Coal and gas outburst is an extremely complex and serious gas dynamic phenomenon. Therefore, building an early warning system based on computer system, safety monitoring systems of coal mines and local area network is...
详细信息
Coal and gas outburst is an extremely complex and serious gas dynamic phenomenon. Therefore, building an early warning system based on computer system, safety monitoring systems of coal mines and local area network is a precondition for effectively preventing coal and gas outburst. Combining the hardware conditions, organization management structures and characteristics of preventing outburst technology systems, this paper discusses the principle, logic structure and implementation process of gas outburst warning, devises the software and hardware structure of the warning system and therefore offers theoretical thought and methods for the forecasting of coal and gas outburst.
In this paper we propose a general framework to compute limiting tolerable hazard rate(LTHR) in complex railway *** driver machine interface(DMI) is a safety critical component of European Train Control System(ETCS). ...
详细信息
In this paper we propose a general framework to compute limiting tolerable hazard rate(LTHR) in complex railway *** driver machine interface(DMI) is a safety critical component of European Train Control System(ETCS). Functional failure of the DMI can affect the role of the ETCS and can lead to adverse ***,it is important to carry out a careful functional safety analysis of the *** quantification of the LTHR of a DMI is a complex task due to a number of dependencies and uncertainties among event scenarios leading to adverse *** to consider dependencies and uncertainties will lead to over or under estimation of the functional safety of a *** motivates the investigation of using Bayesian Networks(BNs) for functional safety analysis of *** are acyclic probabilistic graphical model and offer concise representation of dependencies and uncertainties among random *** BNs will be used to quantify risk reduction parameters,which will be utilized to quantify LTHR using a mathematical model.
Based on the analysis of current web service applications and protocol,a group of quality of service(QoS) parameters of web traffic is proposed from users 39; *** parameters focus on delay of web service.A active mo...
详细信息
Based on the analysis of current web service applications and protocol,a group of quality of service(QoS) parameters of web traffic is proposed from users ' *** parameters focus on delay of web service.A active monitor system is designed and used to monitor web performance on real network of the biggest ISPs in *** delay parameters are actively measured in this specialized measurement *** on measured data,different aspects of user perceived web performance are analyzed in different access methods,target websites and time *** practical valuable conclusions are concluded.
existing web map systems have integrated multi-scale geographical information and supplied friendly visualization interfaces. Furthermore, volunteered geographical information, which is captured and released on web ma...
详细信息
existing web map systems have integrated multi-scale geographical information and supplied friendly visualization interfaces. Furthermore, volunteered geographical information, which is captured and released on web map framework, is an essential source for emergency surveying and mapping supports. However, the emergency mapping service on web map has more uncertainty. This paper proposes an Optimal Ternary Model for Efficiency (OTME) for measuring the consumption time of emergency web mapping. Three key factors are discussed and regression analysis is applied to specify the quantitative relationship between each factor and mapping efficiency. Map World (Tianditu) is tested as a sample to evaluate the efficiency of web emergency mapping.
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a scheme that can be used to distinguish human and robot such as malicious program. It has become the most widely used standard...
详细信息
A CAPTCHA (Completely Automated Public Turing test to tell Computers and Humans Apart) is a scheme that can be used to distinguish human and robot such as malicious program. It has become the most widely used standard security technology to prevent automated computer program attacks, DoS attacks and Botnet. Thus, both Google and Microsoft use the text-based CAPTCHA for authenticated process. However, all text-based CAPTCHA has been broken due to the fact that it can't prevent Optical Character Recognition (OCR) attack which can automatically identify the CAPTCHA's words. Consequently, new kinds of CAPTCHAs have been proposed to solve this security hole. For example, image-based and audio-based CAPTCHA are new emerging schemes used to replace text-based CAPTCHA. However, a state-of-the-art attack called Human Attack could still defeat these CAPTCHA schemes. Human Attack means malicious industries hire the third party's humans to collude with the attackers in order to pass the CAPTCHA tests. In this paper, we propose a novel CAPTCHA scheme (GeoCAPTCHA) which utilizes the personalized contents such as geographic information to prevent the 3rd Party Human Attack. Then, we conduct a security analysis of the usability and security of GeoCAPTCHA. Our simulation demonstrate that GeoCAPTCHA can enhance the performance and security of the Google and Microsoft's CATPCHA system with rotated 3D street-view image.
The development of ICT and web technology provides e-learning many useful and effective tools such as wikis,blogs,asynchronous/synchronous *** has shown that specific learning context and objectives require particular...
详细信息
The development of ICT and web technology provides e-learning many useful and effective tools such as wikis,blogs,asynchronous/synchronous *** has shown that specific learning context and objectives require particular e-learning *** paper describes a configurable and extensible portal framework that can be tailored to specific e-learning *** are three key features of the portal framework:(1)learning community configuration,role settings and system extension;(2)knowledge sharing and management;(3)learning space integrating various e-learning *** portal framework can be used for configuring specific e-learning environment and can integrate state of the art e-learning tools.
This paper proposes an efficient intra-field deinterlacing algorithm using rational filtering interpolation *** results show that the proposed algorithm provides satisfied performances in terms of both objective and s...
详细信息
This paper proposes an efficient intra-field deinterlacing algorithm using rational filtering interpolation *** results show that the proposed algorithm provides satisfied performances in terms of both objective and subjective image *** is more,it just exploits the local spatial gradient information among the neighboring pixels without complex preset-conditions which has lower complexity than most of the existing algorithms.
Based on the experimental phonetics means, this paper has collected male/female each 20 passages of Tibetan Lhasa dialect news as subject,labeled them by Praat software and extracted labeling data saved *** *** the pr...
详细信息
Based on the experimental phonetics means, this paper has collected male/female each 20 passages of Tibetan Lhasa dialect news as subject,labeled them by Praat software and extracted labeling data saved *** *** the prosody boundary perception,it has labeled for various levels of prosody units and the prosody units include sentence,prosody-phrase, prosody-word and *** data extraction,it has done study on interrelationship,different levels’prosody units’duration,silence segmentations,etc between male and female news reading aspects.
Nowadays,most reasonable software protection techniques are proposed only to resist staticonly ***,with the development of Hybrid Static-Dynamic Disassembly(HSDD),the techniques used to prevent static-only attacks c...
详细信息
Nowadays,most reasonable software protection techniques are proposed only to resist staticonly ***,with the development of Hybrid Static-Dynamic Disassembly(HSDD),the techniques used to prevent static-only attacks can be easily detected and eliminated,and the difficulty of crack is greatly *** this paper,in order to resist HSDD,the Instruction Transform Algorithm(ITA) and the Recover Instructions in Hardware Interrupt(RIHI) are proposed to distort the original binary code and to recover the encrypted binary code *** these two new schemes,the security of software can be extremely enhanced,making HSDD more difficult to *** addition,a new form of Vigenère cipher is introduced to make the encryption and decryption of Advanced RISC Machines(ARM) instructions more efficient and effective.
The region inertial product energy concept combined with canny edge detection is presented *** takes the place of the gradient amplitude by calculating the inertial product energy of n*n neighborhood region of central...
详细信息
The region inertial product energy concept combined with canny edge detection is presented *** takes the place of the gradient amplitude by calculating the inertial product energy of n*n neighborhood region of central *** on inertial product energy and gradient direction,the non-maxima suppression can weaken the noise and tiny information of image effectively and better strike a balance between performance of noise suppression and accuracy of edge positioning in canny edge detection *** experiment on spatial images shows that this method is given with satisfactory results.
暂无评论