The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to ensure the security of the sharing service in grid, a dynamic authorization model based on trust mechanism is presented, which is based on role-based access control. In the model authorization is obtained while the trust worthiness of the bargainers exceeds the trade threshold; it also introduces the concepts of task and condition into the authorization model so that it can achieve dynamic...
With the increasing development of e-commerce application, e-commerce system security is facing the heavy challenge. To solve the purpose of intensifying the behavior trustworthiness and controllability of e-commerce system, we focus on building the trustworthy model between e-commerce system and user behaviors and strengthening the manageability of e-commerce systems. This paper by setting up the...
The identification of defect parameters in thermal non-destructive test and evaluation (NDT/E) was considered as a kind of inverse heat transfer problem (IHTP). However, it can be farther considered as a shape optimization problem then a structure design optimization problem, and the design results should meet the surface temperature profile of the apparatus with defects. A bacterial colony chemotaxis...
The application of Missing Data Technique (MDT) has shown to improve the performance of speech recognition. To apply MDT to cepstral domain, this paper presents a weighted approach to compute the reliability of cepstral feature based on sigmoid function and introduces a weighted distance algorithm. It is deduced that the reliability compensates the Gaussian variance in hidden Markov model (HMM) frame...
The more-electric aircraft concept (MEA) is one of the major trends in modern aircraft electric power system (EPS) engineering that results in a significantly increased number of onboard loads driven by power-electronics. Development of appropriate EPS architectures requires intensive simulations to ensure the system integrity, requested quality and performance under possible normal and abnormal scenarios...
The application of network computing technology, more and more widely, its security is particularly important to the emergence of trusted computing research for the security of network computing application technology research has provided new opportunities. In this paper, the credibility of Web-based computing environment, the structure of thought and its implementation model.
User requirements obtained through text data mining are very important to improve the competitiveness of enterprises. In this paper an algorithm of acquiring user requirements in machinery products by using text association rule is proposed. In the algorithm, the user requirement documents are represented by vector space model. The feature words matrix is obtained by transposing the documents matrix...
Inspired by the change of antibody concentration, network security system can reduce the false alarm rate effectively. In this paper, we discuss the nonlinear dynamics of antibody number in the antibody concentration inspired network security method. According to the conclusion of this paper, we can get the general calculation approach to compute the accumulation of antibody number in the antibody...
Evacuation simulation can greatly ease the cost of money and material in fire case by using computer. Integrating ABM and GIS technology can not only recurrent the evacuation process, but also analyse optimal evacuation route, optimize the supermarket layout by GIS spatial analysis functions. A model is used to determine the action rules of evacuation staff, simulate the evacuation process on Agent...
Create a Hamming-Weight model, combine it with traditional algebraic attack, and achieve the Correlation algebraic attack on the first round of AES128 according to correlation coefficient r. The attack experiment proves that owing to this proposed model, it can evidently distinguish the right key bytes from the wrong ones by this function with further computed correlation coefficient r, and in certain...
The thesis proposes a hybrid intrusion detection model based on the parallel genetic algorithm and the rough set theory. Due to the difficult for the status of intrusion detection rules. This model, taking the advantage of rough set's streamline the edge to data and genetic algorithm's high parallelism, succeeds in introducing the genetic-rough set theory to the instrusion detection. The application...
In this paper, we solve the searching problem by high level features used by sign language recognition. Firstly, we find the face in video frames that has complex background, and then we find the left sign and right sign in specific areas. By computing the signs' length, position, velocity, acceleration, Fourier figure descriptor and etc, we generate the signs' dynamic features. Consequently, we segment...
For improving the reliability of the data stored up, this paper brings forward an improvement scheme. It expands the error correction from One-dimensional (1-D) model to Three-dimensional (3-D) model. This thesis has listed and has analyzed three models' (1-D, Two-dimensional (2-D) and 3-D) structure method and their error correction process, and from all-round aspects to compare the three kinds of...
Efficient data mining and indexing is important for multimedia analysis and retrieval. In the field of large-scale video analysis, effective genre categorization plays an important role and serves one of the fundamental steps for data mining. Existing works utilize domain-knowledge dependent feature extraction, which is limited from genre diversification as well as data volume scalability. In this...
An object pool model based on RMS is proposed. Aimed to solve the Memory peak problem in J2ME, on the basis of object pool design pattern, an object pool model used RMS is designed and implemented. According to the test result, the performance of program can be increased and the memory overhead can be reduced by using the model.
This paper faces the general problem of modeling pinna-related transfer functions (PRTFs) for 3-D sound rendering. Following a structural approach, we aim at constructing a model for PRTF synthesis which allows to control separately the evolution of ear resonances and spectral notches through the design of two distinct filter blocks. Taking such model as endpoint, we propose a method based on the...
In this decade, peer-to-peer (P2P) applications have emerged as popular tools for sharing data and they have gained much attention. Such P2P applications build overlay networks on top of existing infrastructure networks and disseminate data in a peer-to-peer manner. How well the P2P overlay network maps onto the underlying physical network topology can significantly impact P2P application performances...
Mobile devices are carried by people, which are characterized by their need to socialize. The social character of mobile networks may have an influence in modeling the mobility of their nodes, and consequently in the performance evaluation of the network. In this paper, we introduce social behaviors into existing mobility models so as to mimic real motion of users and evaluate their impact on network...
Nonlinear effects of a power amplifier (PA) in communications systems include spectral spreading, which causes adjacent channel interference. For predistorter design, it is crucial to employ a model that can sufficiently model the intermodulation distortion (IMD) caused by the PA. The order of IMD generated by a polynomial is determined by its highest order basis. For a piecewise linear function,...
Delay Tolerant networks (DTNs) are one type of wireless networks where the number of nodes per unit area is small and hence the connectivity between the nodes is intermittent. In this case, the performance in terms of transport of information from source to destination relies on the mobility of the nodes which would cause their encounters and hence the relay of information from one node to another...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.