Future air traffic is demanding innovative procedures and systems that take advance of new technologies capabilities. Especially significant are new procedures and systems for automating arrival air traffic operations...
详细信息
In this paper the idea of active security situation sensing is introduced. The active security situation sensor which is different from the traditional sensor such as firewall or IDS, can capture attack intention and ...
详细信息
In this paper the idea of active security situation sensing is introduced. The active security situation sensor which is different from the traditional sensor such as firewall or IDS, can capture attack intention and predict attack trends before attack occurs to productive system. The design and implementation of our A3S are described, and the whole system of security situational awareness is also simply introduced.
作者:
Kurdi, MazenBooz, George W.Department of Chemistry and Life Sciences
College of Sciences and Computer Engineering Holy Spirit University of Kaslik Jounieh Lebanon Division of Molecular Cardiology
Cardiovascular Research Institute The Texas A and M University System Health Science Center College of Medicine Scott and White Hospital The Central Texas Veterans Health Care System Temple TX United States
Case-based reasoning (CBR) is the process of solving new problems based on the solutions of the similar past problems. Selecting important features to perform case retrieving can improve the efficiency of the large-sc...
详细信息
ISBN:
(纸本)9781424425389
Case-based reasoning (CBR) is the process of solving new problems based on the solutions of the similar past problems. Selecting important features to perform case retrieving can improve the efficiency of the large-scale CBR. In this paper, we select features based on attribute clustering. The representative attributes found in the clusters are thus used for indexing and representing cases such that retrieving similar cases based on representative attributes can reduce the execution time. In addition, the clustered attributes also make the CBR framework more flexible than other feature selection methods.
In conventional signature analysis, faulty units are identified by mismatch between the actual and reference signatures. The amount of reference signatures can be quite large for a complex system that requires high te...
详细信息
In conventional signature analysis, faulty units are identified by mismatch between the actual and reference signatures. The amount of reference signatures can be quite large for a complex system that requires high testing resolution. This complicates the diagnosis procedure. We show how under certain restrictions this amount can be reduced, preserving the diagnosis resolution and the aliasing rate. We construct a signature analyzer that is capable of locating faulty units. If the analyzer is implemented in the external automated test equipment, its throughput requirements can be diminished.
This paper describes the implementation of an intelligent application layer gateway for the traditional training simulator to connect with other simulators using the high level architecture (HLA). The HLA is the lates...
详细信息
This paper describes the implementation of an intelligent application layer gateway for the traditional training simulator to connect with other simulators using the high level architecture (HLA). The HLA is the latest open distributed interactive simulation standard developed by the defense modeling and simulation office of the US department of Defense. To reap the full benefits of simulation interoperability and reusability in the near-term, it is important to quickly transit the legacy training simulators to compliant with the HLA. However, the programming philosophy between traditional training simulator and HLA-compliant simulator is different. To shorten the system rebuild time and avoid altering the original functions of the simulator, the proposed application layer gateway handles all the runtime infrastructure services within the HLA and communicates with the simulator by using the shared memory. To verify the feasibility of the proposed intelligent gateway and its performance, a real-time flight platform was developed. The platform includes a real-time flight model, a software control panel and an image generation system. The experimental results showed that our approach is workable and practical.
Most hemiplegic patients use the unaffected arm and leg to propel wheelchair. The asymmetrical forces may cause the wheelchair to stray toward the affected side on level surface, and even cause danger on a slope. Alth...
详细信息
In home network environments, user comfort, and privacy are very important issues that need to be addressed. The reference monitor is the collection of access controls for devices, files, memory, and other kinds of ob...
详细信息
In home network environments, user comfort, and privacy are very important issues that need to be addressed. The reference monitor is the collection of access controls for devices, files, memory, and other kinds of objects and it is also able to provide advanced facilities for access control. In order to meet the user's requirements for comfortability and privacy, a reference monitor model is proposed for improving the home gateway in the OSGi service platform. The proposed model is based on the RBAC model, and the policy is classified into two types: user-role assignment policy and permission-role assignment policy. The policies are in XML format. With the use of the proposed reference monitor model, more effective guidelines can be provided for user access control in home networks.
In todaypsilas high density wireless networks, interference is considered one of the main factors limiting the capacity and increasing the new call blocking probability of a cellular system. In this paper we discuss a...
详细信息
ISBN:
(纸本)9781424434497
In todaypsilas high density wireless networks, interference is considered one of the main factors limiting the capacity and increasing the new call blocking probability of a cellular system. In this paper we discuss and analyze interference scenarios in cellular systems and we propose a novel scheme based on iterative distributed swapping scheme to reduce the interference they experience.
The recent Web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The Web technology provides the increment of the social networking ability. However it de...
详细信息
The recent Web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The Web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the new access control model which enhances the user privacy of the existing access control methods in web 2.0. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to Web contents.
暂无评论