The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, biometric, or "who you are," authentication has grown rapidly in acceptance and use. Biometric authentication offers users the convenience of not having to carry a password, PIN, smartcard, etc. Instead, users will use their inherent biometric traits for authentication and, as a result, risk their biometric information being stolen. The security of users’ biometric...
IT incident management aims to restore normal service quality and availability of IT systems from interruptions. IT incidents often have complicated causes aggregated from an IT environment composed of thousands of interdependent components. Incident diagnosis then requires collecting and analyzing a large scale of data regarding these components, often, in real time to find suspect causes. It is...
Tensor Neighborhood Preserving Embedding(TNPPE) is a efficient subspace dimensionality reduction model for face recognition. However, the singularity problems is still remained. in the paper, we propose an Improved Tensor Neighborhood Preserving Embedding (ITNPE) algorithm for face recognition. We evaluate the algorithm by applying it to YaleB and AR databases. the experiments demonstrate excellent...
This paper proposes a novel approach to extract multi-scale LBP features of hand vein images. Local Binary Patterns (LBP) is a simple but efficient texture operator for hand vein images. However there are two big limitations of LBP. One is that it only covers a small neighborhood area and gets very limited local information. The other is some non-uniform information will be lost as uniform patterns...
This paper aims to solve detecting and tracking of pedestrian in indoor service areas such as library, museum, or department store, using a laser range finder on a mobile robot for service tasks. It is much more difficult than implementing detection and tracking using fixed sensor because the mobile robot must localize itself correctly when distinguishing static objects and moving objects. Therefore,...
With the popularizing of digital TV, Cable TV(CATV) network develops rapidly in the recent years. More large scale resource involved in the CATV network makes demands of the more effective management system. This paper analyses the characteristics of CATV network resources, offers a hierarchical model and gives the architecture, development principles, and implementation of a comprehensive CATV Network...
To import nearly 1,000 attribute tables of 10 subjects of national oil/gas resourse database of Excel format into the target tables of Oracle database,we developed the intelligent import system which distinguished the simple import system.The system uses Visual Studio 2008 as the development tool, object-oriented language C# as the programming language,Oracle 11g as the background database, WinForm...
To improve the vehicle handling stability and comfort, the matching between hydraulic torque converter and engine was proposed. The matching is crucial to the power performance and fuel consumption of vehicle. Based on analyzing the numerical computing method of matching between hydraulic torque converter and engine, it developed a matching program with friendly interface and data expandability. This...
Situation assessment becomes more and more popular accompanies the development of information fusion. Event is very important for situation assessment as a basic situation element. But the existing event detection technology can't satisfy the need of situation assessment. A framework of comprehending events from text for situation assessment is proposed. In this framework, events are not only extracted...
In order to improve the intrusion detection system based on traditional immune theory, a new three levels anomaly disposal system model based on danger theory was proposed in this paper. The data stream is treated with three levels anomaly disposal in the model, the first level is to recognize the danger and remove the data of non-danger which will not bring damage to the system, for the second level...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.