The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Certificateless public key cryptography is a recently proposed attractive paradigm which combines advantages of both certificate-based and ID-based public key cryptosystems as it avoids usage of certificates and does not suffer from key escrow. Since it was firstly introduced by Al-Ryiami and Pater-son in Asiacrypt 2003, numerous certificateless encryption and signature schemes with additional properties...
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
This paper presents a Kalman-filter-based method, to track the direction-of-arrival (DOA) of a moving target using antenna array in mobile communications. There are two major new features about the proposed scheme. Firstly, traditional Kalman filter needs measurement transformed. However, it is difficult and costly to be obtained. And our method could work without this message. Secondly, the traditional...
With the advent of the grid, task scheduling in heterogeneous environments becomes more and more important. The model of grid scheduling is analyzed in this paper. The optimal objective is to minimize the total completing time. This paper presents an improved particle swarm optimization (PSO) algorithm with discrete coding rule for grid scheduling problem. The improved PSO algorithm can keep all the...
In the paper, we propose phase type (PH) distribution service time working vacation scheme cyclic polling system for WDM. This system consists of multi-queues (terminals). Using the decomposition approach, each queue is analyzed as a single server queue with PH distribution service time working vacation scheme which works at a different rate rather than completely stops during the vacation polling...
A threshold secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Threshold secret sharing is useful in management of cryptographic keys. Based on Birkhoff interpolation, Tassa has proposed an ideal hierarchical threshold secret sharing scheme. Then based on Sure interpolation and participants' identity,...
In view of importance of teaching quality evaluation, the process and results are fully concentrated on considering entirety and dynamics. A method of teaching quality evaluation calculation is proposed on the basis of grey relation analysis and implemented by way of VB program. The no-strictness and no-accuracy results of conventional calculating methods are analyzed. Discusses how to calculate the...
The 3D standard k - ?? model coupled with the volume of fluid (VOF) method of water-air two-phase flow is established in long-distance diversion tunnel with free flow. The method of wall functions which considers the roughness of the walls is utilized near the walls, and the method of pressure-implicit with splitting of operators (PISO) is applied to solve the unsteady water-air two-phase flow field...
Text categorization is an important research field within text mining. The initial objective of text categorization is to recognize, understand and organize various volumes of texts or documents. The general procedures of categorization are treated as supervised learning, from which the similarity can be inferred from a collection of categorized texts for training purpose. Obviously, the typical approaches...
The traditional security enforcement approach of network is employing cryptography and authentication scheme. However, we consider that the conventional view of security based on cryptography alone is not sufficient for the wireless LAN and Third-generation (3G) integration networks against malicious or non-malicious insertion of data from internal adversaries or faulty nodes. In this paper, we propose...
Modelica is a new object-oriented language for modeling of large, complex, and heterogeneous physical systems. It is designed to allow for convenient and efficient modeling and simulation of the differential-algebraic equations (DAEs) systems. However, in many engineering fields, partial differential equations (PDEs) are applied. So it is necessary to be able to handle PDE models in Modelica. In this...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.