The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers and suggests efficient patrol of nurses from analysis result of nurse calls log. As the method of analysis, we consider applying Bayesian network. This is one of probability model that is available for prospects of a phenomenon, rational mind decision and so on. In conventional studies, correlation coefficient was used to examine relation between phenomena. However, we could analyze...
In order to save volume of home energy consumption effectively, this paper proposes the method for being aware of factors with influence on energy consumption and then confirms if it works for practical data by numerical experimentation. The basic idea is based on the combination of information entropy for the former and on Bayesian network for the latter. Using 345 responses for the questionnaire...
Aiming at the shortages of the existing data-mining model for forecasting the industry security, a classification model based on rough sets and BP neural network (BPNN) is put forward in this paper. First, the theory of rough set is applied to pick up and reduce the index attributes. Then, the training samples are sent to the BPNN to train and learn. After that, the sorts of the coal industry security...
We construct the first general secure computation protocols that require no trusted infrastructure other than authenticated communication, and that satisfy a meaningful notion of security that is preserved under universal composition- assuming only the existence of enhanced trapdoor permutations. The notion of security fits within a generalization of the "angelbased" framework of Prabhakaran...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
Nowadays, online social networks host more and more applications in order to provide their users with the possibility of finding everything they need on a single platform. The number and diversity of interactions that take place over time between users and applications within these platforms make these environments very good candidates for learning various types of information about users' interests...
Sensors are being deployed to improve border security generating enormous collections of data and databases. Unfortunately these sensors can respond to a variety of stimuli, sometimes reacting to meaningful events and sometimes triggered by random events which are considered false alarms. The intent of this project is to supplement human intelligence in a sensor network framework that can assist in...
A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface...
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
Pixel-value-differencing (PVD) based steganographic methods, which take into account the characteristic of human visual system, usually lead to large embedding capacity and good visual imperceptibility. In this paper, a recently proposed PVD-based steganography is further studied. First, by deriving a sufficient condition for data embedding/extraction, we show that the method can be generalized, and...
Focused on the present status that the algorithm of measuring time-series distance is many but the appropriate algorithm of measuring multiple granularities time-series is few, the paper advanced a similarity matching algorithm of multiple granularities time-series based on the ideal of time calibrator and hypothesis test. It firstly expounded the definition of multiple granularities time-series,...
The tight coupling between system and market operations implies that there are strong interrelationships between system security management and market performance. Therefore, the assurance by the regional transmission organization (RTO) of secure system operations strongly depends on, and directly impacts, electricity markets. Typically, electricity is traded in a sequence of markets that are cleared...
In recent years, digital watermarking technologies are considered to be important means to protect digital image copyrights. In this paper, we combine a non-invertible watermark scheme with an HVS model adaptive watermark. The application of adaptive watermarks improves visual imperceptibility. However, we find that an adversary is able to apply ambiguity attacks on the non-invertible watermark scheme...
To overpass the speed gap between processor and main memory; cache memory is used. Cache memory is having hierarchical structure, including level 1 cache (L1), level 2 cache (L2) etc. Effective page replacement algorithm will result in effectual utilization of cache. L1 is having rich temporal locality while L2 is having poor temporal locality, thus same replacement algorithms for both the levels...
Association rule mining discovers interesting association or correlations among a large set of data items. Association rule mining make decision making process easier by providing the important information to the user. The most of the work done in this field is concerned with mining in an isolated form, but it is not only the case and many times more than one parties are involved in this process....
Two parties that conduct a business transaction through the internet do not see each other face-to-face nor do they exchange any document or currency hand-to-hand. Electronic payment is a way by which the two parties transfer the money through internet. Offering electronic payment can also help businesses improve and customer retention. When electronic money is transferred from a buyer to a seller...
Combined with the characteristics of network security audit system, paper introduced the idea of dynamic programming to pattern-matching algorithm, and gave the best dynamic matching algorithm, that is, by solving for matching pairs of local sub-problem, and for the number of different rules, (deleted) to find the best combination for the pattern-matching algorithms, then to achieve the strategy of...
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
Service creation by composing existing services and/or network resources is considered by Telecom and Internet industries as the trend for service provisioning in next generation networks. Related research work is being carried out for years, and various service composition approaches have been proposed by different standardization organizations and companies catering to different network requirements...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.