In this paper,we introduce a new algorithm O -WFC based on fuzzy cluster into the indoor location of ***,a location fingerprint database is set up and we calculate an optimal value of O which is a threshold for classi...
详细信息
In this paper,we introduce a new algorithm O -WFC based on fuzzy cluster into the indoor location of ***,a location fingerprint database is set up and we calculate an optimal value of O which is a threshold for classifying the RSS vectors in the off-line training *** in the locating phase,after fuzzy clustering has been done,we estimate the degree of similarity between two vectors by Jffreys&Matusita formula,and assign different weights to the coordinates of reference nodes to calculate the location of the unknown *** it is proved in our simulation experiments that this algorithm could be effective to avoid the dilemma caused by the multipath and abnormal signal attenuation as well as that it has the advantages of low complexity,fast execution,high accuracy and practical applicability for the large-scale of indoor location of WSN.
To acquire the certification according to ISO/IEC 15408 for a target system,it is necessary to create a security target (ST) which specifies security facilities of the *** STs is not an easy task for developers beca...
详细信息
To acquire the certification according to ISO/IEC 15408 for a target system,it is necessary to create a security target (ST) which specifies security facilities of the *** STs is not an easy task for developers because they do not know how to create STs well,even if they know the security ***,STs should be maintained continuously to keep a target system *** STs is not easy as same as creating ***,there is no tool to support developers and maintainers to create and maintain STs so *** paper presents a supporting tool according to ISO/IEC 15408,named ***-Editor tells users what should be described and how they should be described in STs and provides a helpful and secure editing and maintaining environment of STs.
Testing engineers in the third-party software testing center are often puzzled with some non-technical problems,such as,how to deal with the developers39; reactance,and how to meet the end users39; satisfaction,du...
详细信息
Testing engineers in the third-party software testing center are often puzzled with some non-technical problems,such as,how to deal with the developers' reactance,and how to meet the end users' satisfaction,during the software testing ***,little attention has been paid to solve such kind of *** this paper,we argue that the high quality and high productivity pursued by software testing require us not only to emphasize the hard skills of testing engineers but also to enhance their soft skills in an appropriate and systematic way,which should deserve more *** furthermore argue that attention should be paid to obtain qualitative insight and feedback from testing engineers and to explore in what way to acquire the useful *** conduct a qualitative study to explore and understand testing engineers' soft skills from five different test teams based on multidimensional perspective levels under the analysis of grounded *** on-going research work's agenda is given,several research challenges are analyzed and at last future work is proposed.
Based on the stock supply and demand factors,this paper takes the Shanghai a-share as an example,analyzing the supply and demand factors which affect the composite index of Shanghai Stock Exchange with VAR *** results...
详细信息
Based on the stock supply and demand factors,this paper takes the Shanghai a-share as an example,analyzing the supply and demand factors which affect the composite index of Shanghai Stock Exchange with VAR *** results show that,there is a long-term positive effect of the money supply changes on the Shanghai a-share composite index,while the disturbance of the total market value has a long-term of negative ***,to maintain stability in the stock market,on the one hand,the IPO audit standard should be strict,blind issued or expansion of high p/e ratio and high city net rate stocks should be avoided;On the other hand,appropriate monetary supply should be provided to promote increasing of mobility,and it provides a policy direction to the reform of stock market for China in current.
Malware is a tremendous threat on the *** malware analysis systems focus on listing the malware behaviors,but make no mention of malware network behaviors which results in malware39;s self-duplication and self-propa...
详细信息
Malware is a tremendous threat on the *** malware analysis systems focus on listing the malware behaviors,but make no mention of malware network behaviors which results in malware's self-duplication and self-propagation on the *** this paper,we present a new method to extract malware network *** method is based on dynamic binary analysis and dynamic taint *** the dynamic binary analysis,we can extract the malware network behavior and the self-duplication *** also present a method to catch malware self-propagation behavior by using dynamic taint ***,we evaluate our method and the results show that our method is successful in extracting malware network behavior and identifying the malware self-duplication behavior.
