The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
WiMAX security has two goals, one is to provide privacy across the wireless network and the other is to provide access control to the network. The security sub-layer of IEEE 802.16 employs an authenticated client/server key management protocol in which the BS, the server, controls the distribution of keying material to the client SS. This paper analyzes the physical layer threat and MAC layer threat...
Currently OGC GML (Geography Markup Language) specification has been the in fact standard of GIS data sharing and exchanging, and spatial interoperation. Adopting nested association expression approach of XML data, GML data documents store both spatial information and semantic relationship information of geographical elements. In order to improve the efficient of path query on GML two type information,...
An improved color image enhancement algorithm based on MSR was proposed in this paper. The appropriate wavelet bases were selected to decompose the input image into three levels. Then different enhancement algorithms were employed to process the decomposed wavelet coefficients and scale coefficients. For the wavelet coefficients, after the analyzing of each level??s characters, a modified adaptive...
Single CPU dual bus architecture is a new kind of architecture aimed at reducing the security vulnerability of Von Neumann architecture, and it has been proved theoretically reasonable. In this paper, a bus bridge is implemented to bridge CPU and dual bus. The experiment is done and the result has proved that the architecture based on single CPU and dual bus is reasonable and effective.
The paper presents a method to reconstruct a controllable 3D head and face model for a specific person. The 3D grid-muscle head and face model of the certain person is created after selecting key feature points from a front face photo and a left side face photo of the person, deforming the grid points and muscle vectors of a basic model. Then after texture mapping, we reconstruct the special person's...
Grid and peer-to-peer technology are widely applied to file sharing system. P2P overlay network topology and search algorithm have always got much attention of researchers. A mismatch between overlay and the Internet infrastructure has critical performance implications in search efficiency. We design a file sharing system named RP(k)C-Grid. It is a hybrid topology overlay network composed of two parts:...
This paper adopted multiscale geometry method, distilled the principal component from the image after Contourlet transform, lowered the dimension of the high frequency subdomains, eliminated the noise by minimum variance cost function. The entire arithmetic without estimate noise, compared to Contourlet hard threshod denoising and wavelet hard threshod denoising, PSNR increased 1 dB, the denoising...
Synchronization is an important problem in the design and development of the software, which has been resolved in the object-oriented programming (OOP). However, the implementation of OOP is easy to leads to code-tangling and code-scattering between functional properties and crosscutting properties. Aspect-oriented programming (AOP) can solve the problem of code-tangling and code-scattering, and provide...
A global frame of secure instant messaging system based on Microsoft MSN is proposed to solve the security problems that exist in instant messaging. A secure add-in is designed and integrated seamlessly into the MSN client utilizing interfaces of the MSN client. The identity based cryptography is introduced into the secure instant messaging field and thus a secure instant messaging key management...
Both software and hardware of computer systems are subject to faults, however, traditional approaches, ignoring the relationship between software faults and hardware faults, are unavailable for analyzing complex software and hardware faults. This paper proposes a systematic framework to analyze correlative software and hardware fault. It includes two associated processes, module level analysis and...
The vehicle license plate (VLP) location is the key technique of the vehicle license plate recognition system. The region of license plate has rich edge information and fixed color feature. The location method fusing gray edge and color feature is more accurate and easier than the method only in gray space or in color space. The experiments on 200 Chinese automobile RGB real color images taken from...
At present, storing XML document in a relational database is a hot topic because relational databases are mature and scale well. In this paper, a novel relational database storage structure that can store XML document is proposed. An algorithm that translates XML document to relational database is given according to the proposed storing structure and algorithms that translate XPath Query to SQL Query...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.