The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Coupled nonlinear dynamical systems (CNDpsilas) have been widely studied in the recent years. However the dynamical properties of the CNDpsilas are difficult to deal with. The local activity principle of the Cellular Nonlinear Network (CNN) introduced by Chua has provided a powerful tool for studying the emergence of complex patterns in a homogeneous lattice formed by coupled cells. Based on the Rossler...
The displacement analysis problem of parallel robot mechanism can be finally transformed into solving nonlinear equations and the finding-process is very difficult. Moreover, the more CCS kinematic pair the more complexly to find. The mathematical programming method is adopted when the iteration diverges with the Newton and quasi-Newton methods. If chaotic sequences are considered as the initial guess...
Artificial immune operators play an important role in the application of immunity, how to design immune operators to support the test case generation method based on the principle of immunity deserves our investigation. Therefore, on the basis of artificial immunity principle, some immune operators that can be used in software test case generation are proposed in this paper. By comparing experiments...
Trusted computing introduces the Trusted Platform Module (TPM) as a root of trust on an otherwise untrusted computer. The TPM can be used to restrict the use of cryptographic keys to trusted states, i.e., to situations in which the computer runs trusted software. This allows for the distribution of intellectual property or secrets to a remote party with a reasonable security that such secrets will...
Trusted platform module (TPM) is a key component to trusted computing, which is proposed to improve security on general platforms. Therefore, it's very necessary to test related products. This paper proposes a conformance testing model based on state machine model with related testing strategies and develops an automated testing tool, which can deal with state space explosion and generate test suits...
A proactive secret sharing scheme (PSS) is very important to withstand mobile adversary in mobile ad-hoc networks (MANETs). It allows a set of nodes to update all shares by generating a new set of shares for the same secret key from the old shares without reconstructing the secret key and it allows the nodes to recovery the lost shares. After periodical renewal, it makes the mobile adversary which...
Service-oriented computing allows new applications to be developed by using and/or combining services offered by different providers. In several cases a service needs sensitive information from the clients in order to execute. The existence of a trust relationship between the client and the provider determines which restrictions the service has concerning the use of this information by the service...
Memory bounded functions have been designed to combat email spams in a sequence of papers. The cost of computing the functions is usually dominated by random walks over large tables that cannot be put in CPU cache. In this paper, we propose a simple number theoretic way of generating such tables based on exponentiations of sparse polynomials modulo sparse irreducible polynomials over finite fields...
In view of the lower encryption efficiency or the weaker security of current image encryption technology, on the basis of the encryption principle of mixed image element (MIE), a MIE encryption system is proposed in this paper. The mathematical model and structure model of this system are also established. And the encryption efficiency and security analysis is analyzed in detail in this paper. In...
Machine learning algorithms are known to degrade in performance when facing with many features that are not necessary in the field of artificial intelligence and pattern recognition. Rough set theory is a new effective tool in dealing with vagueness and uncertainty information. Attribute reduction is one of the most important concepts in rough set theory and application research. Once it gets the...
Internet is a complex network with the characteristic of self-organized criticality. The cascading dynamics of Internet are presented and two reasons are pointed out, which may cause cascading failures. Different from betweenness centrality, a congestion function to represent the extent of congestion is proposed. By introducing the concept of "delay time", the correlation between permanent...
In virtual machine (VM) systems, mandatory access control (MAC) enforcement is possible now. This technique is both stronger and more flexible than traditional VM isolation, even if network communication is controlled. Unfortunately all of the VM systems with the MAC enforcement does not consider that the MAC controls may be distorted by covert channels, which constitute an important risk in VM systems...
The time-frequency analysis by Hilbert-Huang transform (HHT) plays on a significant role in the analysis of singularities, which hide in the signal, and is an effective method for non-stationary signal. Based on empirical mode decomposition (EMD), the Hilbert-Huang method can obtain a true instantaneous frequency representation of a signal. The analytical background of the HHT is introduced, and its...
According to OWASP Top 10 2007, top 1-5 critical Web application security vulnerabilities caused by unchecked input [1]. Unvalidated Input may lead hacker to inject code to bypass or modify the originally intended functionality of the program to gain information, privilege escalation or unauthorized access to a system. Examples of such vulnerabilities are SQL injection, Shell injection and Cross Site...
This paper studied and analyzed expected throughput metric (ETP), found out that it made a conservative estimate for long path, and it didn't take into account the impact of node's loading on the performance of path. In view to the problem, this paper assumed the interference range of links as two hops, and proposed the definition of node's loading in wireless mesh network, and combined the two with...
SIP-based systems inherently have NAT traversal and QoS problems because of the limited IPV4 addresses and the best-effort service on the Internet. Using relay server to relay media stream can solve NAT traversal in SIP systems, but have less scalability. In this paper, we propose a SIP+P2P architecture for SIP-based systems to solve the above problems. In this novel architecture, light weighted SIP...
Analyzing the characteristic of network behavior provides scientific basis for designing, building, and managing the next generation Internet, and is especially important for monitoring network behavior. This paper establishes a system of metrics that evaluates the behavior of IP networks with respect to the need of analyzing network behavior, introduces the design and implementation of network monitoring...
We explore the process of transmitting real-time Internet video frames over TCP (Transmission Control Protocol) and discover that the delay of waiting in TCP sender-buffer is the critical factor that causes large end-to-end delay. We propose a multi-buffer scheduling model for decreasing the end-to-end delay by scheduling video frames among application-layer sender-buffer, TCP sender-buffer, TCP receiver-buffer...
Accurate identification and classification of network traffic according to application type is an important element of many network management tasks. In this paper, a P2P network traffic classification method using SVM classifier is proposed. By this method, the P2P network traffic can been classified according to application types with statistical characteristics of network traffic. This paper mainly...
A self-learning vertical search spider for travel is presented. This paper focuses on two machine learning methods SNBC (self-learning naive Bayes classifier) and LQNBC (log quotient naive Bayes classifier) for improving search quality and topic relevance. A framework of designing and implementing a vertical spider TSearch with basic general search spider architecture and functions is also showed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.