In view of technology backward of the friend or foe identification and having not a subtle and effective internal communication mechanism in the current security system on duty, which leads to a serious security threa...
详细信息
ISBN:
(纸本)9781509039456;9781509039449
In view of technology backward of the friend or foe identification and having not a subtle and effective internal communication mechanism in the current security system on duty, which leads to a serious security threat on personnel life and the major task to be defeated. This paper presents an IFF identity authentication scheme of security and guarantee system based on elliptic curve encryption;it is effective to solve these problems, such as internal confidential files to be stolen,vital data to be destroyed and legal camouflage of identity by hacking into the police service systems. The scheme is suitable for the identification of the light weight mobile terminal in infinite network environment, which has the characteristics of high security, high efficiency and bandwidth saving.
The article describes the relationshop between charging and resource management in ATM networks and discusses their *** management schemes suitable for usage-sensitive and time-sensitive charging are proposed. In the ...
详细信息
ISBN:
(纸本)7800908275
The article describes the relationshop between charging and resource management in ATM networks and discusses their *** management schemes suitable for usage-sensitive and time-sensitive charging are proposed. In the paper after poses problem,introduces the usage-sensitive charging and time-sensitive charging;then it describes dynamic CAC for usage-sensitive charging and CAC for time-sensitive *** it is future directions.
Classification and clustering are frequently-used methods in data excavation technology. This paper introduces the idea of text clustering into the categorization algorithm study. The authors also attempt to use the t...
详细信息
The Chinese information manipulation system is the base of the navigating *** the noise words from the significant words,and picking up the semantics from the text are unsolved difficult *** bring forward the informat...
详细信息
ISBN:
(纸本)0780378407
The Chinese information manipulation system is the base of the navigating *** the noise words from the significant words,and picking up the semantics from the text are unsolved difficult *** bring forward the information manipulation method combining the key indexing method with the whole-length indexing method,by comparing main indexing methods in common use in the information indexing system and taking the Chinese features of the internal information navigating *** implementation is also *** new method preferably provides the full and nicety retrieval and solutes the increasing problems of the indexing *** the end,the indexing method to the data which is manipulated by the Chinese information manipulation system is also provided.
Bonus Point System is an important application for enterprises to enhance client's loyalty. Mobile Code Bonus Point System is a simple, efficient and widely used application system. This paper sets out to put forw...
详细信息
The information classifying and indexing service are the most important services the information navigating system usually *** kind of automatic information classifying subsystem used in the internal information navig...
详细信息
ISBN:
(纸本)0780378407
The information classifying and indexing service are the most important services the information navigating system usually *** kind of automatic information classifying subsystem used in the internal information navigation system and its implementation is *** structure and implementation of its classifying subject dictionary is also *** the end,the indexing method to the data which is manipulated by the automatic information classifying system is also provided.
Protect data privacy is one of hot topic of database applications in recent years. This paper is concentrated on the issue of protecting the privacy attribute values when data publication and proposes a method based o...
详细信息
Reverse Mobile Commerce Platform is an innovative e-commerce mode that reverses the traditional business process of e-commerce. Commodities traded on such platform are invisible information such as certain public idea...
详细信息
With the constant development of information technology, information into education teaching quality evaluation has injected new *** evaluation for teaching quality of university is to add the power and energy of teac...
详细信息
Data similarity measurement is an important direction for data mining research. This paper is concentrated on the issue of protecting the underlying attribute values when sharing data for the similarity of objects mea...
详细信息
暂无评论