The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Considering the problem in network threat analysis, the paper proposes a vulnerability relation model based on extended time Petri net, which can lay the foundation for threat quantification analysis. Combined with object-oriented technology, the model is suitable for describing complicated network attack, which can reflect relation among vulnerable states iconically. By defining the threat of an...
The channel of Low Voltage Powerline Carrier Network is known for its hostile nature in transmitting electrical signal, nodes of the network are not stationary and the network topology is time varying volatility. So in order to reduce the collision in utmost level, to improve the successful probability of communication and to guarantee the real-time of data packet and the stability of Medium Access...
High flexibility of publish/Subscribe architecture that is a common architectural style for component based systems make it to be capable of developing and supporting large software systems. But difficult aspect of Publish/Subscribe systems is their validation. Existing efforts for developing formal foundation for specifying and reasoning about these systems are hard to use by practitioners who are...
In order to meet the educating and training requirements of tactical communication network (TCN), one advanced means is to develop its simulative training system. Firstly, the general framework of TCN simulative training system was designed, which included the system constitution, software structure and application manner. Secondly, a single federation and multi federation architecture were proposed,...
Hyphantria cunea is one of the harmful international plant quarantine pests. In order to monitor and control the increasingly serious situation, based on the materials and data collected by “the 221 project” in Beijing in recent three years, this paper studies the spatial decision-making system of hyphantria prevention and control simulation, by combining WebGIS, JSP and Ajax technology. We design...
In this paper, the problems existed in the process of crop germplasm resources investigation are analyzed, data standard based on data element technology are established for crop germplasm resources investigation, and the UML model of data elements category and the XML/XSD-based replacement and storage methods are given, finally, compiled and calling procedures for the data standards in crop germplasm...
Normally cokriging, which is extended by kriging to take into account extra information and viewed as an unbiased prediction method with minimum prediction variance, integrates the information carried by a secondary variable related to the primary variable being estimated. The linear model of coregionalization (LMC) and the Markov model 1 (MM1) are proposed for cokriging to fulfill the integration...
Water consumption of plants is a key parameter for formulating irrigation system, and the precise prediction play a important role in improving the use efficiency of limited water resources. In this experiment, by using the method of artificial neural network and MATLAB DATA PROCESSING SYSTEM combined with the meteorological data of air temperature, relative air humidity, solar radiation, wind speed,...
In order to evaluate the security states quantitatively according to the Classified Protection Criteria, a evaluation model for network security, named FNSEM, is proposed. The assessment algorithm is designed. And a new risk evaluation system based on FNSEM is designed and developed. The experiment results show that FNSEM is effective, and the evaluation system has the merits of impersonality and...
PRESENT, proposed by A. Bogdanov et al. in CHES 2007, is an ultra-lightweight symmetric cipher for extremely constrained environments such as RFID tags and sensor networks. In this article, a representative platform, 0.25 μm 1.8 V standard cell circuit is proposed to complement the PRESENT, the simulation-based ASIC experimental environment is built to acquire power data. According to the fact that...
With the current development of information technology and the popularity of wireless communication devices, mobile learning came into being. 2009, China officially entered the era of 3G, 3G mobile communications technology introduction, certainly for the rapid development of mobile learning, providing a better technical support. The Ajax technology is Web 2.0, and the realization of a new RIA technology...
The fact of the increasingly globalized economy has driven many corporations to expand their business beyond their traditional database access. They want to access heterogeneous data source by a uniform query interface. One of the ways to view these systems is to postulate a global schema that provides a unifying data model for all the data sources. A query processor is in charge of reformulating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.