The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An attack activity to cyberspace will cause the security devices generating huge number of security events, it is unfeasible to analyze these events by the manual way for the security manager. After analyzing the existing algorithms of security events correlation, we propose an attack scenario reconstruction technology based on state machine. The processes of attackers intruding into the cyberspace...
The computational load makes the direction finding algorithm, known as the signal phase matching principle based on the singular value decomposition (SPMSVD), time-consuming as a result of the procedure searching spectral apexes, especially when it estimates multi-parameters simultaneously (namely joint estimation of parameters). In order to improve the deficiencies, an immune memory based quantum...
Aiming at the problem that recognition rate of Principal Component Analysis (PCA) algorithm is low in face recognition, this paper proposes a modular PCA algorithm based on Within-Class median. Firstly, within-class median of each sub-image of all training samples in each class are calculated, and they are used to normalize each corresponding sub-image of within-class sample. After that, the best...
A feature extraction approach for printed Tibetan character based on fractal moments is proposed. After analyzing present feature extraction approaches-image projection approach and directional line element approach, the fractal moments theory is applied in the proposed approach. The extracted features using the new method can describe the local and global properties of the character, and decrease...
The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc, the iris has some advantages such as uniqueness, stability, high recognition rate, and non-infringing etc. As we known, the traditional iris recognition is using Gabor wavelets features;...
Embedded systems have become more and more important in our lives. However almost the security protections dedicates in the PC system defense, and there is little effort in the research of the embedded systems security. Embedded systems are in danger. What is more, there are varied kinds of embedded systems platforms, which exacerbate the protection in the embedded systems. This paper is going to...
In order to visualize the satellite navigation simulation system, the framework of a distributed satellite navigation simulation system composed of multi-platform systems was analyzed. The composition and the functions of the satellite navigation simulation system visualization software were illuminated. Based on MFC, presented the designing and realizing methods of the system information display...
Most wavelet filters that constructed based on Daubechies compactly-supported wavelet construction theory have nonlinear phase and irrational number coefficients. Nonlinear phase may cause distortion in image processing, and irrational filter coefficients will cause much inconvenience for wavelet applications on computer, especially for embedded processor applications. With thought of the theory of...
With the development of Internet, the efficient network management of heterogeneous network devices from different vendors becomes more and more difficult. The Network Configuration Protocol (NETCONF) is presented as a new solution. But it can't be widely used in current networks soon because most devices are based on Simple Network Management Protocol (SNMP) and Command Line Interface (CLI). Therefore...
In order to relieve the conflict between improving service quality and enhancing resource efficiency in Web proxy cache cluster, a new elastic Web proxy cache cluster-EWPCC is presented. Basing on the “on demand” characteristic of cloud computing, EWPCC could acquire resource from cloud when the Web cache system is overloaded and release unnecessary cloud resource after load down. In this way, using...
Aiming at the actual loading state of outer shaft lining, the mechanical model was established. The calculational formula of ultimate loading capacity of outer concrete shaft lining based on three relatively applicable biaxial failure criteria was deducted, and compared with the result based on triaxial failure criteria. The results show that it will exorbitant estimate the ultimate loading capacity...
In this paper, we discuss a general integrated query problem for the heterogeneous data. We first assume that there exist a global and loosely coupled distribution data model, and then based on this assumption a general integrated query processor is designed, which can integrate query processing for the heterogeneous data sources in large-scale distributed environment.
A novel feature extraction algorithm was proposed aiming at improving speech recognition rate in noise environmental conditions. Core technology was the Multiple Signal Classification (MUSIC), which estimated MUSIC spectrum from the speech signal and incorporated perceptual information directly into the spectrum estimation, then the cepstrum coefficients were extracted as the feature parameter. We...
Object tracking is a challenging problem due to the presence of noise, occlusion, clutter and dynamic change in the scene other than the motion of object of interest. A variety of tracking algorithms has been proposed and implemented to overcome these difficulties, but there are still some problems need to be covered. This paper proposed an algorithm to track the moving objects employing a color-based...
Network bandwidth and hardware technology are developing rapidly, resulting in the vigorous development of the Internet. A new concept, cloud computing, uses low-power hosts to achieve high reliability. The cloud computing, an Internet-based development in which dynamically scalable and often virtualized resources are provided as a service over the Internet has become a significant issue. The cloud...
Recent advances in Wireless Sensor Networks (WSNs) make them more important to apply. Therefore, security issues are more significant in WSNs. WSNs are susceptible to some types of attacks since they are consisted of cheap and small devices and are deployed in open and unprotected environments. In this research, an Intrusion Detection System (IDS) created in cluster head is proposed. The proposed...
WiMAX is a technology based on IEEE 802.16 standard that enables the delivery of last mile wireless broadband access as an alternative to wired access such as cable or DSL. WiMAX can provide mobile wireless broadband connectivity without the requirement for direct line-of-sight with a base station. With the development of wireless network, WiMAX has the characteristics of long transmission distance,...
Fault-tolerance is an important research topic in the study of distributed systems. To counter the influence of faulty components, it is essential to reach a common agreement in the presence of faults before performing certain tasks. However, the agreement problem is fundamental to fault-tolerant distributed systems. In previous studies, protocols dealing with the agreement problem have focused on...
This paper presents a new test data compression method which simultaneously reduces test data volume, test application time and test power for system-on-a-chip (SoC). The proposed approach is based on the use of alternating variable run-length code and the decompression architecture is also presented. For data streams that are composed of both runs of 0's and runs of 1's, alternating run-length codes...
A novel BIST structure is presented which can greatly reduce the test power dissipation without losing fault coverage. Single input change test pattern is generated by a counter and a gray encoder. The built-in test vectors are generated by the single input change patterns which are exclusive-ORed with seeds generated by the modified LFSR. All test vectors will be single input change patterns during...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.