satisfiability problem in Cloud or computing grid, which is honest-but-curious. We propose an approach to preserve input and output privacy based on CNF obfuscation, and present obfuscation algorithm and its corresponding solution recovery algorithm. By obfuscation, the CNF formula is transformed into another formula, with different...
Myths and misinformation about diseases or illnesses can contribute to the stigmatization of patients suffering from them. In many cases, these people end up being ostracized from society and have lower positive health outcomes. Education has been known to be a good intervention to dispel such myths. With the increasing number of social media users, it is pertinent to explore the appropriateness of...
A computer simulation and calculation method has been proposed in this paper to provide an effective and simple way to estimate the five parameters of dye-sensitized solar cells including photocurrent, reverse saturation current, diode ideality factor, series resistance and parallel resistance of the output characteristic equation. The computer program which was used to calculate these parameters...
The SRTP/ZRTP security mechanism provides a secure channel for VoIP (Voice-over-IP) traffic transmission. This paper examines the use of TCG remote attestation technique to improve the security of SRTP/ZRTP channel technology. We first generalize the security properties which a trust channel technique should have. Then we propose a trusted SRTP/ZRTP channel technique and apply model checker SPIN to...
LWRM was a method for defeating TCG TOCTOU attacks with less overhead during the normal system execution. However, its security capability was evaluated only through experiments. The uncertainty in real experiments may hide the design-level errors. In this paper we explore applying model checking based formal verification techniques to verify whether LWRM can achieve the declared security properties...
Transliteration is a common translation method when named entities are introduced into another language. Direct orthographical mapping (DOM) approach is successfully applied in machine transliteration by segmenting a word according to syllables and then mapping them directly into target language without considering its pronunciation. The paper studies the performance of two-stage machine transliteration...
Keyword extraction from single document is not same to the task of text classification, in which a collection of texts can be compared and referred to. The paper focuses on the keyword extraction based on statistical information of words, that is, self features of keywords in the single document. Besides of general features such as word frequency and POS of a word, location features of a keyword are...
With the increasing popularity of VoIP (Voice-over-IP), the integrity of associated communication endpoints becomes a significant security issue. TCG remote attestation mechanism can be used to evaluate the platform state of remote endpoints. However, there are no protocols and extensions that aim to integrate remote attestation with the existing secure mechanisms for SIP-based VoIP transmission by...
Complementary synthesis can automatically synthesize the decoder circuit of an encoder. However, its user needs to manually specify an assertion on some configuration pins to prevent the encoder from reaching the non-working states. To avoid this tedious job, we propose an automatic approach to infer this assertion. First, we propose a halting algorithm that can decide the existence of the decoder...
Transliteration is always used to translate source names with approximate equivalence of pronunciation into target language. Current direct orthographical mapping (DOM) approach does segmentation and alignment on the basis of the single syllable. However it is hard to break down English names into constituent parts according to their corresponding single Chinese characters. This document proposes...
The Zn2SnO4 with uniform particle size was prepared by hydrothermal method at a low-temperature of 180°C, and then Zn2SnO4/TiO2 composite films were facilely fabricated by doping Zn2SnO4 nanoparticles into titania powders and their photoelectric properties were also investigated in the assembled DSSCs. Analysis results revealed that TiO2 composite films doped with Zn2SnO4 nanoparticles could effectively...
At present, elliptic curve digital signature algorithm (ECDSA) is one of the hottest topics in the field of information security. Its implementation with hardware is valuable to many applications in future. Scalar multiplication is one of main factors affecting the elliptic curve algorithm executive efficiency. A variable window mechanism method of combining NAF and variable-length sliding window...
Complementary synthesis automatically synthesizes the decoder circuit E-1 of an encoder E. It determines the existence of E-1 by checking the parameterized complementary condition (P C). However, this algorithm will not halt if E-1 does not exist. To solve this problem, we propose a novel halting algorithm to check P C in two steps. First, we over-approximate P C with the linear path unique condition...
BLEU and NIST as official machine translation evaluation metrics are widely used to assess system translation quality. These n-gram co-occurrence algorithms are applied to evaluate language learners' translations in this paper. Subtle differences of evaluation on machine translation and learners' translation are discussed. Dependent on n-gram matching between target translation and references, BLEU...
One of the most difficult jobs in designing communication and multimedia chips, is to design and verify complex complementary circuit pair (E, E-1), in which circuit E transforms information into a format that is suitable for transmission and storage, while E's complementary circuit E-1 recovers this information. In order to ease this job, we propose a novel two-step approach to synthesize complementary...
With the rapidly increasing implementation and popularity of broadband new media platforms in recent years, the effective personalized content service model has become a key issue in the establishment and development of New Media. In this paper we propose a user preference clustering framework for the customization of content service in broadband new media platforms, i.e. IPTV, digital TV, video portals...
Chinese named entity recognition (NER) is studied in two directions: inner structure and outer surroundings. Inner structural analyses induce constitutions of person, location and organization name from the point of linguistics. However inner structural rules for named entities only provide necessary conditions for a sequence of Chinese characters being an entity name but not sufficient. Whether a...
Rock bolt is one of the most important methods in rock engineering for ground stabilization and the anchorage quality is of the most concern in the field. The characterization of bolts is always evaluated by pullout or torque wrench test which are destructive or inaccurate. It is proposed that some nondestructive methods for testing rock bolt anchors has been preliminary tested in the laboratory and...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.