The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Service provision networks are popular platforms for decentralized service management. eBay and Amazon are two representative examples of enabling and hosting service provision networks for their customers. Trust management is a critical component for scaling service provision networks to larger set of participants. This paper presents Service Trust, a quality sensitive and attack resilient trust...
Combination-boom is a kind of large scale boom with non-uniform sections, which will generate large deflection in the loading cases. As for that, auxiliary bracing is necessary. Using FEM software, an optimization strategy has been proposed. Firstly, based on equivalent inertia moment method, the boom system can be simplified, after that a model of boom system would be set up. Secondly, with different...
With the deeply insight into the research on prognostic and health management(PHM), very little attention has been focused on conducting validation and performance evaluation in the airborne PHM systems. According to the designing flowchart, three validation methods are proposed with the sample implementation. In this paper, a dynamic semi-physical validation framework for the flight control system...
Digital images are facing trustworthy crisis with the emergence of various digital image process tools and steganography tools. Current digital image forensic methods can not evaluate the digital image's trustworthiness. Base on Dempster-Shafer (D-S) evidence theory, this paper proposed a new model which can effectively evaluate digital image trustworthiness. Instead of using Dempster's original rule...
In this paper, we study how to choose the combination coefficient of the combined field integral equation (CFIE) by comparing the iteration steps in solving the relevant matrix equation using the conjugate gradient iterative method. The tentative principle to choose the CFIE combination coefficient is given in terms of the calculations of two typical models, a cylinder and a NASA almond, with different...
Traffic control systems of signalized intersections are naturally hybrid systems, in which vehicle flow behavior can be described by a time-driven model and the traffic light dynamics are modeled as a discrete event system. In this paper, we use hybrid Petri nets (HPNs) to specify traffic and traffic control at an intersection and use a second-order macroscopic model to model the motion of vehicles...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.