The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fault attack is a kind of attack that the attacker injects faults into the hardware and the secret key is likely to be revealed. The paper will describe a fault attack platform for smart card. This platform includes PC terminal serial console software, smart card interface circuits, and smart card reader fault attack circuits. Then the fault platform could communicate with the contact smart card or...
In order to improve the efficiency of symbolic execution in software vulnerability detection, we propose the sensitive point oriented test method for parallel approach in the paper. Static analysis is used for identification and location of sensitive points. Then based on dynamic symbolic execution, the algorithm of parallel approach to sensitive point is designed, in order to select for the preferential...
Having entered into the network printing times, we obtain great convenience and are confronted with many security problems. This paper focuses on the domain of network printer security which is still a blank field and proposes a whole security system for network printing which doesn't need to change the original architecture of network printers to solve the security problems of the existing network...
Evaluating Semantic similarity has a widely application areas range from Psychology, Linguistics, Cognitive Science to Artificial Intelligence. This paper proposes the merely use of HowNet to evaluate Information Content (IC) as the semantic similarity of two terms or word senses. While the conventional ways of measuring the IC of word senses must depend on both an ontology like WordNet and a large...
In this paper, we propose a novel approach for image completion with automatic structure propagation. This method integrates two stages: Firstly, it extends the salient structure lines from the known regions to the unknown by following a local self-similarity assumption on natural images. Then guided by the structure information, it restores the missing region by patch-based texture synthesis. Experiment...
In last decades, text-independent speaker recognition is a hot research topic attracted many researchers. In this paper, we proposed to apply the Fisher discrimination dictionary learning method to identify the text-independent speaker recognition. The feature used in classification is the Gaussian Mixture Model super vector. The proposed method is evaluated with public ally available dataset TIMIT...
Many-objective optimization problems involving a large number (more than four) of objectives have aroused extensive attention. It is known that problems with a high number of objectives cause additional difficulties in visualization of the objective space, stagnation in search process and high computational cost. In this paper, a special class of many objective problems, which can be degenerated to...
A new fire station location planning method based on travel time of fire vehicles is demonstrated. In contrast to traditional circle-drawing method, it is quite easy to operate and make better balance between fire protection response performance and construction cost. The application in a city at the central part of China is also demonstrated. It is shown a 140% increase on the fire protection response...
A digital watermarking algorithm based on depth perceptual region of interest (DP-ROI) for copyright protection of three dimension (3D) images is proposed. First, DP-ROI is defined according to the three-dimensional depth sensation of human visual system and extracted through depth image and gray image. Then, gray image is transformed with discrete cosine transformation (DCT). Several middle frequency...
Recently, spatial principal component analysis of census transform histograms (PACT) was proposed to recognize instance and categories of places or scenes in an image. When combining PACT with Local difference Magnitude Binary Pattern (LMBP), a new representation called Local Difference Binary Pattern (LDBP) was proposed and performed better. LDBP is based on the comparisons between center pixel and...
The quality performance evaluation of long term stored missile weapon is very necessary for the capacity determination of equipment support and combat mission accomplishment ability. Because the classical evaluation methods are affected by index system acquirement, modeling method, experts' resources restriction, etc., the objectivity and correctness of evaluation results are decreased. In order to...
In this paper, the Harmony Search (HS)-based BP neural networks are used for the classification of the epileptic electroencephalogram (EEG) signals. It is well known that the gradient descent-based learning method can result in local optima in the training of BP neural networks, which may significantly affect their approximation performances. Two HS methods, the original version and a new variation...
Accurate forecast of urban water consumption is the basis of urban water supply network planning and design, and provides a scientific basis for water production and scheduling. Because the convergence speed of RBF neural network and accuracy of urban water consumption forecast based on RBF neural network are too low, we proposed a new forecast method based on QPSO-RBF neural network. In this method,...
10Gbps Ethernet Security Processor is very important in future network telecommunication. In order to meet the performance of ultra high throughput of 10Gbps ESP, An architecture of multiple SHA-1 IP cores paralleled based crossbar switch are proposed in this paper. Firstly, An ultra high throughput, low power consumption SHA-1 algorithm IP-core are designed, then, an effective scheduling architecture...
Evolutionary Multi-objective Optimization (EMO) approaches have been amply applied to find a representative set of Pareto-optimal solutions in the past decades. Although there are advantages of getting the range of each objective and the shape of the entire Pareto front for an adequate decision-making, the task of choosing a preferred set of Pareto-optimal solutions is also important. In this paper,...
A Waste Collection Arc Vehicle Routing Problem with turn constraints (WCAVRPTC) model is proposed to minimize the length of municipal solid waste (MSW) collection routes, which presents several characteristics derived from traffic regulations: some streets can be traversed crossed in only one direction, and some turns should be forbidden when the common angle is too narrow. The problem is transformed...
Aiming at the optimization algorithm, weak filled function method is proposed and which with simple form is constructed. The restriction of this method is weaker than the known filled function method, thus it is easier to construct function and solve algorithm. The weak filled function method is feasible through the theoretical analysis, and the global minimum of simulation example can be obtained...
A method for the computation of local magnetic force in suspension system is proposed. Precise calculation of magnetic force in electromagnet is significant to structure design. Therefore, on the basis of finite element method (FEM) and local virtual work method, a mathematical model is built according to the principle of virtual work equivalent, so as to calculate the magnetic force. Application...
Target recognition is one of the key technologies of the ultrasonic detection. In this paper, with wavelet packet analysis method, energy feature is extracted for actual ultrasonic echo signal to obtain target energy feature information in different frequency bands, then the neural network classifier is used to identify the target. Test results show that this method is effective in detecting real...
When denoising with the method of Weickert's an isotropic diffusion equation, the textures and details will be compromised. A fidelity term is added into Weickert's equation. The coefficient of fidelity term will vary adaptively with the instant image, which makes that the diffusion term and the fidelity term come to a better compromise. Otherwise, when deciding the edge directions, because of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.