The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
The server cluster technology become more and more prevalent in the enterprise level applications, failure detection is one of the key technologies which can ensure the server cluster continue providing services. This paper introduced several types of the server cluster failure, and its design objects; we then analyzed the existed detection mechanisms, and get rid of the traditional detection enhancement...
Statistical models in which both fixed and random effects enter nonlinearly are becoming increasingly popular. These models have a wide variety of applications in many areas such as agriculture, forestry, biology, ecology, biomedicine, sociology, economics, pharmacokinetics, and other areas. Mixed effect models are flexible models to analyze grouped data including longitudinal data, repeated measures...
Availability and reliability are of utmost important elements for real time systems. Availability means feasibility and compatibility of a system while reliability maintains a robust performing of a system. Most researches that related to real-time analysis have focused on the correctness but ignored the issue of compatibility, especially for substitutability of the involving tasks. Compatibility...
Business process modeling is the key operation of Web services composition, and it is a new method for business process modeling by using communicating sequential process (CSP), current research only focuses on the functional requirements of Web services composition, but it ignores the non-functional requirements, although Timed CSP (TCSP) can analyze timing attributes of Web services composition,...
The key issue for parallel cluster computing is the stability of load balancing method, the unstable behavior such as oscillatory action which caused by delay can intensely influence the performance of load balancing algorithm. In such a case, a linear dynamic load balancing model is proposed in this paper. By analyzing the stability of this linear model, we can not only obtain the relation between...
Spatial information service plays an important role in E-Government, but different models differ most in various applications of decision-making support activities. Therefore, how to evaluate the applicability of spatial application model is the key problem for the usage of spatial models in E-Government application. In this paper an evaluating model has been proposed to solve this problem. Based...
NS2 is an object-oriented simulation tool to simulate and analyze network elements; it is also a powerful tool to develop new protocol and scheme. In the paper, we analyze the features and models of wireless network in details; discuss the simulation process and implementation of wireless network on the basis of NS2. Also, AODV protocol and self-defined MFlood protocol in wireless network are simulated...
Self-similarity is the one of important characteristics of real network traffic. In order to simulate the network traffic accurately, we present a technology of self-similar network traffic generation, and describe it from algorithm and hardware.On algorithm we analyze several typical self-similar traffic models, describe the superiority of multifractal wavelet in detail, and make it our generation...
The growth of urban areas into forested and agricultural lands is a local and global planning issue of great concern. The proposed model is hence based on the raster data model. The raster-based GM is implemented using object-oriented Microsoft Visual C++ programming under the Microsoft Windows environment. To satisfy more analysis methods expended for this system, such as CA and neural network models,...
This paper represents the information flow of the system with information flow graph (IFG). If constructing the system IFG based on the source code of the system directly, it may produce a great number of information flow paths not existing because of the transitivity of the information flow. This paper handles the transitivity of the information flow with the program dependence graph (PDG) before...
Clinical pathways are widely adopted by many large hospitals around the world in order to provide high-quality patient treatment and reduce the length and cost of hospital stay. However, nowadays most of them are static and non-personalized. Our objective is to capture and represent clinical pathway using organizational semiotics method including Semantic Analysis which determines semantic units in...
Along with the thorough development and application for Web services, the security of it has taken people??s attention more and more. While Web services security (WSS) can exchange safe SOAP message and enhance the security of Web services, it will also have certain influence to the performance of Web services. In order to satisfy the security of it , to reduce the performance influence of Web services...
One model for barrier coverage in sensor networks is Maximal Breach Path (MBP). Many proposed methods for searching MBP are just for 0-dimensional point targets. Xie proposed a coverage analysis approach for sensor networks based on Clifford algebra. In a 2-dimensional plane, a homogeneous computational method of distance measures has been provided for points, lines and areas, and a homogeneous coverage...
Based on the coupling of PC-Crash and embedded MADYMO, influence laws of pedestrian??s head WAD involved in a vehicle/pedestrian collision are analyzed by modeling vehicle/pedestrian multi-body system and selecting main factors influencing on pedestrian??s head contact location on vehicle body surface as independent variables for simulation tests. Various influencing factors and laws of pedestrian...
Based on a detailed investigation of a variety of current software test models, a novel behavior-based software test model is first proposed. It includes several activities, namely test design, test plan, test case generation, test execution, test result analysis and test reuse. And they are laid out in the whole lifecycle of software development process. Then the model is intentionally applied to...
The layout understanding of ballot image is the basis of the ballot image recognition, and the ballot table recognition is the key to the layout understanding of the ballot image. This paper presents a method based on a binomial trees model to realize the ballot table recognition. We first analyze the layout characteristics of the ballot image, then study the logic dependence between the candidate...
Common information model (CIM) is an object model for describing and sharing enterprise wide management information. It covers the gamut-network, systems and application management definitions-in a far more comprehensive way. This paper probes into the concept, attribute and classify of the common information model, and also discusses the function, content, the characters and problems of common information...
This article studied on the optimal model of kidney exchange policy. Analysis yielded several bottleneck factors that affect the efficiency in the process of matching access of the kidney transplantation: ABO Blood Type, Age, Waiting time, kidney quality, etc. Taking into consideration of these factors, we developed a mathematical model of game theory and statistical method to measure the overall...
To meet the organization process measurement need, this paper presented an integrated measurement model for the software process management, which establishes the relationship between organization unit, role definition and the GDM analysis result of business goal. This model supports such process measurement activities as the data collection, data analysis and communication of analysis result. When...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.