Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In such as Real-time Scheduling Problems with uncertain interrupt operation, Quantified Constraint Satisfaction Problems were introduced to model and solve Constraint Satisfaction Problems involving uncertainty or uncontrollability on the value taken by some variables. In the former work, we propose to implement the schedulability test by using the algorithm QCSP-SchTest. In this paper, we analysis...
Mobile sensor networks (MSNs) have many applications in recent years, especially in some harsh environment, such as coastal and border protection, search-and-rescue, battlefield reconnaissance and so on. MSNs may suffer from a large-scale damage which causes many nodes to fail and the network to get partitioned into isolate islands. So in order to avoid negative effects on the application, restoring...
We studied the relationships between two covering approximation space through mappings. We defined several mappings between two covering approximation spaces such as C-mapping, N-mapping, M-mapping, S-mapping, and, under these mappings, studied the changes of lower and upper approximations of each subset before the transforms and after the transforms. We also discussed the relationships of these mappings...
Image processing and pattern recognition have been applied to the image acquisition, image enhancement, extraction of classical structure characteristics, binary image processing, and image segmentation of synthetic minerals. They have also been used for the classification, recognition, testing, and survey of the classical structure characteristics, and with the information obtained, a complete image...
In this paper, The Kane Dynamics Modeling and solid model by Adams are established for the 5-DOF modular industrial robot. Dynamics model equations are derived by that the Joints practical input parameters and Kane dynamics method. The Kane modeling is simulated in the Matlab and the solid model is simulated in the Adams. Simulation experiments show that models are effective by the typical mission...
We present a method for 3D shape reconstruction of inextensible deformable surfaces from a single image. The key of our approach is to represent the surface as a 3D triangulated mesh and formulate the reconstruction problem as a sequence of Linear Programming (LP) problems. We use a closed-form method to generate an initial structure, then refine this structure by solving the LP problem iteratively...
Application automatic deployment is an important prerequisite for migration existing application to cloud platform and has become an important factor. From the user's actual needs, we designed and implemented for the automated deployment SLA (Service-Level Agreement) private cloud platform based on the VMware IaaS (Infrastructure as a Service) cloud platform. Meanwhile, to meet the specific needs...
The telecommunications network, radio and television network and computer communication network "triple play" fusion, is the inevitable trend of future development of university campus network, especially in wireless campus network construction should be forward-looking, fully facing the triple play services. Combined with the university campus network construction, put forward the design...
To improve the network invulnerability, most strategies are designed for optimizing the network capacity to prevent the cascade overload without considering the network robust under external attacks. To address this problem, based on the classical scale-free network model, this paper proposed a link-based network topology optimization algorithm referred as LNTO. The algorithm removed links among hub...
Vehicle Ad hoc Network (VANET) is an emerging technology and a new application of mobile Ad Hoc technology in the field of traffic. As the simulation experiments cost less manpower and material resources and they are easy to reproduce the same scenario, VANET simulation technology has become a focus of scholars. But node mobility is strictly limited in the realistic traffic environment and fast moving...
It's a key problem how to efficiently organize and manage the growing massive multi-source heterogeneous spatial science data. The paper researched a number of key technologies of data organization and management systems including data storage, data retrieval, and data visualization. Firstly, it proposed and designed effective system architecture, secondly, it enabled efficient storage, search and...
Rapid tooling (RT) technology can effectively improve the production efficiency and market competitiveness of enterprises, but the forming process of RT is influenced by many factors, which is a typical weak theoretical strong experience field, How to introduce the expert knowledge and experience into RT forming process is the key to improve product quality. However, due to lack of the information...
As a kind of important structured data, tree is widely used in domains like biology, molecular chemical, and text processing etc. However, many traditional machine learning methods cannot directly deal with tree-structured data. Currently, the commonly adopted approach is based on the subtree. It is supposed that the more common structure between two trees the more similarity between them. To effectively...
Target advertising is ubiquitous wherever we get online with any device. There is nothing unusual to click in and purchase for our potential desire. However, it may reveal the history we have browsed while sharing the device to others. Besides, when we alternate use the different devices, the target advertising is unaware of our switching, which leads to the miss of useful target advertising. This...
Micro-blog as a new forms of online media, has become a strong magnetic field of the network public opinion. Micro-blog own characteristics, analysis of the value of its network public opinion, design public opinion analysis system based on the Micro-blog, including text preprocessing, Micro-blog text vector extraction, topic detection and propagation of Micro-blog trend and tendency analysis process,...
The Address Resolution Protocol has been proved works well under normal circumstances to map logical addresses (IP) to physical addresses (MAC). However, malicious hosts can use its vulnerability to perform ARP attacking. We analyzed its vulnerability and existing methods of ARP attacking and protection, and proposed a new attack strategy by separating the attack initiator and beneficiary. Compared...
Work-stealing plays a key role in promoting load balancing for such applications that need continuous dynamic load balancing. However, the performance of current work-stealing algorithms is usually very sensitive to the choice of steal granularities since these algorithms typically adopt a fixed steal granularity. On the other hand, these work-stealing algorithms usually obtain poor performance for...
Frequent Patterns generation takes much time to execute, compute and the efficiency is less with massive datasets. In this paper, the enhanced FP-Growth (EFP-Growth) based on MapReduce framework using Hadoop approach has been proposed. The new method has high achieving performance with different minimum support. The EFP-growth can works with the large amount of datasets to discover a frequent patterns...
Privacy and anonymity have become a critical issue for the deployment of vehicular ad hoc networks (VANETs). Pseudonym certificates are the state-of-the-art approach for secure and privacy-friendly message authentication in VANETs. However, most proposed schemes focus on the strategy of pseudonym changing and the privacy among vehicles. Privacy towards certificate authorities is usually neglected,...
In this paper, we propose reversed taint analysis to dig out the root cause of the vulnerability leading to crash. In order to increase the efficiency, we propose that during the analysis process, we should only taint the EIP register when the crash happens and then trace back to analyze the data and operations, until we find out the influential inputs that can be controlled by the users. In addition,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.