Showing 419,841 - 419,860 results of 420,088 for search '"A$"', query time: 2.30s Refine Results
  1. 419841

    Design and implementation of OSPF vulnerability analysis and detection system by Zun-ying QIN, Guo-dong LI, Wei LI, Xu-chang HUANG

    Published 2013-09-01
    “…A universal and multi-mode OSPF vulnerability detection system was designed based on analysis and research of OSPF vulnerability.The system implements denial of service attack model with the method of forging entity router and man-in-middle attack model with zero-copy technology.The method combining SNMP and bypass monitoring was adopted to achieve real-time monitoring of test results.Finally,the system proves the vulnerability of different types of routing equipments in the test environment and the vulnerability hazards were analyzed quantitatively.…”
    Get full text
    Article
  2. 419842

    Properties of virtual MIMO signal and interference in cooperation cognitive networks by Xu BAO, Tie-cheng SONG, Lian-feng SHEN

    Published 2012-05-01
    “…A virtual MIMO scheme based on cooperation of the prim and secondary users was proposed in the wireless cognitive networks.The tight upper and lower bounds about the complimentary cumulative distribution function of the virtual MIMO signal and interference were derived.The asymptotic distributions of the bounds were also obtained.The theoretical derivations and numerical simulations testified that the upper and lower bounds had the same asymptotic distribution.The numerical simulation results reveal that the virtual MIMO technique improves the anti-interference ability of the primary signal.…”
    Get full text
    Article
  3. 419843

    Nonlinear scale-space based boundary localization for nonideal iris by Hong-lin WAN, Bao-sheng LI, Min HAN, Deng-wang LI

    Published 2014-03-01
    “…A nonlinear scale-space based localization method of nonideal iris boundaries was proposed.The method eliminates small-scaled geometric structures while preserving large-scaled iris boundaries by nonlinear diffusions with the scale-evolution property.Moreover it combines such diffusions with the frame of multiresolution analysis,and achieves fast and effective iris boundary detection.Experimental results indicate that compared with the classical methods,the proposed algorithm extract nonideal iris boundaries accurately and efficiently with overcoming the disadvantageous influences of the nonideal factors.…”
    Get full text
    Article
  4. 419844

    State-of-the-art survey of privacy-preserving data aggregation in wireless sensor networks by Xiaoying ZHANG, Hui PENG, Hong CHEN

    Published 2018-10-01
    “…A state-of-the-art survey of privacy-preserving data aggregation techniques in wireless sensor networks was reviewed.Firstly,preliminaries were introduced,including network models,adversary models,and performance evaluation metrics.Secondly,existing related work was classified into several types according to privacy preservation techniques,such as homomorphic encryption,data perturbation,slicing-mixing technique,generalization,secure multiparty computation,and the key mechanisms of typical protocols were elaborated and analyzed.Finally,the promising future research directions were discussed.…”
    Get full text
    Article
  5. 419845

    Load-aware user association algorithm based on potential game theory for UDN with CoMP by Jia YU, Yachao LIANG, Shushi GU, Ye WANG

    Published 2019-03-01
    “…A load-aware user association (LAUA) algorithm based on potential game theory for ultra dense network (UDN) with coordinated multi-point (CoMP) transmission technique was proposed.LAUA algorithm was capable to balance the load of base stations on the premise of satisfying users’ demand for quality of service,avoid over loading problem in heterogeneous UDN.This algorithm was applicable to the Internet of things application scenario that required uploading vedio data and other data transmission rates.The effectiveness of the proposed algorithm was proved by the simulation experiment.…”
    Get full text
    Article
  6. 419846

    Cloud native network for intelligent Internet of everything by Quan YU, Dandan LIANG, Wei ZHANG

    Published 2021-06-01
    “…A new cloud native network architecture for the future network architecture design in the era of intelligent Internet of everything was proposed, that is, network of the cloud, for the cloud, and by the cloud.Furthermore, the concept and mechanism of Cybertwin were proposed to tackle the challenges of mobility, security and availability in cloud native network.Three fundamental questions of cloud native network architecture design were also elaborated, that is, addressing, indexing and resource orchestration.Finally, 6G use cases and future research topics of Cybertwin based cloud native network were discussed.…”
    Get full text
    Article
  7. 419847

