The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to build a practical mini OA system for small and medium enterprise, key business, overall requirement, functional requirements and non-functional requirements of Yardi Kooboo (Xiamen) Technology Co. Ltd. Are analyzed after understanding the company's specific workflow and management processes. Following software engineering, the entire progress of building a WPF-based OA system includes...
As voting plays an important role in democratic society, both the privacy and verifiability of voting are particularly important in computer-supported voting system. In this paper, we propose a secret voting scheme that based on multi-input functional encryption. Compared with other traditional voting systems, our scheme not only can keep anonymity and receipt freeness while voting proceedings, but...
Compressive sensing (CS) is an emerging field that has attracted considerable research interest over the past few years. Compressive sensing is a new type of sampling theory, which predicts that sparse signals and images can be reconstructed from what was previously believed to be incomplete information. As a main feature, efficient algorithms such as ?1-minimization can be used for recovery. The...
In this paper a dynamic re-encrypted cipher text-policy attributed-based encryption (DRCP-ABE) scheme is introduced to keep the sharing data safe for cloud storage, which is designed to delegate the cloud service provider to re-encrypt the sharing data and send them to the authorized users, to relieve the data owner of the hard work of data management, especially in the process of authorization and...
Information and communication technologies have been widely adopted in most of educational institutions to support e-Learning through different learning methodologies such as computer supported collaborative learning, which has become one of the most influencing learning paradigms. In this context, e-Learning stakeholders, are increasingly demanding new requirements, among them, information security...
Embedded zero tree wavelet coding (EZW) is an effective image coding algorithm, Study on the output stream of P, N, T, Z symbol, they are appeared with inequality probability. In order to reduce the desired number of digits used in coding, this paper proposes an EZW and Huffman joint encoding algorithm. The experimental results shows, compared with the independent EZW algorithm, the joint encoding...
In cloud storage, after data file is outsourced, data owner no longer physical controls over the storage. To efficiently verify these data integrity, several public auditing schemes for data integrity checking were proposed to achieve data integrity checking. The existing auditing schemes makes that the auditor executes high computation to check data integrity. It might become a burden for a lot of...
Topology control is one of core key factors which can influence performance of wireless-sensor networks (WSN). So how to design topology structure with high reliable and survivability is becoming the important subject on wireless-sensor networks. For the issue, a topology evolution strategy based on scale-free network with energy efficient is proposed. First by clustering algorithm cluster nodes are...
Automatic protection mechanism designed a new type of connection-oriented Ethernet passive optical networks (EPON), including functional architecture, fault management, and build a network of automatic protection mechanism to test the function of the simulation tests, and the protection of its original programs and compared to overcome known problems, the application of this novel method can provide...
With the increasing maturity of NoSQL databases as well as the situation of reading more than writing on large volumes of data, many applications turn to NoSQL and pick it as data storage system. Migrating from SQL database to NoSQL and providing efficient query become growing imperative. However, join operation is not supported in NoSQL database and read separately for multiple times which brings...
In order to better fuse the CT and MR images, based on the classical image fusion method, an image feature extraction and fusion algorithm based on K-SVD is presented. The images are sparse representation. The images are divided into blocks via the sliding window. The dictionary is compiled the column vectors. The redundant dictionary is learned by the K-singular value decomposition (K-SVD) algorithm...
We studied all-optical parallel signal processing technology advantages, analyzed XPM effect on the theoretical, and used pre-coded DPSK/DPSK modulation to achieve hybrid multidimensional multiplexed signal processing, signal processing simulation will be used for phase modulation XPM format, succeed achieve with format conversion and regeneration, before and after conversion is greatly reduced jitter,...
Semantic computing is an important task in the research of natural language processing. For the problem of the inaccurate conceptual graph matching, this paper proposed the algorithm based on Conceptual sub-Graph weight self-adjustment. Based on the in tensional logic model of Chinese concept connotation, using Recursive Conceptual Graph as knowledge representation method and combining with the computation...
Map matching (MM), pins the drifting position data to the correct road link on which a vehicle is travelling, is a crucial step needed by many industrial or research ITS projects which rely on post-hoc analysis of trajectories. To address the unprecedented challenge of massive GPS data processing in urban transportation data center nowadays, this paper proposed an improved parallel topological map-matching...
Sentence similarity measures play an increasingly important role in text-related research and applications in areas such as text mining, Web page retrieval, and dialogue systems. Existing methods for computing sentence similarity have been adopted from approaches used for long text documents. These methods process sentences in a very high-dimensional space and are consequently inefficient, require...
In this paper, we propose a new digital watermarking algorithm of color image. We process the watermark to generate two shares based on visual cryptography. And one of the shares is embedded into a color image and another is protected by the copyright. The scheme is easy to implement and highly feasible. In addition, the embedding capacity of watermarks and robustness are improved to effectively.
Software exception analysis can not only improve software stability before putting into commercial, but also could optimize the priority of patch updates subsequently. We propose a more practical software exception analysis approach based on taint analysis, from the view that whether an exception of the software can be exploited by an attacker. It first identifies the type of exceptions, then do taint...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.