The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As more and more cloud services are exposed to DDoS attacks, DDoS attack detect has become a new challenging task because large packet traces captured on fast links could not be easily handled on a single server with limited computing and memory resources. In this paper, we propose a Hadoop based model to identify abnormal packets and compute the statistics according to the number of abnormal packets...
The train reception and departure time directly affects the performance of the passenger service system. However, the system in existing stations sometimes cannot accurately obtain the train arrival time because of train delay. This paper proposed a kind of informative linkage mechanism for train reception and departure system by fusing intelligent video processing techniques. By using surveillance...
This paper addresses the robust containment control problem for a class of heterogeneous uncertain nonlinear multi-agent systems. The dynamics of the leaders are totally different from those of the followers. Based on the distributed internal model, the robust containment control problem is first converted into the stabilization problem for an augmented network. A distributed output feedback control...
We propose a multi-robot exploration algorithm that uses adaptive coordination to provide heterogeneous behavior. The key idea is to maximize the efficiency of exploring and mapping an unknown environment when a team is faced with unreliable communication and limited battery life (e.g., with aerial rotorcraft). The proposed algorithm utilizes four states: explore, meet, sacrifice, and relay. The explore...
Carbon emission in urban area mainly comes from urban transportation and land use development. Urban transportation development strategies, land use strategies, and corresponding synergic and integrated development are discussed in this paper, which are expected to contribute to the construction of low-carbon city. Firstly, urban transportation development strategies are proposed including construction...
With the speeding up of the power grid construction, accidents on transmission lines have also occurred frequently, such as: icing lines, conductor galloping, aerolian vibration, windage yaw and wires sag etc. Therefore, it is of great importance to make online monitoring and fault diagnosis for transmission lines comprehensive state with using intelligent monitoring device. At present, the study...
Demand on the high quality of parts takes the task that the CNC machine tool should have more accuracy and high productivity when it processes parts. From this task we can track back to the performance of the feed drive system of CNC machine tools. The test stand of feed drive system made up of ball screw assemblies is here modeled. The natural frequency of the test stand is analyzed on the modeling...
Security mechanisms within DBMSs are far from effective to detect and prevent anomalous behavior of applications and intrusions from attackers. In fact, intrusions executed by unauthorized users to explore system vulnerabilities, and malicious database transactions executed by authorized users, both cannot be detected and prevented by typical security mechanisms. In this paper we proposed a database...
Inspired by rule-based access control models, this paper proposes a universal policy model and an access protection framework to secure dataspace. The key components and processes for this framework, policy organization, policy indexing and two resource searching strategies with access decision-making, are illustrated and experimented to harmonize the contradiction between security and efficiency.
After identifying the fundamental weakness of existing privacy prevention, this paper proposes a software-splitting technique in which we put the split contents on the client instead of the remote trust server. Unlike traditional static client identification techniques, this new technique would encrypt the extracted contents from the software by a key relating to the hardware characteristics, and...
Based on the iDM concept, this paper proposes an extensible data model with an 8-tuple representation, which can not only describe more complex data sources by extending the Group Component, but also contain rule-based security elements, which consist of Access Component and Authorization Component. Data model is detailed and two corresponding examples are analyzed to verify our approach.
One important privacy principle is that an individual has the freedom to decide his/her own privacy preferences, which should be taken into account when data holders release their privacy preserving micro data. Nevertheless, current related k-anonymity model research focuses on protecting individual private information by using pre-defined constraint parameters specified by data holders. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.