The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Thanks to Real-Time Specification for Java (RTSJ), Java now can be applied in real-time systems. However, in RTSJ's memory management system, assignment rules which aimed to prevent the creation of dangling references must be checked by real-time Java virtual machines (JVMs) at runtime. These frequent runtime object reference checks lead to additional time overhead and unpredictable running time,...
Group call is a major service in TETRA (Terrestrial Trunked Radio) networks, and there are some cases where group call conflict occurs. This paper presents a method to resolve group call conflict by merging the users requesting to initiate an existing group call into the ongoing call. In addition, this paper also comes up with a method to shorten the call set-up time by setting a time delay between...
With the rapid development of P2P network technology, the share of P2P Internet traffic is growing among the total internet traffic. Because of the complex structure of P2P network and its protocals is flexible, most of the traditional P2P simulations simulate P2P protocols. This paper presents a distributed P2P users' action simulation system which is able to flexibly configure the content and P2P...
Nowadays, while we are enjoying the convenience brought by such a huge repository of online web information, we may come across difficulties in finding the web pages we want related to particular information we are searching for. Hence, it is essential to classify web documents to facilitate the search and retrieval of pages. Existing algorithms work well with a small quantity of web pages, whereas,...
This paper proposes an approach to analyze customer satisfaction from Chinese reviews using opinion mining. Opinion mining technology is adopted to analyze customer satisfaction and discover useful information that can provide decision support. The proposed approach first extracts and groups the aspects simultaneously through a topic model based method. Then utilizing sentence based opinion mining...
Accurate analysis of the shared variables plays a critical role in enhancing the software quality level especially for safety-critical real-time embedded systems. Many methods are currently available to warn programmers for racing conditions. However, most of the methods focus on detection of suspicious shared variable access, leaving room for improvement on the level of accuracy of warnings. In this...
Test coverage is a effective approach of testing effectiveness and adequacy, which has positive impact on software reliability and defect coverage. The test coverage function describes the change of test coverage during the test procedure, and it is an important factor of software reliability models with test coverage. In this paper, the change of test coverage is represented by the generalized logistic...
In the command post, multi-person discussion is an effective means to improve the efficiency of command decision-making. Based on the existing command collaborative interaction technology, we discussed the application of command post “Brainstorming” argument process and mind map in collaborative research, and then, standardized users' operation in the process of discussion. At last, S PIN is used...
DoS (Denial of Service) attack forces a cloud network node to handle few unauthorized access that employ unwanted computing cycle. As a result, the cloud node response is slow as usual and resource on cloud network becomes unavailable. Some Dos attacks are Ping of Death, Teardrop, Snork, Locking authentication, SYN flooding, Operating System Attacks etc. The most vulnerable incident happen when the...
Probabilistic key pre-distribution techniques for ad-hoc wireless sensor networks cannot guarantee link establishment and are prone to redundancy and key reuse. There is also a tradeoff between storage requirements, scalability and key reuse, which limits secure scalability. Master key an d Computation based key establishment techniques are vulnerable to clone attacks in case of compromised nodes...
Lunar Relay Satellite plays a significant role in lunar science, manned lunar landing and lunar surface navigation. Compared with ground based telemetry and command methods, the approach applying GNSS (Global Navigation Satellite System) receiver to autonomous navigation system of lunar relay satellite has great application value. It can reduce the workloads of Deep Space Surveying Control Network...
Traditional workflow design tools which only provide the choreography of simple flow chart and do not provide a graphical configuration for access to a service, are unable to meet user demand for services. The article expands the Activiti Designer open source framework. It maintains communication through the bottom of the enterprise service bus, provides the registration services (OSGI, WebService,...
In this paper, we present two hybridization schemes of interactive Evolutionary Multi-objective Optimization Algorithms with Path Relinking technique. By applying these hybrid approaches to the Bi-Orienteering Problem, we show the performance advantage over other existing standard approaches such as NSGA-II. The experimental evaluations show that the proposed approaches can converge to the preferred...
Existing model checking tools for security protocols analysis have two drawbacks, when applied to present day cloud-based protocols. Firstly, they do not consider the new features of cloud computing. Secondly, they do not support the reconstruction of potential attack scenarios. Which could provide conclusive descriptions and non refutable proofs regarding the source of the attack, details of steps...
Recently many application are migrated towards cloud computing. It becomes an emerging field of research in software testing; moreover it is non-trivial to evaluate the performance of cloud services. Performance and load testing are one of the dominant means to evaluate the web-application performance. At the end of load testing performance analyst have to analyze thousands of performance counters...
Taint analysis determines whether values from untrusted or private sources may flow into security-sensitive or public sinks, and can discover many common security vulnerabilities in both Web and mobile applications. Static taint analysis detects suspicious data flows without running the application and achieves a good coverage. However, most existing static taint analysis tools only focus on discovering...
According to the characters of military command and control organization in network centric warfare, complex network is adopted to establish a knowledge transfer network model for the military C2 network based on scale-free network. Statistics of the model are studied. Numerical simulation of knowledge transfer on C2 network based on scale-free network is made compared to the same scale random network,...
Virtual Network (VN) bandwidth guarantee is an important issue in scenarios such as enterprise network and multi-tenant datacenter. The Software Defined Network (SDN) is sophisticated technology for network control and management. In this paper we proposed a VN bandwidth guarantee method which use SDN controller and Open vSwitch to allocate the available bandwidth by VN's priority. According to simulation...
Attackers who designed malware seem to be so cautious that most of the malware are disguised as normal apps. This brings about huge difficulties to detect the malware. Similar with traditional PC testing, there are two main detection methods for Android malware: static analysis and dynamic monitoring. However, these methods inevitably face the challenge of code confusion performance cost. In this...
In recent years, it was proven that the apparatus integrated with pulse magnetic field, vibration and heating three physical factors can obtain positive curative effects. This paper presents a friendly and accurate control system based on WinCE for magnetic-vibrant-thermal (MVT) therapy apparatus. The system mainly consists of four modules including data processing, real-time control, graphical interface...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.