As China39;s continuous improvement in the degree of information, the wireless communication network has covered all regions of the country, and information has also brought a great deal of information network secur...
详细信息
ISBN:
(纸本)9781424455379
As China's continuous improvement in the degree of information, the wireless communication network has covered all regions of the country, and information has also brought a great deal of information network security issues. In this paper, firstly, the information security emergency response procedures and disposal system are proposed according to the comprehensive analysis of weak links in information security defense system. Secondly, the OFDM MIMO and the support vector machine technologies are applied to deal with unexpected information security incidents. Experiment results show that these technologies are reasonable in practical application. Finally, an example for specific application is given to clarify the processes of information security emergency response. The risks and potential losses met by important social information systems can be reduced through the timely detection, tracking, analysis and recognition of a major hazardinformation security incident and proper response. it is very important to strengthen information security emergency response capabilities in the future.
Complexity metrics takes an important role to predict fault density and failure rate in the software deployment. information flow represents the flow of data in collective procedures in the processes of a concrete sys...
详细信息
ISBN:
(纸本)9781424455379
Complexity metrics takes an important role to predict fault density and failure rate in the software deployment. information flow represents the flow of data in collective procedures in the processes of a concrete system. The present static analysis of source code and the ability of metrics are incompetent to predict the actual amount of information flow complexity in the modules. In this paper, we propose metrics IF-C, F-(I+O), (C-L) and (P-C) focuses on the improved information flow complexity estimation method, which is used to evaluate the static measure of the source code and facilitates the limitation of the existing work. Using the IF-C method, the framework of information flow metrics can be significantly combined with external flow of the active procedure, which depends on various levels of procedure call in the code.
Chip Multicore Processor (CMP) has become the mainstream microprocessor architecture in nowadays industry and academic literature. With the progress of CMP hardware developing and researching, software issues become m...
详细信息
ISBN:
(纸本)9781424455379
Chip Multicore Processor (CMP) has become the mainstream microprocessor architecture in nowadays industry and academic literature. With the progress of CMP hardware developing and researching, software issues become more and more prominent. Coupled with these developments, many institutes and universities change their curriculums of computer architecture related courses. But the problem is do we really know what we should teach in this fast changing times and is the right time now to make these changing without actually knowing what future would be. In this paper, we argue four key problems that we thought we should think carefully before we make the final decision. And also some suggestions are given for the educators of this area.
For computer numerical control (CNC) machine tools, the double side air-cored permanent magnet linear servo motor (DAPMLSM) is suitable for high-speed and high-recision servo feed systems. But it also has thrust rippl...
详细信息
ISBN:
(纸本)9781424455379
For computer numerical control (CNC) machine tools, the double side air-cored permanent magnet linear servo motor (DAPMLSM) is suitable for high-speed and high-recision servo feed systems. But it also has thrust ripple caused by non-sinusoidal magnetic field distribution. Finite element analysis (FEA) was used to study motor characteristics, and the computer simulation results match well with the prototype data. It indicates FEA method is accurate. Based on that, the influences of DAPMLSM main structure dimensions were analyzed. The air-gap and magnet thickness mainly affect the amplitude, and the pole-arc coefficient affects both amplitude and its distribution. The distribution condition of the magnetic field in the air-gap could be improved effectively by optimal design of the pole-arc coefficient, furthermore the thrust fluctuations is reduced.
A standard security feature in any wireless network is user identity confidentiality. In Universal Mobile Telecommunication System (UMTS), there are circumstances where this important security feature is compromised d...
详细信息
ISBN:
(纸本)9781424455379
A standard security feature in any wireless network is user identity confidentiality. In Universal Mobile Telecommunication System (UMTS), there are circumstances where this important security feature is compromised due to transmission of the international Mobile Subscriber Identity (IMSI) in clear-text over the radio interface. Such situations defy anonymity of users. In addition, it is assumed that there is no threat from the agents in the wired network. In this paper, we introduce End-to-End User Identity Confidentiality (E2EUIC), an extension to 3GPP-AKA which not only takes care of identity confidentiality vulnerability over the wireless link, but goes one step ahead to ensure the same over the wired network as well.
