The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Machine prognosis is a significant part of condition-based maintenance and intends to monitor and track the time evolution of a fault so that maintenance can be performed or the task can be terminated to avoid a catastrophic failure. A new prognostic method is developed in this paper using adaptive neuro–fuzzy inference systems (ANFISs) and high-order particle filtering. The ANFIS is trained via machine...
An entropy gain based overall trust degree (OTD) computation model is proposed for large scale trusted networks. To overcome subjectivity in trust decision, attributes' entropies and their gains are adopted to set attribute weights in the OTD fusion model. Attribute weights are dynamically adjusted by refreshing sample set and attribute entropy gains, to adapt to variations of network entities. Under...
Due to the requirements of dynamic and mandatory access control for important information systems in the classified security protecting environment, a dynamic authorization model based on security label and role (SLR-DAM) is proposed. Firstly, element sets and authorization rules are enumerated in a formalized way. Using security label together with label role we defined, MAC is implemented with the...
A new structured multi-signature scheme is proposed based on a sequential multi-signature scheme. The advantages of the proposed scheme are as follows: the multi-signature is a co-signature which is generated by multiple signers in collaborative, rather than accumulating per signer's single signature; the order of signature doesn't need to be fixed beforehand; any secret messages can be transmitted...
A promising way to guarantee dependability of service-based systems (SBSs) is replanning service bindings dynamically with the environment changing. As embedded into system execution, such replanning process will directly affect the overall performance of SBSs. While various replanning techniques have been proposed up to now, it is still challenging that how to provide cost-effective replanning methods...
The tradition Made-To-Measure (MTM) emphasizes the integration of and devices and CAD tools and tries to provide a coordinative environment for fashion designers and technicians. Although the body information is collected by sophisticated devices and tools, such as TC2, first, they are so unintuitive that it is difficult to utilize them; second, the experiences of these data are not accumulated to...
One of the advantages of Web service technology is it can create added-value services and complete the complex transactions or workflows by combining existing ones. However, they always run in a highly dynamic and change environment, during the execution process, if one component service fails or becomes overloaded, the failed services replacing mechanism is needed to ensure that the running process...
SaaS (software as a service), the new software application pattern has got wide attraction in both industry and academia. But transaction processing is a problem that prevents SaaS from wide spreading. To solve the problem, this paper proposes A business level compensation mechanism for multitenancy SaaS application transaction processing. The mechanism supports flexible and customizable transaction...
A novel algorithm for the canceling of broadband multi-path interference was presented, namely IBF-ANC (Inverse Beamforming & Adaptive Noise Canceling) combined algorithm. The interference was reconstructed by IBF and used to be the reference at the input end of adaptive noise canceller, which overcame the defect of ANC algorithm. As many practical experiences showed that it was very difficult...
DM ("device management") service is a new value- added service whose value chain has the typical characteristics of two-sided markets. Based on a review of the literature on two- sided market theory, the paper discusses pricing models for DM service with two agents on one side, which has not been addressed by previous research. The key to successful implementation of the DM service platform...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.