The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently OGC GML (Geography Markup Language) specification has been the in fact standard of GIS data sharing and exchanging, and spatial interoperation. Adopting nested association expression approach of XML data, GML data documents store both spatial information and semantic relationship information of geographical elements. In order to improve the efficient of path query on GML two type information,...
Both software and hardware of computer systems are subject to faults, however, traditional approaches, ignoring the relationship between software faults and hardware faults, are unavailable for analyzing complex software and hardware faults. This paper proposes a systematic framework to analyze correlative software and hardware fault. It includes two associated processes, module level analysis and...
Certificateless public key cryptography is a recently proposed attractive paradigm which combines advantages of both certificate-based and ID-based public key cryptosystems as it avoids usage of certificates and does not suffer from key escrow. Since it was firstly introduced by Al-Ryiami and Pater-son in Asiacrypt 2003, numerous certificateless encryption and signature schemes with additional properties...
With extensions to current EAP key hierarchy, the EAP re-authentication protocol provides a consistent, method-independent and low-latency re-authentication mechanism to support intra-domain handoff authentication. This paper analyzed the efficiency of the EAP re-authentication protocol, and compared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP re-authentication...
There are a large quantity of non-certain and non-structure contents in the Web text at the present time. It is difficult to cluster the text by some normal classification methods. An algorithm of Web text clustering analysis based on fuzzy set is proposed in this paper, and the algorithm has been described in detail by example. The technique can improve the algorithm complexity of time and space,...
With the rapid development of the Internet and communication technology, huge data is accumulated. Short text such as conversation in chatting room and email is common in such data. It is useful to cluster such short documents to get the structure of the data or to help building other data mining applications. But most of the current clustering algorithms can not get acceptable clustering accuracy...
As the band of networks increases, the process speed of network-based intrusion detection system (NIDS) hardly keeps up with the speed of networks. By arranging several sensors to deal with the traffic in parallel, the intrusion detection system's speed can be significantly increased. How to split the traffic to the sensors is the key problem of a parallel intrusion detection system. To resolve the...
Ant colony optimization (ACO) algorithms have been applied successfully to combinatorial optimization problems. Rough set theory offers a viable approach for feature selection from data sets. In this paper, the basic concepts of rough set theory and ant colony optimization are introduced, and the role of the basic constructs of rough set approach in feature selection, namely attribute reduction is...
Grammar rule set is often used in natural language processing. Usually, rule set can only be gained in linguistics materials artificially. In this paper, through study on the using states of grammar rules in natural language processing, we propose a method, with using a typical way of data mining - mining association rules, of exploring Chinese grammar rules in real corpus environment. And we build...
Car plate recognition is a very important issue in many traffic related applications, and the enhancement process of car plate image is the key step at the very beginning. Its effect relates to the efficiency and precision of car plate localization and recognition directly. This paper brings forward a new car plate image enhancement method based on a simplified PCNN with the parameters determined...
Availability and reliability are of utmost important elements for real time systems. Availability means feasibility and compatibility of a system while reliability maintains a robust performing of a system. Most researches that related to real-time analysis have focused on the correctness but ignored the issue of compatibility, especially for substitutability of the involving tasks. Compatibility...
In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer...
Through the analysis of the vector map files, a new lossless compression algorithm for vector maps is proposed. In the algorithm, lossless transform differentiates the graphical data of vector maps into transformed coefficients, then, making use of the principle of reduction, these transformed coefficients are compressed reversibly. At the same time, BWT Block-Sorting Algorithm is adopted as a further...
Software reuse technology can improve the efficiency of program development greatly. A reusable Apla-Java component has been developed in the research of PAR (Partition and Recur) method and their tools. We have made the most of reuse-driven software theory and the partial implementation theory for reference which ensure the accuracy of the components effectively. Apla-Java component is an important...
Some target tracking occasions often requires to tracking a kind of target, such as human face, automobile and so on. A specific target tracking algorithm based on support vector machine (SVM) and AdaBoost is proposed. Moreover, the characteristic data of SVM is a critical factor to success to detecting target. The method selects part of Harr wavelet characters by AdaBoost as input data of SVM training...
As a common language in the Web sites, JavaScript helps to make various dynamic Web pages. But it??s more difficult to protect JavaScript source codes than to protect Java or C/C++ programs, because JavaScript codes can??t be compiled into byte or binary codes. This paper discusses the obfuscation method to protect source codes of script languages like JavaScript, and provides a algorithm by using...
With the wide application of global navigation and location technology, people have growing demands of solving the shortest path problem. In the real traffic network, all kinds of traffic information have greatly influenced path searching, such as traffic jams. So existing algorithms just remove the congested road and recompute the path. So the traveler needs to wait for a period of time. In order...
When studying attribute reduction, we need to enumerate all the minimal reductions to prove the correctness of the attribute reduction algorithm. The explosion of attributes combination makes time complexity of the enumeration algorithm pretty high. An algorithm derived from grouping the rows of decision table is put forward to validate if an attribute set is reduction. Based on this algorithm, a...
Distributed test framework can not only ensure that the quality of software testing but also can improve the automated test efficiency, and so on. The key technologies of the distributed test framework are studies in this paper. First, the main idea of the distributed test framework and its overall structure are given combined with the actual project needs; based on it, the key technologies involved...
An anomaly intrusion detection algorithm based on minimal diversity is proposed. It can deal with mixed attributes, so overcomes the deficiencies of most unsupervised learning methods. Based on the minimal diversity measurement, we use a small amount of marked data to guide clustering. When detecting new records, we calculate its diversity from the existing clusters to determine its category. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.