The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we design a kind of magnetic compass sensor based on magnetic sense effect. The core of 3D magnetic sensor in each axis using Pomo alloy material molded to form a cylindrical core structure. Three axial magnetic core fixed on the polycarbonate plastic base is tightly matched with epoxy resin adhesive between the core and the base, which forms three-dimensional integration core structure...
In this paper, it is shown a new comprehensive weighting to compute the weights of risk factors in information security risk assessment. firstly, the principal eigenvector is the representation of subjective weights by all risk factors pairwise comparison judgment matrix derived from AHP. Moreover, the objective weights of risk factors are calculated by the entropy weight method. Finally, the comprehensive...
Mobile Delay Tolerant Network (MDTN) is widely applied in several scenarios, especially in suitability for communication without infrastructure. Moreover, caching problem is still a key point of the research. In this paper, we mainly describe caching mechanisms under mobile delay tolerant network, which is divided into two parts, one is cooperation caching mechanism, which has been deeply studied,...
As more and more cores are integrated on a single chip, memory speed has become a major performance bottleneck. The widening latency gap between high speed cores and main memory has led to the evolution of multi-level caches and using DRAM as the Last-Level-Cache (LLC). The main problem of employing DRAM cache is their high tag lookup latency. If DRAM cache misses, the latency of memory access will...
In the field of information security, risk assessment is the core of the risk management and control. This paper proposes a security risk assessment method based on threat analysis combined with AHP and entropy weight. This method has features that are suitable for website such as practical, easy operative and independent. And the AHP and entropy weight make the evaluation results more objective....
In recent years, modern web applications are becoming more and more complex and it makes difficult for developers to audit the code. The number of attacks against these applications has increased rapidly. Automated detection techniques for web applications are badly in need. Execution after execution (EAR) vulnerability is a kind of logic flaws for web application. It allows the server-side execution...
Multiplications in finite fields are crucial due to the fact that they are widely used in areas of cryptography. We propose bit-parallel multipliers in finite fields for trinomials, Equally-Spaced-Polynomials (ESPs), pentanomials, All-One-Polynomials (AOPs), and Successive-One-Polynomials (SOPs). Main improvements of this paper with known results are as follows. First, SOP is first studied for finite...
Recently, content delivery has become a hot research field. However, with the increase of network scale and the mobility of users, content delivery in traditional network needs to deploy a number of content servers to cache contents, so as to satisfy multilevel users. Deploying so many servers will lead to a lot of costs, and it will cause the delay of network increase at the same time. Therefore,...
Information security access platform is a core security practices of foundation to construct security access platform system of smart grid, and undertake a various important function of real-time monitoring, security access, secure data transmission and exchange, active defense in all kinds of complex network environments. However, the monitoring of network traffic classification is directly related...
Recently, since the wireless sensor network exhibits powerful performance, it has been frequently used in transmission of information in various fields. However, many problems are gradually revealed in the information transfer process. When wireless sensor networks transmit data packets for communication, the large amount of data makes the transmission very difficult. In the meantime, information...
Scale estimation and occlusion detection are challenging problems in object tracking. Most existing methods fail to handle scale variations and occlusion in complex video sequences. This paper presents a novel approach for robust scale estimation with multi-feature integration in a tracking framework, and extract histogram of oriented lines (HOL) feature and color-naming (CN) feature enhance description...
A blind source separation-based anti-jamming method for frequency hopping (FH) communication is proposed in this paper by space pre-whitening. Aiming at short-time stationarity of the FH signal and non-vanishing time correlation of the colored noise, the impact of colored noise is weaken through space pre-whitening by using joint difference correlation matrix established in the selected characteristic...
MQ-based cryptosystems have the potential to resist future quantum computer attacks, and can be efficiently implemented. We investigate the side channel attacks against MQ-based cryptosystems in this paper. For MPKCs, which are based on solving multivariate quadratic system, there isn't side-channel leakage found for their major computation components. For Cryptosystems based on calculating multivariate...
In this paper, we summarize and propose the DTN physical model for deep-space communication. According to deep-space characteristics, we design a new self-adaptive routing protocol for deep-space DTN. The new routing protocol can work well in long-delay and intermittent network environment. We have many contrast simulation experiments on our DTN simulator.
Variable selection is very important for interpretation and prediction, especially for high dimensional datasets. In this paper, a new method is proposed based on Random Forest (RF) to select variables using Mean Decrease Accuracy (MDA) and Mean Decrease Gini (MDG). We also use dichotomy method to screen variables, which is proved to perform very fast. Experiments on 10 microarray datasets show that...
An approach for medical image segmentation based on Fuzzy C-Means (FCM) and Level Set algorithm is proposed in this paper. FCM algorithm is suitable for solving the problems of fuzzy and uncertainty in gray level images. Level Set algorithm can effectively solve the change of the topology of the curve evolution, and realize multiple-objects extraction. In this paper, first the noise is eliminated...
In the research of information security information security issues, many factors can cause the system to insecurity. In order to improve the accuracy of the risk assessment of information security, information security risk assessment model based on GA (genetic algorithm) and BP neural network is proposed. Using genetic algorithm to optimize the weights and thresholds of BP neural network to establish...
This article has as a purpose to develop and assess two methodologies that allow to enhance spatial resolution without significant loss of the spectral resolution, with an Ikonos image and a Ortophoto. Using the RGB-IHS transform and the wavelet implementation of the Wavelet TRWH transform (Fast Haar transform) and Haar. Applying the fusion to the intensity components of the multispectral image (Im)...
In this article is presented and assessed a massive parallel processing model for basic operations with k-mers from genomic sequences, based on defined functions in terms of N-dimensional spaces. The model is implemented using a set of OpenCL cores available at github.com/bioinfud/k-merscl and assessed using a heterogeneous platform CPU/GPU and a dataset based on randomly generated k-mers. The results...
Community detection has realistic meaning to the research of network structure. In this paper, we propose a community detection algorithm (BSSCD algorithm) by calculating the similarity of nodes and dividing the nodes with maximum similarity into the same community. In order to accurately calculate the similarity of nodes, we define a novel similarity calculation method which combines Salton index...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.