-
681
Hierarchy of color and light contrasts in the city wayfinding system
Published 2024-12-01“…In this work, we seek to identify the navigational potential of environmental objects and build hierarchical relationships using systematization and generalization methods between the elements of the composition within the view frame of the visual space. …”
Get full text
Article -
682
Research and implementation of safety authentication technology in Internet of vehicles
Published 2021-09-01“…Nowadays, safety certification technology for Internet of vehicles (IoV) cannot well defend the various attacks, and there are also many shortcomings when considering the balance between safety and performance.Based on the in-depth analysis of the research status and security threats for IoV, a hierarchical vehicle-to-vehicle (V2V) safety authentication scheme was proposed.Furthermore, an L-type safety authentication scheme which based on more than one trusted third parties was proposed.Aimed at ensuring the information safety of the communication process and preventing the communication data from being stolen, the schemes were more suitable to IoV.…”
Get full text
Article -
683
Decomposition Methods for Solving Finite-Horizon Large MDPs
Published 2022-01-01“…This paper is one of the first works to deal with non-stationary finite-horizon MDPs by proposing a new decomposition approach, which consists in partitioning the problem into smaller restricted finite-horizon MDPs, each restricted MDP is solved independently, in a specific order, using the proposed hierarchical backward induction (HBI) algorithm based on the backward induction (BI) algorithm. …”
Get full text
Article -
684
The Intermediate Data Structure (IDS) for Longitudinal Historical Microdata, version 4
Published 2014-05-01“…Discussions with users over the last four years resulted in important changes, like the inclusion of a new table defining the hierarchical relationships among ‘contexts’, decision schemes for recording relationships, additional fields in the metadata table, rules for handling stillbirths, a reciprocal model for relationships, guidance for linking IDS data with geospatial information, and the introduction of an extended IDS for computed variables. …”
Get full text
Article -
685
Distributed Energy Management for Port Power System under False Data Injection Attacks
Published 2022-01-01“…The attacker can tamper with the interaction information of energy equipment, penetrate the boundary between port information system and port power system, and cause serious operation failure of port energy equipment. Firstly, a hierarchical topology is proposed to allocate the security resources of the port power system. …”
Get full text
Article -
686
Resource Scheduling for Cloud Data Center Based on Data Mining in Smart Grid
Published 2015-03-01“…Since the wide use of virtual technology,the resource use rate in cloud data center has been improved effectively than ever before.However,there is still a large space for improvement due to the resources usually are pre-started and pre-allocated by the user demand rather than the actual needs.In order to allocate available resource more accurately,two algorithms were proposed to meet the needs of the daily use in most of time.The available virtual resources would be arranged according the forecast using the algorithms of hierarchical composition of loading and the peek resources needs would be dynamic allocated using the algorithms of stochastic equilibrium and queuing theory.The results of experiment via the system based upon above theories show that the solution provides a kind of very effective advanced means for the optimal use of resources and energy saves.…”
Get full text
Article -
687
Key Technologies of Wavelength Routing for Space-based Information Network
Published 2022-03-01“…With the expansion of space exploration scope and the enrichment of exploration means, the number of users carried by space-based information networks has increased rapidly, and the types of services have been continuously updated.As a key technology of optical network, wavelength routing technology is of great signifi cance to improve wavelength utilization and ensure network service quality.Three typical wavelength routing methods of space-based information networks based on multi-service, dynamic characteristics and software defi nition were introduced.And the intelligent wavelength routing technology, hierarchical wavelength routing technology and multipath wavelength routing technology in space-based information networks were studied.The key technologies of wavelength routing in space-based Optical information networks were prospected.…”
Get full text
Article -
688
Hacia la constitución de una economía de mercados jerárquicos: Modernización capitalista y tradicionalismo social en los industriales chilenos (1952-1958)
Published 2016-12-01“…This program was accompanied by a traditional and hierarchical understanding of labor relations, and a growing distrust of politicians and to the autonomous technocratic cadres in the state. …”
Get full text
Article -
689
Micro-station sleeping algorithm based on coverage area priority in 5G network
Published 2022-07-01“…With the maturity of 5G mobile communication technology and the rapid growth of the number of mobile terminals, the problem of intensive energy consumption of 5G wireless communication system base stations is prominent.A micro base station area hierarchical sleep algorithm was proposed.Considering the impact of micro base station load, inter station distance and inter layer cooperation on micro base station sleep, the transitions number of the micro base station in the overlapping coverage area between macro base stations is less, and the priority sleep operation has a good energy-saving effect.The simulation result shows that the energy-saving rate is 23%, which can adapt to different network sizes, and the energy-saving effect is better in large-scale networks.…”
Get full text
Article -
690
INTEGRATED BAYESIAN CONFIDENCE RELIABILITY EVALUATION MODEL BASED ON WEIBULL TYPE ZERO-FAILURE DATA
Published 2020-01-01“…Based on the Weibull distribution,the distribution curve method was adopted to analyze,and the hierarchical priors distribution was constructed to give the comprehensive E-Bayes estimation of the failure probability,and the estimated value of distribution parameters were obtained by combining the least square method. …”
Get full text
Article -
691
Risk assessment model based on fuzzy Petri nets
Published 2013-08-01“…Aiming at the complex in the process of network security risk assessment, the asset, vulnerability and threat were used as the major factors in security assessment to establish the hierarchical index system for security assessment. The concept of credibility was introduced, and the security risk assessment model and fuzzy reasoning algorithm based on fuzzy Petri net were also proposed, making use of fuzzy Petri nets method joined together with the AHP to analyze the question, and combining qualitative analysis and quantitative analysis together. …”
