The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Key management is an essential part in designing secure and reliable cryptography scheme. In the paper, we analyzed the basic interacting protocols for key management on RSA asymmetric cryptosystem and presented an improved authenticated encryption scheme based on ECC (elliptic curves cryptosystem). In the scheme, the essential parameters for key generating and distribution are transmitted with authenticated...
Document classification has received extensive attention in the past decade due to its wide range applications. To efficiently deal with this problem, a novel document classification algorithm is proposed by using marginal fisher analysis (MFA) and minimax probability machine(MPM). Experimental results on the WebKB data set show that the proposed algorithm achieves much better performance than other...
Data broadcast is an efficient way to disseminate information to large numbers of users in mobile environments. Existing research on scheduling of multi-item broadcasting mostly consider access frequency or the relationships among data items, these scheduling algorithms only achieve local optimum. In this paper, we introduce the A* algorithm of artificial intelligence, considering both access frequency...
The paper discusses the irregular parts packing problem based on an improved immune genetic algorithm, and a NIGA based on crowing mechanism is proposed. For improving the packing efficiency, the clustering idea and algorithm are introduced and the effective characteristics of matching packing-graphics are extracted and analyzed. GA, an improved immune genetic algorithm, and NIGA are applied to practical...
Beijing HaoCheng Dental enterprise, a Chinese small private dental enterprise to build e-commerce website actively for expansion of corporate, enhance the corporate image, optimize the structure of them, reduce procurement costs, Simplify treatment procedures and so on, was built in Sept 2007. This paper surveys the status quo of e-commerce application in Beijing HaoCheng Dental enterprise comprehensively...
This paper classifies and concludes the risks existed in knowledge management from a view of identification. It has been divided into two aspects of knowledge assets at risk: the risk of knowledge spillovers, knowledge conversion risk, the risk of wastage, leakage risks, contractual risks, moral hazard from Knowledge and knowledge of risk vector. At the same time, risk of IT security, risk of assessment,...
To effectively improve the collaborative manufacturing management level and manufacturing execution ability, this paper provides an integrated collaborative manufacturing management system for complex product which supports workshop real-time information integration, based on the analysis of presently research and application situation and requirements of collaborative digital management for complex...
This research has been aimed at building the supervision and incentive model of senior management staff, which accords with China's national conditions on the basis of domestic and abroad researches and combines the major issue of executives of China's listed companies. Intends to obtain some enlightenment, Various kinds of concrete models have been promoted in this assay, and quantitative methods...
In the deep space communication under the USB (unified S-band) system, the channel coding is generally used in the telemetry down-link. To get the coding gain, the subcarrier demodulation model needs to work reliably under the low Es/No. In this paper, a new BPSK subcarrier demodulation model of digital signal is introduced. This demodulation model is able to work well when the Eb/N0 is up to 1 dB,...
In the predicting financial distress, we know that irrelevant or correlated features in the samples could spoil the performance of the SVR classifier, leading to decrease of prediction accuracy. In order to solve the problems mentioned above, this paper use rough sets as a preprocessor of SVR to select a subset of input variables and employ the particle swarm optimization algorithm (PSOA) to optimize...
Negotiations are among the most common ways that agents in a multi-agent system use to reach agreements. Because negotiations commonly are multi-lateral and multi-issue, these processes become more difficult. In the real world applications this becomes more important where the autonomous agents involved in a negotiation should reach maximum payoff in minimum time. In this work a new negotiation mechanism...
This paper firstly review the mobile communication markets in China, U.S. and Europe. And then uses the sectoral system of innovation approach to analyze the industry convergence and the transformation of the mobile communications system of innovation, including: types of industry convergence and industry convergence by product complementarity: the advent of the mobile Internet.
With increasing development of Internet, grid as a new structure of distributed network will be discussed more and more, while its security is facing the heavy challenge and restricts application of grid. The international research shows that grid security is on the way to trustworthy grid. Apart from current trust model, the future trust model in grid should add users' behaviors reflecting users'...
Aggregate exchange is an important kind of electronic commerce exchange. In this paper, a new optimistic fair off-line payment scheme is proposed for multi-party aggregate exchange, in which no one has advantage over the others. The trusted party need not be involved into exchange unless disputes have occurred. The disputes which might occur are analyzed and handling solution is proposed. The fairness...
Mutual fund managers' frequent replacement implies fund companies' recognition to their skills. In order to capture this kind of managerial skills, we put forward two propositions: performance persistence is stronger in large fund and fund abnormal return is negatively correlated with managerial tenure. Using a panel of 96 actively managed Chinese equity funds, we document evidence consistent with...
The size of memory distributed to various processes by a system which uses a virtual memory, in some sense, determines the page fault, and further influences the system performance. After research, we find that the dynamic paging algorithm is much better than the static paging algorithm, for a process can change locality as it executes. This paper gives a study of the dynamic paging algorithm, points...
In this paper, a system for PPPoE protocol analysis is designed and implemented. The system includes three modules: network capture module, traffic analysis module and information log module. The network packets are captured by Winpcap which can enhance high correctness and efficiency of the network capture. The mechanism of PPPoE data communication and the packet capture method of using Winpcap are...
The evaluation of burst-proneness risks has affected the coal and rock mining progress and development. The quality evaluation system framework of burst-proneness risks indexes is established. Fuzzy evaluation index system is proposed to take into account various factors. As to index system, comprehensive fuzzy evaluation model and methods are setup and used to check for practical example. Using comprehensive...
This paper, after a careful study of the standard workflow meta-model given by WFMC, proposes a new workflow meta-model based on Web Service. This model takes advantage of the strong points of the Web service distributed computing model. Being a good extension and modification of early meta-model, it is more flexible, adaptive, and customizable. It can also smooth over the difference between various...
Burst proneness of coal seam is a necessary condition for rock burst, which tends to study the burst proneness of rock burst mechanism of coal seam. And it is the premise of forecasting the rock burst. Based on mathematical analysis, the primary components analysis (PCA) is used to analyze the burst-prone indexes of coal seam. On the basis of PCA model and scores by experts, some results are computed,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.