The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, design of a cost effective RF based attendance and access control system for office use is presented. The design utilizes a low cost and readily available wireless door bell for wireless transmission of user information. The user module consists of an AT89C52 microcontroller which transmits different codes using transmitter section of door bell corresponding to various push buttons...
We proposed a new compressed pattern matching algorithm in DNA sequences. In this approach, we compress both DNA sequences and patterns by using two bits to represent each A, C, T, G character. Here the process is to find out the specific fingerprint pattern present in the multiple files where the pattern specifies a group of pixels and referred by different colors. Once the origin and destination...
The accuracy of RFID real time location system depends on the accuracy of time difference of arrival measurement, for the problem of high precision measurement of the time difference of arrival in RFID real time location system, this paper analyzes the time difference of arrival measurement error. In the RFID real time location system, using link forwarding technology in order to avoid time integration...
With the increment of traffic flow, the delay of flights in the TMA area is increased. It is essential that the potential usage of TMA airspace should be excavated. In this paper, SIMMOD PLUS is used for the evaluation of airspace structure of Chongqing TMA, taking Chongqing airport influence and its flow control strategy into consideration. Furthermore, the bottleneck which limits the operation of...
Networking is an important concept in the field of computing in the contemporary world. While networking equipment are readily available on the market, people in need of computer networks however often turn to other trained and qualified networking personnel to set up their required local area network. The fact that a network can physically and logically be represented and configured in different...
In this paper we introduce a well synchronized eye gaze tracking system with voice confirmation, which aims at adding new dimensions to the present level of providing authentication. It is specifically modeled for those areas where computers demand very high security. We use an IRVS based human machine interaction system using head and eye coordination movement, narrow FOV cameras & use those...
The article analyzes the advantages and disadvantages of Apriori, AprioriTid and AprioriHybrid simply. To solve the bottleneck of AprioriHybrid algorithm, a kind of Hash-based method to condense candidate itemset is presented, and providing the corresponding algorithm. Finally the experiment proves the efficiency of improved AprioriHybrid-H is better than AprioriHybrid Algorithm's, there is strong...
To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing...
Since various XML query applications have come to the fore recently, performance optimization becomes the research hotspot. With the popularity of multi-core computing condition, parallelization appears as an important optimization measure. The paper presents a parallel solution to XML query application through the combination of parallel XML parsing and parallel XML query. The XML parsing is based...
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering privacy and confidentiality, etc. To describe the uncertainty in data, probabilistic approaches are widely used among other approaches. This paper gives a survey study on some probabilistic...
To begin with, we discuss the combination between Grid and DSS; then construct a spatial river basin decision support system base on information Grid; and then study it in detail; finally focus our attention on decision-making models.
In this paper, the auxiliary equation method is used to seek exact solutions of a 3-dimensional KdV equation. As a result, topological 1-soliton solutions are successfully obtained with the aid of symbolic computation. It is shown that the auxiliary equation method is a very effective and powerful mathematical tool for solving nonlinear evolution equations in mathematics and physics.
This paper presents a framework for enabling mobile agents to be organized dynamically and autonomously with two unique compositions and interagent interactions on dependable distributed systems. The first enable an agent to contain other agents inside it and migrate to another agent or computer with its inner agents. It provides a powerful approach to composing and deploying large-scale mobile software...
This paper studies a practical example of product data management (PDM) in a medium-sized manufacturing company in China. In PDM practices, some issues are common in all company because they are independent of the problems to be solved. However in PDM practices there are some issues relying on the specific operations, products and organizational state in different company. In this PDM practices, the...
Recent years, moving object detection of video frequency sequence image is more and more important unseeing in intelligent monitory, video compression, automatic navigation, man-machine interaction, virtual reality and so on. In this paper, we use a method of moving object detection based on combining background difference algorithm with edge-texture and object match to get the result In the method,...
Direction of arrival (DOA) estimation of coherent signals is always an important problem on space spectrum estimation. Having studied SVD algorithm, a new method of DOA estimation of coherent signals is proposed based on Toeplitz matrix reconstructing. Firstly, the eigenvector corresponding to the largest eigenvalue is obtained from the received data covariance matrix, and a new Toeplitz matrix is...
Why are n-player games much more complex than two-player games? Is it much more difficult to cooperate or to compete? n-player Cherries is the n-player version of Cherries, a two-player combinatorial game. Because of queer games, i.e., games where no player has a winning strategy, cooperation is a key-factor in n-player games and, as a consequence, n-player Cherries played on a set of rows is PSPACE-complete.
As networks became an integral part of everyone's lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to secure the privacy of a networks but only big organizations are utilizing these technologies with their full potential as their implementation require costly resources. Here we have a comprehensive...
An inverted index structure of path that based on domain ontology is proposed in this paper. The all of distinct entities in domain ontology are indexed; and for each distinct entity an inverted list, storing the entity and the identifiers of the path containing the entity, and experimental results show that the index structure is more suitable for the query of multiple keywords and it can eliminate...
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of hiding methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.