The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A risk situation evaluation model for network security is proposed based on analyzing security threat status. This method first perceived and identified the characteristics of critical risk factors, such as asset, vulnerability and threat, from multi-security-sensors. Then a quantitative evaluation algorithm was presented to estimate current threats and potential threats. By analyzing their threat...
To avoid it happening that the correctness of created model and developed simulation software on calculating the response time of ABS (anti-lock brake system) is partially verified by the experiment result, based on the structure of a typical ABS, the calculation models of the controllable characteristic and mechanical characteristic were created, and the simulation calculation software was developed...
This paper presents a method that compares two pieces of music and shows them by the means of musical staff. It designs and implements a musical staff processing software system. The system analyzes the MIDI format music files and extracts MIDI format data which was transferred into the musical staff information to output, including clef, rest and measure. According to the correlation between the...
In recent years, coal mine accidents have happened frequently in our country. These bring high casualties and huge economic losses, and ring the alarm bell for our coal industry. The traditional coal mine gas monitoring system uses the method of wire network, because of the restriction of time and space flexibility in the wire network, it is impossible to build a wire system in short time. For real-time...
This paper presents a method to build a real-time distributed operating system. We first discuss the theory of microkernels and their operating system implementations, to find a way to build a real-time distributed operating system that meet the requirements in constructing tightly coupled multi-robot architecture.We choose DROPS as the basis, and do many modifications on real time and distributivity...
Intrusion detection plays an important part in network security today. BP algorithm which is an algorithm in artificial intelligences can also be used in IDS. This paper make use of improved BP algorithm compared to the traditional one, the new algorithm brings us higher speed in constringency and more precise in detection .The new algorithm solves the difficulties of real-time system.
In this paper,we discuss the quantitative extensions of event structures for LOTOS with stochastic nature. We give the non-interleaving semantics model for interactive Markov chains algebra(IMCA).It is shown that our stochastic models can be used to provide a compositional causality-based semantics to IMCA, and a event-based operational semantics is provided that is proven to coincide with various...
Till now, Three Gorges Project has been built for about 15 years. The land use/land cover changes (LUCC)and environment changes in Three Gorges Reservoir Region has always been the focus issues, which is the reason of the paper. Mastering the rule of LUCC in Three Gorges Reservoir Region, firstly, is of advantage to wake up to the potential problems in Three Gorges construction, secondly, can provide...
In view of the analysis of hostility and working principle of the malicious software and their actions, based on the kernel driver, this paper designs a real-time inspection system framework and solution of malicious software and actions. This system applies shared memory, Windows message mechanism, I/O driver technology and others, implements information synchronization and data communications in...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.