The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The characteristic of data stream is that it has a huge size and its data change continually, which need to be responded quickly, since the times of query is limited. The continuous query and data stream approximate query model are introduced in this paper. Then, the query optimization of data stream and traditional database are compared. Finally, technology of continuous query optimization over data...
Security management of geospatial data is a relatively unsolved problem in Geographical Information Systems. In this paper a new storage model for distributed GIS spatial data based on object-based storage (OBS) has been constructed, which gives an integrated solution to both offer high-performance storage services and secure data sharing. The mechanism is composed of three security protocols: GIS...
Clustering is one of the important means of Intrusion detection. In order to overcome the disadvantages of fuzzy C-means algorithm, this paper presents a kind of improved fuzzy C-means algorithm (IFCM for short). IFCM algorithm reduces the infection of isolated point by means of weighting the degree of membership for objects to be clustered, and avoids the subjectivity in choosing the number of clustering...
A risk situation evaluation model for network security is proposed based on analyzing security threat status. This method first perceived and identified the characteristics of critical risk factors, such as asset, vulnerability and threat, from multi-security-sensors. Then a quantitative evaluation algorithm was presented to estimate current threats and potential threats. By analyzing their threat...
We introduce an idea or a concept of restricted coexistence. By the restricted coexistence, the Ramsey number R(p,q) is defined equivalently as r(p-1,q), that is, R(p,q)=r(p-1,q), where r(p-1,q) is a least integer that has coexistence restricted to the parameters p-1,q with q ges p ges 2. From this, some basic properties about Ramsey numbers are obtained, for instance, R(p,q)>R(p-1,q+1), where...
To make a long-term dynamic monitoring to the chronic illness, especially patients of HBV, we build a novel applied medical information system for chronic viral hepatitis (MISCHV). The distributed system architecture and its function are described, and the security components of availability, integrity and confidentiality are taken into account as main vectors when designing this medical database...
Information systems' centralizing is an inevitable direction. To solve the problem that enterprise users could remotely and securely share software resources in data center, a secure access platform (SAP) based on remote desktop protocol (RDP) was proposed. According to the characteristics of software resources sharing, the software resources sharing model (SRSM) and the secure access platform model...
The aim of this study was to establish a method of automatic side face portrait recognition based on Fourier descriptor. The method consisted of three steps: face outline extraction, Fourier descriptor feature extraction and feature comparison. In the step of face outline extraction, the background was separated from the face first so as to get the overall face contour line, and then, determined two...
Intrusion detection has become the important component of the network security. Many intelligent intrusion detection models are proposed, but the performance and efficiency are not satisfied to real computer network system. This paper extends these works by applying a new high efficient technique, named twin support vector machines (TWSVM), to intrusion detection. Using the KDD'99 data set collected...
The following topics are dealt with: information retrieval; systems security; knowledge structures; processing methods; information theory and statistics; network theory; information hiding and watermarking; quantum information; data compression and coding; pattern recognition and learning; computer graphics and visualization; computer vision and image processing; decision support and expert systems;...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.