    Regulation of Apoptosis in African Swine Fever Virus–Infected Macrophages by Laslo Zsak, John G. Neilan

    Published 2002-01-01
    “…A number of viruses have evolved antiapoptotic mechanisms to promote infected-cell survival, either to ensure efficient productive viral replication or to promote long-term survival of virus-infected cells. …”
    Get full text
    Article
  8. 419848

    Warehouse mobile access network security associate pre-anticipated notification scheme based on AAA authentication by Yong-hui ZHANG, Zhang-xi LIN, Jian-hua LIU, Quan LIANG

    Published 2012-09-01
    “…A security pre-anticipated notification scheme was proposed for network mobility,based on AAA authentication.Pre-judged handover by wireless sensor network locating,security association information context was triggered to forward to data processing center in corresponding node router,in order to achieve trust authentication in advance.The scheme models on Pi calculus proved its compatibility with NEMO basic protocol.Analysis results display that costs become the half and simulations results show delay and resource occupied reduces significantly.…”
    Get full text
    Article
  9. 419849

    Method for determining the lengths of protocol keywords based on maximum likelihood probability by Jian-zhen LUO, Shun-zheng YU, Jun CAI

    Published 2016-06-01
    “…A left-to-right inhomogeneous cascaded hidden Markov modelwas proposed and applied to model application protocol messages.The proposed modeldescribed the transition probabilities between states and the evolution rule of phases inside the states,revealed the transition feature ofmessage fields and the left-to-right Markov characteristicsinside the fields.The protocol keywords were inferred by selecting lengths with maximum likelihood probability,and then the message format was recovered.The experimental results demonstrated that the proposed method perform well in protocol keyword extraction and message format recovery.…”
    Get full text
    Article
  10. 419850

    Mutual information power analysis attack of HMAC based on SM3 by Zhen WU, Min WANG, Jin-tao RAO, Zhi-bo DU, Sheng WANG, Ling-hao ZHANG

    Published 2016-10-01
    “…A novel method of mutual information power analysis attack was proposed.The method was built on the basis of the basic principle of power analysis and the basic theory of information.For the purpose of attacking the key,the mutual in-formation values was computed using two values between the mediate variable with the power traces.An experiment was im-plemented on the algorithm of HMAC based on SM3 using this method.The experimental results show the proposed attack method is effective because the initial value of state variable can be successfully retrieved to compute the real true key.…”
    Get full text
    Article
  11. 419851

    Vector space embedding of DNS query behaviors by deep learning by Chang-ling ZHOU, Xing-long LUAN, Jian-guo XIAO

    Published 2016-03-01
    “…A novel approach to analyze DNS query behaviors was introduced.This approach embeds queried domains or querying hosts to vector space by deep learning mechan then the relationship between querying of domains or hosts was mapped to vector space operations.By processing two real campus network DNS log datasets,it is found that this method maintains relationships very well.After doing mension reduction and clustering analysis,researchers can not only easily explore hidden relationships intuitively,but also discover abnormal network events like botnet.…”
    Get full text
    Article
  12. 419852

    The prevalence of sarcocystis species in sheep by Ferda Sevinç, Funda Altınöz, Uğur Uslu, Osman Selçuk Aldemir

    “…A total of 511 sheep brought to Konet Abattoir in Konya were examined for infections with Sarcocystis spp. using macroscopic and microscopic methods for detection from January to April 2000. …”
    Get full text
    Article
  13. 419853

    Research on resource monitoring and billing mechanisms of application engine in cloud computing environment by Yi REN, Jing ZHANG, Hong CHEN, Qing-bo WU, Jin-zhu KONG, Hua-dong DAI, Gang GUAN

    Published 2012-09-01
    “…A comprehensive study on the billing methods of existing cloud computing platforms was made.Then,AppScale,an open sourced scalable and typical PaaS software,as the foundation platform of our target resource monitoring and billing mechanisms was chose.Appscale’s structure,its components and how they worked together was analyzed.CloudMB,which enhanced AppScale by supporting process level resource monitoring and multi-user oriented billing function with flexible billing policies was designed and implemented.Finally,experiment verified that CloudMB is effective and its occupation of CPU time is lower than 3%.…”
    Get full text
    Article
  14. 419854