In view of the imperfection of the Android operating system multimedia function and the complexity of streaming media *** the same time,the development cycle is long,and efficiency is *** order to solve those problems...
详细信息
In view of the imperfection of the Android operating system multimedia function and the complexity of streaming media *** the same time,the development cycle is long,and efficiency is *** order to solve those problems,the thesis designed the streaming engine layer between Linux kernel layer and application framework layer of Android platform,and constructed fast and convenient streaming media application development *** of all,Android operating system (OS) was analyzed,and then the media engine was added into the Android OS *** on the characteristic of the streaming media system,the steaming media engine is divided into five layers,including the user interface,data capture,and data output,codec,and network transmission *** last,the architecture was applied in the wisdom medical terminal *** an instance of video data transmission client,the feasibility of the architecture is confirmed.
21st century is the century of the ocean,therefore,competing in the ocean and developing the ocean resources in depth is an irresistible *** peninsula blue economic zone needs the evaluation method which can reflect t...
详细信息
21st century is the century of the ocean,therefore,competing in the ocean and developing the ocean resources in depth is an irresistible *** peninsula blue economic zone needs the evaluation method which can reflect the talent's ecological environment competitiveness,so as to provide the basis for the government's scientific *** on the literature review and depth interview,the paper established evaluation index system of talent's ecological environmental competitiveness in Shandong peninsula blue economic *** weight of each index is assigned by the method of analytic hierarchy *** the end,fuzzy comprehensive evaluation model on the talent's ecological environmental competitiveness of Shandong peninsula blue economic zone is established.
Personalized recommendation and user preference to books have aroused lots of attention both domestically and abroad and fruitful achievements have been made in this ***,the previous preference models mainly focus on ...
详细信息
Personalized recommendation and user preference to books have aroused lots of attention both domestically and abroad and fruitful achievements have been made in this ***,the previous preference models mainly focus on the content of books and ignore the attribute of price of a *** an actual book recommendation system,the price influences the consumers' buying behavior to a large extent and should be considered *** on the existing preference models,in addition to the attributes of the publisher,publishing date,discount,and the other consumers' reviews,this study takes the attribute of price into consideration to a particular *** dummy variable regression method is employed to analyze the data mainly from *** data analysis and investigation,this paper tries to explore the importance of its different attributes in the user preference to a *** accordance with the data analysis,some suggestions are provided for book recommendation system design and relevant website modification.
According to the China39;s aviation fuel market,the article constructs a supply chain model including three upstream firms and three downstream firms to solve China39;s aviation fuel ***,we analyze the merger game...
详细信息
According to the China's aviation fuel market,the article constructs a supply chain model including three upstream firms and three downstream firms to solve China's aviation fuel ***,we analyze the merger game among the upstream and downstream manufacturers in the condition of scarce *** show that the vertical relation of aviation fuel supply chain will be adjusted and the airlines will merge with the manufacturers to guarantee its ***,the strength of policy barriers decides the degree of *** degree of integration will be lower when the policy barriers getting stronger.
This paper describes the technical details of design and implementation of an embedded secure CGI daemon,which not only is a CGI program residing permanently in memory but also integrates a CGI based secure HTTP serve...
详细信息
This paper describes the technical details of design and implementation of an embedded secure CGI daemon,which not only is a CGI program residing permanently in memory but also integrates a CGI based secure HTTP server which is dedicated to support CGI *** content of the pager consists mainly of two parts,of which the first is designing of CGI based secure HTTP server,including SSL and HTTP programming,and generating and downloading of self-signed certificate,while the second is designing of CGI daemon including CGI programming and the mainly used techniques,such as secure login,CAPTCHA,password getting back,etc.A practical embedded application system is provided as demo example to show the usage and effects of the secure CGI daemon.
暂无评论