The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposed a versatile signal generator which employed a phase lock loop (PLL) chip and a direct digital synthesizer (DDS) chip to produce microwave signal for 3G mobile communication jamming. Based on the self-developed software, it could be controlled to produce single frequency, amplitude modulation (AM), frequency shift keying (FSK) or binary phase shift keying (BPSK) signal for different...
By analyzing metagenomic data from microbial communities, the taxonomical and functional component of hundreds of previously unknown microbial communities have been elucidated in the past few years. However, metagenomic data analyses are both data- and computation-intensive, which require extensive computational power. Most of the current metagenomic data analysis software were designed to be used...
Based on virtual simulation platform, taking the virtual reality and three-dimensional simulation technique as the core technology, and using the entire digital photogrammetry, GIS, multimedia information and web network technology, this paper puts forward the technique by which we can set up a three-dimensional virtual scene of garden museums with Zhuozhengyuan virtual garden museum as an example...
This paper presents a development environment of Internet of Things, EFAIoT. EFAIoT means an Easy and Flexible Application Development system, which is focus on the Internet of Things field. Our system provides graphic user interface, through which users can build up their own internet of things applications on the semantic layout. A browser based and user friendly user interface was provided to reduce...
Currently, signature-based malware scanning is still the dominant approach to identify malware samples in the wild due to its low false positive rate. However, this approach concentrates on programs' specific instructions, and lacks insight into high level semantics; it is enduring challenges from advanced code obfuscation techniques such as polymorphism and metamorphism. To overcome this shortcoming,...
Feature matching is an important way of network intrusion detection system. With the increasing of attack types, rule database becomes more and more larger and the course of matching also becomes increasingly complex, which makes IDS easily to lose packets. For the problem above, two kinds of signature customization methods which based on open ports and CVE number are designed in this paper. These...
This paper proposes a reusable software dynamic analysis methodology for componentized Internet applications, which is composed of two important parts: execution model construction and runtime behavior analysis. Firstly, the related concepts of behavior observation are presented. Secondly, according to the behavior observations extracted from running applications, the multi benchmarking behavior model...
Continuous performance monitoring is critical for detecting software aging and enabling performance tuning. In this paper we design and develop a performance monitoring system called PerfMon. It makes use of the /proc virtual file system's kernel-level mechanisms and abstractions in Linux-based operating system, which provides the building blocks for implementation of efficient, scalable and multi-level...
Although understanding the traceability among software artifacts is well recognized as significant to multiple software engineering activities, the software traceability problem remains intractable since software engineers are very prone to get lost in the huge amounts of traceability information, and are unable to distill the required information effectively and efficiently. This paper proposes a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.