The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we study both the jamming capability of the cognitive-radio-based jammers and the anti-jamming capability of the cognitive radio networks. We first setup the models of cognitive-radio-based jammers and the cognitive radio network transmissions. We then analyze various jamming attack strategies where the jammer spends various powers in order to jam various transmission slots of the cognitive...
The purpose of this study is to examine several key elements of organizational performance in the public sector empirically. By exploring the effects of socioeconomic, organizational as well as individual factors based on responses from a primary survey, the authors find that those governmental organizations with more public orientation, more employee orientation, clearer goals, less procedure constraints...
This paper is to construct a balanced scorecard (BSC) for universities based on knowledge management (KM) and the analytic hierarchy process (AHP) for evaluating it. The BSC concept is applied to define the hierarchy with four major perspectives (i.e. financial, customer, internal process, and learning and growth), and performance indicators are selected for each perspective. An AHP approach is then...
An important challenge regarding peer's trust valuation in peer-to-peer (P2P) networks is how to cope with such problems as dishonest feedbacks of malicious peers and attacks from strategic malicious peers, which cannot be effectively tackled by the existing solutions. So a feedback confidence (FC)-based distributed trust management model for P2P networks, named FCTM for short, is proposed to quantify...
Integrated system health management (ISHM) will be an important component of the future launching vehicles and satellites. ISHM uses large number of sensors to evaluate the condition of the entire system. It is responsible to take the necessary corrective actions and to change the course of action if the health of the system will not allow successful completion of the mission. In this paper, self...
As a copyright protection technique, digital watermarking has arisen more and more attention from the public. It has been widely applied to copyright protection of multimedia data (images, video and audio). The increasing use of relational databases also calls for the need of applying the technique to databases in order to protect the copyright. With the development of digital watermarking technique...
The importance of the practice ability of students is discussed in this article. Constructing one index system related to improve the direct and indirect practice approach of students is set up and a model of comprehensive evaluation about the practice ability is given. This model fills up the checking process of practice teaching.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.