The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The crane scheduling model based on birth and death chain is established in this paper through analysis of the working process of the cranes and dispatching rules. According to the model, the equilibrium conditions of the system are analyzed. And probabilistic characteristics and the performances in steady-state are calculated. Furthermore, the numerical test cases are applied to testify the effectiveness...
Multi-Robot System can achieve intelligent warehouse management, one of its key issues is the rational allocation and coordination of tasks. According to the characteristics of tasks in warehouse, a new task-grouped approach is proposed, which is based on the idea of "the global tasks are grouped first and redistributed later ", improving the traditional static allocation algorithm is applied...
In cloud computing, an energy efficient resource allocation problem becomes more and more challenging. Multiple cloud servers can cooperate to establish a virtual machine pool to support internal users and to offer services to public cloud users. Game theory is used to solve the problem of resource allocation. In this paper, we study the cooperative behavior of multiple cloud servers and present the...
Presents the introductory welcome message from the conference proceedings. May include the conference officers' congratulations to all involved with the conference event and publication of the proceedings record.
Recent malware processes are armed with stealthy techniques to detect, subvert malware detection facilities of the victim. Traditional host-based detection tools execute inside the very hosts they are protecting, which makes them vulnerable to deceive and subvert. To address this limitation, improve the effectiveness and accuracy of detection, and boost the ability of tamper resistance, a VMM-based...
The aim of such initiatives is to provide a higher quality of life, to minimize the increased pressure via information and communication technology based solutions on public issues, from building better transportation systems to supporting creative innovation, or designing energy-saving policies and so on, or planning governance and business questions and supporting decision making in enabling a smart...
Traditional Relation Extraction (RE) trains individual extractors for pre-defined relations. Open Relation Extraction (ORE) can eschew domain-specific training data, tackle an unbounded number of relations, and scale up to massive and heterogeneous corpus such as the web. However, It is difficult to process micro log texts: the genre is noisy, utterances are very short, and texts have little context...
This paper studies the current status and advance of study of password cracking. First, we give a classification for password cracking from different dimensions. We studies brute-force cracking, dictionary cracking and rainbow table cracking. We found some new techniques such as brute-force cracking based on probability method, Markov models and data mining. High performance computing in password...
Non-interactive non-repudiation is a very important property of signcryption which enables a receiver to settle a repudiation dispute with the help of a judge without the need to engage in costly multi-round interactive communications with the judge. In this paper, we construct the generic "Sign-then-Encrypt" and "Encrypt-then-Sign" compositions for signcryption with non-interactive...
In industrial practices, there are lots of parts or components with complex shape, such as hydraulic blade, propeller, etc. Thus, rapid measurement for those parts or components will affect the production cycle and cost greatly. In this paper, we introduce the binocular vision to measure the hydraulic blade. First, the camera calibration is conducted to calculate intrinsic and external camera parameters,...
The positioning accuracy of the traditional GPS single point positioning is lower and applies only to the occasion of the low accuracy of the positioning. With the development of GPS positioning technology, the requirements for the positioning accuracy are also constantly improving, using differential GPS technology can improve the positioning accuracy significantly. We can learn from differential...
To solve the impact from the oscillation at the edge of the target and background in synthetic aperture radiometer image, the characteristics of synthetic aperture radiation image has been analyzed, and an algorithms of synthetic aperture radiation image background suppression and target detection based on wave atom transform has been proposed. The simulation and experimental results show that the...
In recent years, many approaches based on mathematical morphology have been applied in remote sensing image processing. In the paper, we proposed to use attribute profiles (APs) for textural extraction to the problem of content-based image retrieval (CBIR). In particular, four different attributes of APs with multiscale were applied to spatial information description. Then, the obtained textural images...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.