The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
To overcome the common defects of early convergence in the existing genetic algorithm, an improved genetic algorithm with new crossover operator and new crossover strategy was presented for the solution to the vehicle routing problem with soft time window (VRPTW). Experiments show that the improved genetic algorithm can dramatically reduce the number of same or similar chromosomes, and increase the...
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
This paper presents a Kalman-filter-based method, to track the direction-of-arrival (DOA) of a moving target using antenna array in mobile communications. There are two major new features about the proposed scheme. Firstly, traditional Kalman filter needs measurement transformed. However, it is difficult and costly to be obtained. And our method could work without this message. Secondly, the traditional...
Effective management of a supply chain requires the ability to detect unexpected variations at an early stage, which brings the possibility of taking preventive decisions to mitigate the variations. This paper proposes a methodology that monitors the dynamic trends of supply chain performance indicators, and gives early-warnings for potential risks. Initially, a supply chain model is built using system...
This paper studies the realizing progress of data mining in psychological evaluation. Based on the matrix of evaluation data and the actual evaluation work, we propose a kind of generalized linear regression model with convex constraint, named as evaluation model, in which the dependent variable and regression coefficients all are unknown. We analyze the algorithm of the model with linear regression...
With the advent of the grid, task scheduling in heterogeneous environments becomes more and more important. The model of grid scheduling is analyzed in this paper. The optimal objective is to minimize the total completing time. This paper presents an improved particle swarm optimization (PSO) algorithm with discrete coding rule for grid scheduling problem. The improved PSO algorithm can keep all the...
Business process modeling is the key operation of Web services composition, and it is a new method for business process modeling by using communicating sequential process (CSP), current research only focuses on the functional requirements of Web services composition, but it ignores the non-functional requirements, although Timed CSP (TCSP) can analyze timing attributes of Web services composition,...
In the paper, we propose phase type (PH) distribution service time working vacation scheme cyclic polling system for WDM. This system consists of multi-queues (terminals). Using the decomposition approach, each queue is analyzed as a single server queue with PH distribution service time working vacation scheme which works at a different rate rather than completely stops during the vacation polling...
In view of importance of teaching quality evaluation, the process and results are fully concentrated on considering entirety and dynamics. A method of teaching quality evaluation calculation is proposed on the basis of grey relation analysis and implemented by way of VB program. The no-strictness and no-accuracy results of conventional calculating methods are analyzed. Discusses how to calculate the...
The 3D standard k - ?? model coupled with the volume of fluid (VOF) method of water-air two-phase flow is established in long-distance diversion tunnel with free flow. The method of wall functions which considers the roughness of the walls is utilized near the walls, and the method of pressure-implicit with splitting of operators (PISO) is applied to solve the unsteady water-air two-phase flow field...
Text categorization is an important research field within text mining. The initial objective of text categorization is to recognize, understand and organize various volumes of texts or documents. The general procedures of categorization are treated as supervised learning, from which the similarity can be inferred from a collection of categorized texts for training purpose. Obviously, the typical approaches...
In order to overcome the subjective limitation in existing evaluation methods, based on determination of the evaluation indicator weight by using rough set theory, a new fuzzy synthesized evaluation method of e-business website is proposed. It reduces subjective influence and increases the objectivity of evaluation result. An example shows the effectiveness and practicality of this evaluation method.
The mixed model assembly lines are a type of production line where a variety of product models similar with product characteristic are assembled. In the assembly line balancing problem, the tasks required to assemble the product model are allocated to workstations. Precedence graphs of all models should be combined to a non-cyclical joint precedence graph according to ranked positional weigh algorithm...
The traditional security enforcement approach of network is employing cryptography and authentication scheme. However, we consider that the conventional view of security based on cryptography alone is not sufficient for the wireless LAN and Third-generation (3G) integration networks against malicious or non-malicious insertion of data from internal adversaries or faulty nodes. In this paper, we propose...
A novel approach for scene matching real-time image geometric rectification is proposed. Based on the analysis of the reason caused geometric distortion in the process of real-time image capturing, two coordinates system are given, the real-time image distortion classification are analyzed, and the distortion mathematic models are established. Then, the geometric rectification of the real-time image...
Modelica is a new object-oriented language for modeling of large, complex, and heterogeneous physical systems. It is designed to allow for convenient and efficient modeling and simulation of the differential-algebraic equations (DAEs) systems. However, in many engineering fields, partial differential equations (PDEs) are applied. So it is necessary to be able to handle PDE models in Modelica. In this...
In this paper, we investigate the equilibrium and bifurcation of a predator-prey system by means of a computer aided analysis, and obtain the conditions of Hopf and Turing bifurcation in a spatial domain. It will be useful for studying the dynamic complexity of ecosystems.
Based on the coupling of PC-Crash and embedded MADYMO, influence laws of pedestrian??s head WAD involved in a vehicle/pedestrian collision are analyzed by modeling vehicle/pedestrian multi-body system and selecting main factors influencing on pedestrian??s head contact location on vehicle body surface as independent variables for simulation tests. Various influencing factors and laws of pedestrian...
We present a framework for describing and analyzing security protocols. It simplifies the applied pi calculus of Abadi and Fournet by moving away the infinite processes and the capability of transmitting channels in order to make the framework fit for describing practical protocols. An alternative operational semantics is given to make the framework more efficient when analyzing protocols. The semantics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.