The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recent years people have witnessed a surge of interest in APT attack, due to its complex and persistent attack characteristics. In order to prevent APT attacks, this article studies and analyzes a large number of APT attack cases which have been disclosed, gives an overview of APT attack lifecycle and attack techniques. This paper discusses the purposes of APT attacks and APT attack characteristics...
In this paper, we will examine how to improve workload balancing on a computing cluster by a parallel loop self-scheduling scheme. We use hybrid MPI and OpenMP parallel programming in C language. The block partition loop is according to the performance weighting of compute nodes. This study implements parallel loop self-scheduling use Xeon Phi, with its characteristics to improve workload balancing...
In this paper, we will examine how to improve workload balancing on a computing cluster by a parallel loop self-scheduling scheme. We use hybrid MPI and OpenMP parallel programming in C language. The block partition loop is according to the performance weighting of compute nodes. This study implements parallel loop self-scheduling use Xeon Phi, with its characteristics to improve workload balancing...
Nowadays, microblogs provide abundant text data. Mining valuable information from it becomes an interesting topic. Based on the topic model, things can be easily traced. The complete view of an event can help people make decisions. Once we can track topics in a specific domain, experts can rapidly react according to important events. In this paper, we proposed a LDA [2] based framework to capture...
As we all know, it is an era of information explosion, in which we always get huge amounts of information. Therefore, it is in urgent need of picking out the useful and interesting information quickly. In order to solve this serious problem, recommendation system arises at the historic moment. Among the existing recommendation algorithms, the item-based collaborative filtering recommendation algorithm...
This paper introduces a 2-D index map coding of the palette mode in screen content coding extension of the High-Efficiency Video Coding (HEVC SCC) standard to further improve the compression performance. In contrast to the current 1-D search using RUN to represent the length of matched string, we bring the block width and height to describe the arbitrary rectangle shape. We also use the block vector...
Major advances in Merged Logic DRAM (MLD) technology coupled with the popularization of memory-intensive applications provide fertile ground for architectures based on Intelligent Memory (IRAM) or Processors-in-Memory (PIM). The contribution of this paper is to explore one way to use the current state-of-the-art MLD technology for general-purpose computers. To satisfy requirements of general purpose...
Due to wide spread and convenience of video data transmission, data security has become a key issue. This paper presents a new scheme to encrypt high-definition streaming video based on chaos theory and pattern recognition theory. Taking pattern recognition theory as its strategy, this scheme generates chaotic sequences by employing Logistic map and Chebyshev map. The scheme also introduces the authentication...
In order to solve the problems that IDSs and firewalls cannot efficiently detect new SQL injection and too much time is wasted when the security personnel reads log files to analyze attacks, we proposed and implemented a high-interaction web honey pot system for SQL injection analysis. By (i)modifying PHP extension for MySQL to intercept data-base requests and (ii)adopting exception based and signature...
With the economic development, penetration of the electronic commerce technology and internet technology into the socioeconomic life has brought the world exhibition industry new opportunity and challenge. Under the stimulus of the financial crisis, the network exhibition which develops exhibition by trade and promotes trade by exhibition as a result of the creation of a new exhibition model has been...
In the emergency rescue process after disaster arriving, ARGIS can provide accurate rescue data for rescuers and command center in time and make rescuers and command center work in collaboration. Consequently, it can raise emergency response's speed and rescue efficiency. For getting emergency rescue spatial data on the disaster area quickly and improve rescue collaboration ability, this paper discusses...
In this paper, a more subjective Synthesis Evaluation algorithm is studied, in which hierarchy of criteria is generated through analysing the internal structure of research data by using exploratory factor analysis, weights are determined by using confirmatory factor analysis and with the application of TFN, more reliable judgements and reasonable evaluation results will be acquired. Furthermore,...
A city natural gas storage station control system is presented in this paper. It consists of a Station Control Center, a process control station used Rockwell PLC, two desiccators control station used Ormon PLC, three high pressure compressors control station used Siemens PLC, Ethernet communication between supervise control computer and Rockwell PLC, RS 485 communication among the Siemens and Ormon...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.