The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we focus on task scheduling problems in security-critical real-time systems. We consider that all of the critical tasks are equipped with RC5 algorithm to reduce the vulnerability when facing security attacks. The relationships among security level, vulnerability and execution time of each task are firstly deduced. Then, a Multiple Task Vulnerability Optimization Method (MTVOM), which...
A robust audio digital watermarking algorithm in DCT domain for air channel transmission was proposed. The algorithm is in DCT domain, and using code of Barker technique as synchronization code sequence. By modifying the coefficients of low frequency, the watermarking and synchronization code was embedded with large capacity and good hidden effect. Experimental results indicate that the proposed algorithm...
System identification is a theory and technique which use input and output data to build mathematical model and provide a mature method for linear identification systems at present, but for the nonlinear identification system we have not yet found easy unity mathematical methods.Neural network has strong self-learning ability and the nonlinear mapping ability thus it has great potentialities in nonlinear...
Due to the intrinsic property of B-Spline surface, the surface reconstruction with scattered and chaos point-cloud is a challenging problem. This paper proposed a skinning surface algorithm of B-spline for scattered point-cloud. First, raw data was preprocessed including denoising, simplifying and slicing to obtain section data. Second, approximating cross section data into B-spline curves and resampling...
Feature selection and classifier are two important issues in intrusion detection to achieve high performance. This paper proposes intrusion detection scheme based on feature selection with different feature selection methods. Then the extracted features are employed by Support Vector Machine (SVM) for classification. But in fact, single classifier doesn't attain satisfying performance. To address...
Now the difficulty of information query on the Web is there is not matching between short, misty user query and the document of existing a great deal of redundancy and noise. Anew query method was brought forward based on first item clicked feedback under the analyzed excellent and disadvantage of relevance feedback and pseudo feedback.Present a measure of first item-clicked feedback. The experiment...
At present, isolated and single network security system can no longer meet the objective needs. As a new type of network, trusted network can make up many of the traditional network security flaws. Based on the analysis of the background and motivation of trusted network, the article discussed the concept and basic properties. It analyzed the architecture of trusted network and the functions of its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.