Get full text
Article -
692
Android malware detection method based on SimHash
Published 2017-11-01“…A new similarity detection scheme based on hierarchical SimHash algorithm was proposed.The scheme extractd contents from different aspects to represent the APK file,then used the improved SimHash to respectively represent the file.The scheme analyzed the APK file by extracting the AndroidManifest.xml file in it,the sum of the Smali code from the decompilation of dex file,instructions extracted in Smali files,Java code set,and instructions extracted in Java code files.Through the study of Voted Perceptron voting algorithm,the scheme used trust weight method,by valuating a trust weight in every layer,then combined all the result with weight in every layer as a resule of scheme,the result can be more reasonable and more convincing.…”
Get full text
Article -
693
A Voice Data Storage Strategy of Record Server in Broadband Cluster System
Published 2013-05-01“…Then, according to the session category,the session data was stored in the disks in document form,using hierarchical directory management method,in order to provide a convenience query and playback for client.…”
Get full text
Article -
694
Survey on cyber deception
Published 2017-12-01“…The asymmetric situation of network attacks and defenses is one of the key issues of current network security.Cyber deception was a revolutionary technology introduced by defenders to alter the asymmetric situation.By thwarting an attacker's cognitive processes,defenders can mislead attackers,hence causing them to take specific actions that aid network security defenses.In this way,defenders can log attackers'behavior and method,increase cost for the attackers to launch a successful attack,as well as reduce the probability of an attacker's success.Cyber deception formally and classify cyber deception into four classes was defined.Then,the cyber deceptions’development was divided into three stages,and each stage’s character was decided.Next,a hierarchical model to describe the existing work was proposed.At last,the countermeasures in cyber deception and the development trends in this field was discussed.…”
Get full text
Article -
695
Research on QR code logistics privacy based on segmented encryption and time-limited control
Published 2019-08-01“…In view of the disadvantages of the existing logistics system in the market in user privacy protection,a privacy protection scheme based on QR code segmentation encryption,hierarchical authorization and time-limited control was proposed.This scheme segments all the recipient information into RSA and Base64 encryption,after integration,it is embedded into the QR code.In the process of logistics transportation and delivery,different levels of QR code decryption permissions are granted to different branches or transfer centers to view the designated content.At the same time,the QR code automatically becomes invalid after the user signs for it,so as to protect the user's privacy.The core idea of the scheme is to minimize the contact group of recipient information and reduce the possibility of user information disclosure.…”
Get full text
Article -
696
Robust image hashing method from global perception features of human visual cortex
Published 2011-01-01“…Firstly,the image was filtered low-passly and re-scaled to fixed size.Then the image was divided into key-dependent overlapping blocks.According to the hierarchical structure of HVS primary visual cortex,directional contour responses were extracted through layer-by-layer processing of visual pathway,and global perception features could be obtained by associating with the surface color of each blocks.These features included image direction and color information.The relation of adjacent entries was invariant to ordinary image processing.It could be used to quantize and permute these feature to get the binary image hash.Test results indicate that the proposed method is robust against con-tent-preserving modifications such as JPEG compression and filtering,at the same time,is capable of localizing image malicious tampering.Hashes of different images have very low collision probability.…”
Get full text
Article -
697
Research on dynamic traffic control strategy of IoT cloud service
Published 2018-12-01“…Flow control is very important to ensure quality of service in cloud service system.A dynamic two-level flow control strategy was proposed.Using the improved minimum connection number algorithm based on the actual cloud service system,the integrated load of the service node was calculated,load balancing was performed on each service node and the load was distributed reasonably.Within the service node,a dynamic hierarchical threshold adjustment strategy was proposed to control traffic dynamically.The actual cloud service system performance test shows that with the dynamic two-level flow control strategy,the RPS of the service node is significantly better than the RPS without the strategy,and the resource utilization of the service node is improved.…”
Get full text
Article -
698
RAPID ASSESSMENT OF THE REGION’S SUSTAINABLE DEVELOPMENT AS AN EFFECTIVE TOOL OF THE EXECUTIVE AUTHORITIES
Published 2021-05-01“…The paper determines a hierarchical system of indicators for rapid assessment of sustainable development of the region, which will make it possible for regional legislative and executive authorities and local self-government bodies to quickly, and objectively analyse the state of the economy of municipalities and the region as a whole. …”
Get full text
Article -
699
The Intermediate Data Structure (IDS) for Longitudinal Historical Microdata, version 4
Published 2014-05-01“…Discussions with users over the last four years resulted in important changes, like the inclusion of a new table defining the hierarchical relationships among ‘contexts’, decision schemes for recording relationships, additional fields in the metadata table, rules for handling stillbirths, a reciprocal model for relationships, guidance for linking IDS data with geospatial information, and the introduction of an extended IDS for computed variables.…”
Get full text
Article -
700
Discuss on the Exploration and Practice of Information Communication Network Fault in the Centralized Monitoring Mode
Published 2015-01-01“…The influencing factors of management span planning were discussed based on flatting centralized monitoring and hierarchical fault management. The functional mechanism, announcements, strategies and methods were discussed from the six fault management aspects(equipment alarm obtaining, alarm standardized management, alarm rules and analysis, fault work order pretreatment, channel optimization and contingency plan, process through and quality control). …”
Get full text
Article