The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The platooning of automated vehicles has potential to significantly benefit road traffic, while its robust performance is less investigated especially considering increasing complexity of interaction topologies. This study presents a decoupled H∞ control method for automated vehicular platoon to comprehensively compromise multiple performances. The platoon control system is first decomposed into an...
This paper presents an improved semi-global matching algorithm which is robust to the different radiometric conditions. Firstly, Census transform instead of mutual information is adopted to calculate the matching cost because of its robustness to radiometric changes. Then, an additional self-adaptive matching penalty is added into the cost aggregation along every accumulation path of semi-global matching...
A mechanism of survivability recovery, whereby component is the basic unit of being fixed, is presented for information system in this paper. Services provided are classified into complete service, acceptable service and interrupted service by the degree of dependence on failed critical component. The survivability of information system is measured by component availability. Procedure of survivability...
There are a large amounts of alerts with high false rate in typical Intrusion Detection System (IDS). The problem about how to identify network attack effectively from huge volume of alerts is becoming a challenging task for security administrators. It gets worse with larger scale of network being monitored by IDS. In this paper we propose an approach on detecting network attack based on entropy from...
Home network is a residential local area network where digital home appliances are connected with each other. In a home network, access control is an essential factor to provide a proper service to an authorized user. In this environment, there is a home server, which manages user's accesses to external sources. It prevents unauthorized users from accessing home appliances on the network. In this...
In view of the disadvantages of IEEE 802.11e EDCA in QoS guarantee and collision avoidance, an enhanced EDCA scheme called SD-AEDCA is presented which dynamically adjusts two EDCA parameters, namely contention window (CW) and backoff time counter (BC), according to channel load conditions and QoS requirements of network services. SD-AEDCA makes improvements to EDCA backoff scheme from post-backoff,...
Based on the study of the conventional spatial data structure and data model and the needs of archeology, this paper brings forward a data model based on Objected-Oriented and discusses spatial data organization, the structure of Infrastructure Objects, O/R Mapping mode. This model play an important role on GIS data management and with high efficiency, high-quality and cost-effective.
An SNMP MIB oriented approach based on two-tier GCT is presented in this paper in order to detect attack before the security of target was damaged. According to the abnormal behavior constructed on target, GCT is executed first to find preliminary attacking variables which has whole causality with abnormal variable in network behavior. Depending on behavior features extracted from abnormal behavior,...
This paper deals with designation and implementation of an IPv4/IPv6 transition mechanism based on proxy. Key problems in transition mechanism are analyzed; a proxy-based transition approach is proposed in which basic Internet services are hold up by HTTP protocol, and a prototype system is implemented. The test results show that the approach can effectively achieve most basic Internet services' transition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.