    Round reduction-based fault attack on SM4 algorithm by Min WANG, Zhen WU, Jin-tao RAO, Hang LING

    Published 2016-10-01
    “…A novel method of fault attack based on round reduction against SM4 algorithm was proposed.Faults were in-jected into the last four rounds of the SM4 encryption algorithm,so that the number of the algorithm's rounds can be re-duced.In known-ciphertext scenario,four traces are enough to recover the total 128 bit master key by screening these faults easily.The proposed attack is made to an unprotected SM4 smart card.Experiment shows that this attack method is efficient,and which not only simplifies the existing differential fault attack,but also improves the feasibility of the attack.…”
    Get full text
    Article
  15. 419855

    Microwave Assisted Hydrolysis of Holocellulose Catalyzed with Sulfonated Char Derived from Lignin-Rich Residue by Kui Wang, Xinfeng Xie, Zhan Si, Jianchun Jiang, Jingxin Wang

    Published 2015-01-01
    “…A microwave assisted green process has been developed for production of sugars through liquefying holocellulose catalyzed with sulfonated char derived from the lignin-rich residue produced during pretreatment of lignocellulose. …”
    Get full text
    Article
  16. 419856

    Fast view synthesis optimization algorithm based on texture smoothness by Huan DOU, Ke-bin JIA, Rui-lin CHEN, Yun-zhi XIAO, Qiang WU

    Published 2016-03-01
    “…A fast algorithm was proposed in order to reduce the v ew synthesis optimization (VSO) process in depth cod-ing for 3D-HEVC based on texture map smoothness.With the coding nformation derived from texture video sequences,the pixel regularity of smooth texture region was analyzed to set the skip rule using the properties of intra DC prediction and statistical methods.Then the depth regions corres to the flat texture map regions could be extracted and the VSO process of pixels belonging to this type of depth could be skipped.Experimental results show the effective-ness of the proposed algorithm.…”
    Get full text
    Article
  17. 419857

    Research of cross-tier cooperative transmission technology in heterogeneous network by GChen ZHAN, Xin SU, Wen-qing WANG, Jie ZENG, Yu-jun KUANG

    Published 2014-08-01
    “…A cross-tier cooperative transmission strategy with cooperative precoding is used to reduce the intercell inter-ference in heterogeneous network, especially the interference in cell range expansion areas. …”
    Get full text
    Article
  18. 419858

    An improved optimization algorithm in cross-layer allocation for multi-user OFDM system by Yaqin PAN, Li ZHANG, Shibing ZHANG

    Published 2016-08-01
    “…A cross-layer resource allocation model in multiuser OFDM system was proposed,which combined the channel state in physical layer and the user’s queue in MAC layer.The proposed hybrid optimization algorithm made use of the advantages of genetic algorithm and tabu search algorithm to improve the crossover of genetic algorithm.It would improve the global search ability,converge to the global optimal value faster,solve the cross-layer resource allocation problem more effectively and meet the user’s quality of service better.The simulation results show that the improved hybrid algorithm increases the throughput,reduces the average delay and improves the QoS of the system.…”
    Get full text
    Article
  19. 419859

    Seismic Passive Control of Cable-Stayed Bridges by Hosam-Eddin M. Ali, Ahmed M. Abdel-Ghaffar

    Published 1995-01-01
    “…A three-dimensional modeling procedure is proposed for cable-stayed bridges with rubber, steel, and lead energy dissipation devices. …”
    Get full text
    Article
  20. 419860

    Improvement Differential fault attack on TWINE by Yang GAO, Yong-juan WANG, Lei WANG, Tao WANG

    Published 2017-11-01
    “…A new method of differential fault attack was proposed,which was based on the nibble-group differential diffusion property of the lightweight block cipher TWINE.On the basis of the statistical regularity of the S-box differential distribution,the lower bound of the probability of recovering round key was calculated.Then expectation of number of fault injections when restoring seed key can be estimated.Theoretical proof and experimental results both show that an average of nine times of fault injections in 33,34 and 35 rounds bring about the seed key recovered completely.Finally,the improvement of the fault injection location was proposed,which enhances the feasibility of the genuine attack.…”
    Get full text
    Article