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decod...
详细信息
ISBN:
(纸本)9781424455379
Communications usually do not have enough security. One of the ways for making the data secure is using methods for coding the information in a special manner. In this article one of the algorithms of coding and decoding information has been reviewed and explained. Coding is converting information to the form of coded text and decoding is the operation of converting coded information to the original form This algorithm can implement these two operations well with high confidence. Algorithm of coding data rapidly is called FEAL. All the parts of this algorithm such as the method of the operations of this algorithm, method of producing key, method of producing accidental data and etc. have been reviewed. After the description of the general structure, method of its simulation by using the hardware description language VHDL have been reviewed and the results of its synthesis by another algorithm named DES in the framework of one comparison is being reviewed.
We have already some technologies to perform these types of application such as: Bluetooth, IR. However these are used in a limited area which we can easily come over in the proposed system. This system has two sectio...
详细信息
ISBN:
(纸本)9781424455379
We have already some technologies to perform these types of application such as: Bluetooth, IR. However these are used in a limited area which we can easily come over in the proposed system. This system has two sections one is Remote Section (RS) where the client will place the request and another is Local Section (LS) where the telephone line is connected with an Input Interfacing Circuit (IIC). In the LS, this IIC is connected with a computer. IIC detects the frequency and converts frequency into machine language then it sends to computer through parallel ports. computer processes this signal and provides the respective keys. This system can be used in commercial or industrial purposes such as controlling computer from remote locations, home monitoring or inquiry system instead of man or any kind of switching. Therefore it can save money as well as man power with efficiently.
This paper addressed the dynamics and control for completely spatial 6-DOF parallel robots (SPR) in computer. The complex dynamic equations are derived via using Kane methods, and a typical PID controller is developed...
详细信息
ISBN:
(纸本)9781424455379
This paper addressed the dynamics and control for completely spatial 6-DOF parallel robots (SPR) in computer. The complex dynamic equations are derived via using Kane methods, and a typical PID controller is developed for spatial 6-DOF parallel robots. Making use of the software of Simulink, the computer model of SPR is built in terms of the dynamic equations of SPR, and the simulation is realized for SPR under PID controller in Simulink. The computer model of SPR is also established with SimMechanics to confirm the computer model in Simulink, according to the physical relationship of SPR. The simulation results demonstrate that the computer model of SPR in Simulink is correct, and the two methods of computer modeling are effective for SPR and other mechanical systems, especially the SimMechanics like ADAMS.
computer Generated Forces (CGF) is virtual entities of combat force, which can be generated and controlled by computers. Human Behavior Representation (HBR) in CGF is critical for combat simulation. Yet, despite the c...
详细信息
ISBN:
(纸本)9781424455379
computer Generated Forces (CGF) is virtual entities of combat force, which can be generated and controlled by computers. Human Behavior Representation (HBR) in CGF is critical for combat simulation. Yet, despite the considerable progress in related research, the challenge of dynamic task decomposition and allocation has remained largely unaddressed. This paper describes the task decomposition strategy and principles, presents related algorithms based on the task teams. Through taking the agent's experiences, abilities, and individual states into account, paper designs and implements the task allocation algorithm based on utility theory. The experimental results showed that our algorithms were effective, applicable and can reflect the task decomposition and task allocation process in domain of combat simulation.
information security risk analysis method is now a hot issue of information security management field. Fault tree analysis method has proposed since the 1960s, obtained the widespread application in many large-scale c...
详细信息
ISBN:
(纸本)9781424455379
information security risk analysis method is now a hot issue of information security management field. Fault tree analysis method has proposed since the 1960s, obtained the widespread application in many large-scale complicated system's security fail-safe analyses. It's recognized as an effective method for the complex system reliability, security analysis. The basic principle, qualitative analysis and quantitative analysis of fault tree analysis method are introduced. And this article introduced briefly the information security risk analysis method, and to has carried on the exhaustive elaboration based on fault tree's risk analysis's modeling way and the analysis principle. Finally, an example is introduced to come to the conclusion whether the project is feasible.
暂无评论