The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The application of cloud computing brings not only enormous economic benefits but also security risks. According to the safety risk problems faced by cloud computing environment, this paper on the basis of the experience of traditional risk analysis methods, qualitatively researchs the main factors of cloud computing risk, and adopts multi-level fuzzy evaluation method to analyze multiple decision...
The position is very important information for wireless sensor network, and the present localization methods are mostly suitable for static sensor networks. The paper presents a three-dimension localization algorithm for mobile node wireless sensor network based on Monte Carlo method named MDBMCL. The main contribution of the paper is that the enhanced Monte Carlo localization algorithm is proposed...
Two major component part of the communication network is the transmission and switching, with the demand of capacity of communication and the development of light communication. Because of the limitation of electronic transfer rate becomes the bottleneck of communication in the electrical. Therefore the key technology of all optical communication network was put forward —Optical Switching Technology...
In digital information age, rapid progress has been made in the integration of China's digital library resources and in the construction of specialized resources. The project “Zhejiang University Digital Library” (ZADL) has come into being. This paper introduces the overall construction, structure of resources, service system and the system of application. It has also discussed in detail the management...
Address table lookup algorithms based on TCAM can accomplish the fixed in one clock cycle prefix match, can achieve rapid switch table lookup and packet forwarding. But the switch of address table update process is a complex process which become the bottleneck of TCAM switch technology development. According to the distribution characteristics of different prefix length table entries and the update...
Aiming at the shortcomings of the information security under the environment of complex network, intrusion tolerance focus on remaining and providing continual network service even in the presence of attacks or intrusions and is the central issue of network security in recent years. The related theory of intrusion tolerance, the status and the applications of intrusion tolerance are studied in this...
IEEE 802.15.4g is an amendment to IEEE 802.15.4 standard. It is a new PHY layer scheme in order to meet the requirements such as low-power, low-cost and long-distance transmission according to the applications of smart metering utility network. In this paper, we put forward a high effective and low-power wireless ad hoc network system based on IEEE 802.15.4g standard. We design hardware and software...
Separation measure plays a decisive role in the multi-class support vector machine. Combine with Heterogeneity of network connection data, this paper propose improved HT-SVM based on heterogeneous distance. Firstly, define the heterogeneous distance; then compute the separation measure according to the heterogeneous distance between each two classes; then compute the sample that should belong to class...
In this paper, we propose an architecture of Equipment Inspection System (EIS), which is based on the function of Near Field Communication (NFC) and Mobile Internet (MI). First, this architecture adopts Android platform as the client side. Subsequently, we use the Apache MINA framework to implement the server with high performance, and a lightweight JavaEE framework to implement the Web server. This...
Nowadays, there is an explosive growth of commercial market which is based on mobile location service. One of the notable applications of location based service (LBS) is precision marketing which has displayed its attractiveness all over the world. The core of LBS is real-time and precise positioning technology. Positioning by mobile terminals and positioning by base stations are two major solutions...
Vehicular Ad-hoc network is a fast mobile broadband wireless network, which can provide a variety security applications and business applications of for vehicles such as traffic safety management, accident alarm, auxiliary driving, Internet information services. Routing is one of the key technologies of vehicle network, so this paper studies the VANET routing protocol by using literature comparative...
Physical layer security is an emerging technique to improve the wireless communication security and the corresponding techniques under practical scenarios especially with imperfect channel state information (CSI) need to be taken into consideration. In this paper, we investigate the robust secure transmission for cooperative decode-and-forward (DF) automatic-repeat-request (ARQ) in multiple-input-single-output...
Unit test is the first stage in the V-Model and the foundation of software test. By means of integrating Android JUnit, a testing tool, into a continuous integration platform named Jenkins, this paper proposes a fully automated unit test approach. The approach can generate a visual test report for Android projects. This achievement can significantly increase the efficiency of multiple unit tests,...
Based on PROPHET routing protocol, MRPTPAE is proposed according to the transmission probability and energy information in this paper which is a novel multicast routing protocol. The fact produce by node energy is considered. And the optimal next hop is decided by the weighted average of the EP which is composed by node energy and transmission probability. Meanwhile, the threshold of the packet forwarding...
A mathematical model of optimal lunar soft landing problem is given and several common lunar soft landing trajectory optimization methods based on minimum fuel consumption, including Minimum Principle, Ant Colony Op-timization method, Genetic Algorithm and Gauss Pseudospectral method are summarized. Solving steps of different methods are discussed and compared. All optimization methods can meet the...
Data security issue is a key bottleneck restricting the application of cloud computing promoting and applications. In this paper, states of the art of the techniques on cloud computing data security issues, such as data encryption, access control, integrity authentication and other issues is surveyed, on this basis, some important technical issues of the cloud computing data security should concern...
Parameters optimization are studied to improve the speed of computing in the Ant Colony Algorithm, Preferences unreasonable takes a long time and search is slow. In order to improve search efficiency of the algorithm, Parameter optimization rules are proposed in the Ant Colony Algorithm, The algorithm improves the basic ant colony algorithm in the parameter selection rules of α.β.ρ. and m, by improving,...
Quickly customized web service construction technology is a key in the astronomical data processing, it is a connection between the data source and the astronomers. In view of the current IVOA framework and web service implementation are too complex, astronomers cannot quickly master them. Astronomical web service construction template by simple customization can realize fast simplified construction...
With the wide-spread use of digital videos, quality considerations have become essential, and industry demand for video quality measurement standards is rising. In this paper, we proposed a no reference estimation of the coding PSNR for 4K-UHD videos in the compressed domain. As video coding parameters which can reflect the degree of distortion caused by compression can be extracted in compressed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.