The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
According to chaotic characteristics, a method for studying on chaos by using Poincare sections is proposed. The method can study on sensitivity to parameters and initial conditions for chaotic system. A lot of experiments based on Chua's chaotic circuit have been done. The simulation results demonstrate the effectiveness of this method.
Continuous Auditing (Continuous Auditing, CA) is one of the cutting-edge issues in the field of the computer-assisted auditing research. Compared to traditional auditing, continuous auditing is essentially auditing methods of innovation, it can not only raise the audit efficiency and improve the audit quality to a certain extent, but also achieve the auditors, the audited enterprises and the information...
To collect neuronal activity data from awake, behaving freely animals, we developed miniaturized telemetry recording system. The integrated system consists of four major components: (1) microelectrodes and micro-driver assembly; (2) analog front end (AFE); (3) Programable system on chip (PSoC); (4) Radio transceiver and the LabVIEW used as a platform for the graphic user interface. The result showed...
Dynamic link library is prepared by insertion of the key technologies Trojan. This article describes the process of hiding several basic methods, and how to call a dynamic link library under .Net environment, and then achieved dynamic link library insertion base on remote thread insert, under .Net environment.
This paper proposes two novel designs of Adder/Subtractor using reversible logic gates. The first design is an implementation of two's complement Adder/Subtractor suitable for signed/unsigned numbers. The other design proposes a novel reversible gate that can work singly as a reversible Full Adder/Subtractor unit. The proposed Full Adder/Subtractor is then applied to design a reversible 4-bit ripple...
In the instruction of computer courses, some students copy other's source code as themselves. In order to detect this plagiarism accurately, researchers did a lot. In this paper, we described a source code plagiarism detection technology based on AST, this technology can detect the plagiarism accurately when the position of functions is changed by plagiarist. At first, transforming the programs to...
Network intrusion detection is one of the hottest research issues on the network security recently. In the paper, three kinds intrusion detection model are introduced. By using Bayesian methods, Fuzzy Decision Engine and Immunity-Based Model, we can improve the performance of intrusion detection system and effectively reduce the false positive alarm. Based on the three models, some drawbacks of NIDS...
Multi-parallel architecture for MD5 (Message-Digest Algorithm 5) implemented on FPGA (Field-Programmable Gate Array) is presented in this paper. To accelerate the speed, a general architecture for Host Computer and FPGAs is proposed. The MD5 implementation is presented. Besides the internal parallelization of MD5 modules, FPGAs can be easily duplicated and connected to Ethernet LAN. The design was...
Through analysis of the development of information retrieval and information push services in digital library, this paper brings forward an intelligent analysis algorithm of reader's information retrieve interest. The main idea is getting the resembling degree between reader's access behavior and built-in specific behaviors classified by information retrieve interests through fuzzy matching of reader's...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
The application of network computing technology, more and more widely, its security is particularly important to the emergence of trusted computing research for the security of network computing application technology research has provided new opportunities. In this paper, the credibility of Web-based computing environment, the structure of thought and its implementation model.
User requirements obtained through text data mining are very important to improve the competitiveness of enterprises. In this paper an algorithm of acquiring user requirements in machinery products by using text association rule is proposed. In the algorithm, the user requirement documents are represented by vector space model. The feature words matrix is obtained by transposing the documents matrix...
Evacuation simulation can greatly ease the cost of money and material in fire case by using computer. Integrating ABM and GIS technology can not only recurrent the evacuation process, but also analyse optimal evacuation route, optimize the supermarket layout by GIS spatial analysis functions. A model is used to determine the action rules of evacuation staff, simulate the evacuation process on Agent...
Create a Hamming-Weight model, combine it with traditional algebraic attack, and achieve the Correlation algebraic attack on the first round of AES128 according to correlation coefficient r. The attack experiment proves that owing to this proposed model, it can evidently distinguish the right key bytes from the wrong ones by this function with further computed correlation coefficient r, and in certain...
An object pool model based on RMS is proposed. Aimed to solve the Memory peak problem in J2ME, on the basis of object pool design pattern, an object pool model used RMS is designed and implemented. According to the test result, the performance of program can be increased and the memory overhead can be reduced by using the model.
The downlink performance of systems exploiting multiuser diversity has been shown to improve by using multiple antenna receivers and diversity combining techniques. However, the cost and power restrictions of the user mobile terminals prohibit the use of multiple antennas whereas the size limitations can result in correlated and coupled receive antenna elements downgrading the effectiveness of the...
Computer technology development and internet generalization yielded commercial game invigoration. Recently, interface of internet FPS games became realized similar to reality to attract users toward a higher level of immersion. This paper discusses aesthetic contemplation of the interface of rapidly developed FPS games and the users' behavior in the virtual space thereof. Game and art do not seem...
Recently, both networking and high-performance computing technologies have dramatically advanced. As a result, scientists can access large-scale data captured by scientific measurement devices with ease. Also, recent high-performance computing technologies such as the Grid and cloud computing have allowed scientists to use huge computational power harnessed on the Internet for their analysis of scientific...
E-mail isn't just a simple way of delivering information, but is a core tool of task process. A company mainly uses e-mail as a way to internally communicate and to process main tasks of business. Currently, mail capacity being used in a company has been increasing in rate of 40% and 70% of company information is being preserved in e-mail. However, most of the companies manage e-mail by using diverse...
Recently, various methods related with the multi-touch technologies have been proposed and multi-touch interface is being applied in the field of game. Multi-touch interface overcome the limit for control of game and it can offer game of various contents to users. In this paper, we understand multi-touch interface and by implementing the game based on the multi-touch interface, we suggest the direction...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.