As security is becoming a significant obstacle to wider deployment of wireless LANs, IEEE 802.1x and EAPoW has been put forward to enhance authentication in WLAN. At present, some existing client solution such as Xsup...
详细信息
Based on the theory of photonic crystal and its characteristic, which was known as photonic band gap (PBG), the finite-difference time-domain (FDTD) method, including absorbing boundary condition and periodic boundary...
详细信息
Based on the theory of photonic crystal and its characteristic, which was known as photonic band gap (PBG), the finite-difference time-domain (FDTD) method, including absorbing boundary condition and periodic boundary condition, was used to simulate transmission characteristic of two-dimensional photonic crystal, which has periodic Al2O3 cylinder array structure. Incident wave was presumed as s-polarized wave. In two incident angles which were 0° and 30°, electric field, phase and transmissivity in the range of 1-30 μm were calculated. Numerical simulation results showed that PBG of photonic crystal existed in the range 12-18 μm (infrared waveband), and it may be used to develop infrared wave-guide.
According to support vector machines (SVMs), for those geometric approach based classification methods, examples close to the class boundary usually are more informative than others. Taking face detection as an exampl...
详细信息
According to support vector machines (SVMs), for those geometric approach based classification methods, examples close to the class boundary usually are more informative than others. Taking face detection as an example, this paper addresses the problem of enhancing given training set and presents a nonlinear method to tackle the problem effectively. Based on SVM and improved reduced set algorithm (IRS), the method generates new examples lying close to the face/non-face class boundary to enlarge the original dataset and hence improve its sample distribution. The new IRS algorithm has greatly improved the approximation performance of the original reduced set (RS) method by embedding a new distance metric called image Euclidean distance (IMED) into the kernel function. To verify the generalization capability of the proposed method, the enhanced dataset is used to train an AdaBoost-based face detector and test it on the MIT+CMU frontal face test set. The experimental results show that the original collected database can be enhanced effectively by the proposed method to learn a face detector with improved generalization performance.
A quality of service (QoS) or constraint-based routing selection needs to find a path subject to multiple constraints through a network. The problem of finding such a path is known as the multi-constrained path (MC...
详细信息
A quality of service (QoS) or constraint-based routing selection needs to find a path subject to multiple constraints through a network. The problem of finding such a path is known as the multi-constrained path (MCP) problem, and has been proven to be NP-complete that cannot be exactly solved in a polynomial time. The NPC problem is converted into a multiobjective optimization problem with constraints to be solved with a genetic algorithm. Based on the Pareto optimum, a constrained routing computation method is proposed to generate a set of nondominated optimal routes with the genetic algorithm mechanism. The convergence and time complexity of the novel algorithm is analyzed. Experimental results show that multiobjective evolution is highly responsive and competent for the Pareto optimum-based route selection. When this method is applied to a MPLS and metropolitan-area network, it will be capable of optimizing the transmission performance.
Ant colony optimization (ACO for short) has been proved a successful meta-heuristic by a huge of empirical studies. This paper discusses the termination criteria of ACO and therefore provides research ideas to other m...
详细信息
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonym...
详细信息
ISBN:
(纸本)9783540725893
In lager-scale P2P file sharing systems, peers often must interact with unknown or unfamiliar peers without the benefit of trusted third parties or authorities to mediate the interactions. The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult. In this paper, we identify access control requirements and propose a trust based access control framework for P2P file-sharing systems. The model integrates aspects of trust and recommendation, fairness based participation schemes and access control schemes.
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its cha...
详细信息
ISBN:
(纸本)9781595937575
Currently, there are many researches focusing on grid scheduling and more and more scheduling algorithms were proposed. However, those algorithms are not satisfied with the requirement of the grid for ignoring its characteristics of dynamics, autonomy, distributing, etc. Therefore, this paper proposes an adaptable dynamic job scheduling approach based on historical information (ADJSA). This approach adjusts the predicting model automatically by using the recent jobs execution historical information and then selects the appropriate resource to execute the job considering dynamic and real-time factors of the Grid.
An Immune Genetic Algorithm (IGA) is used to solve weapon-target assignment problem (WTA). The used immune system serves as a local search mechanism for genetic algorithm. Besides, in our implementation, a new crossov...
详细信息
As security is becoming a significant obstacle to wider deployment of wireless LANs, IEEE 802.1x and EAPoW has been put forward to enhance authentication in WLAN. At present, some existing client solution such as Xsup...
详细信息
ISBN:
(纸本)9781424431397;9780769527963
As security is becoming a significant obstacle to wider deployment of wireless LANs, IEEE 802.1x and EAPoW has been put forward to enhance authentication in WLAN. At present, some existing client solution such as Xsupplicant or WIRE1x has only applies to one platform, Linux or Windows, and is ill-considered of EAPoW. This paper discusses an integrated multi- platform EAPOW-based WLAN AAA Solution - IMEWAS, its architecture and module design and implementation. The integrated flexible and secure solution has been proved feasible.
This paper addresses an effective issue of content-based image retrieval (CBIR) by presenting Fuzzy Hamming Distance (FHD). Firstly, the theory of FHD is introduced, which includes degree of difference and cardinality...
详细信息
暂无评论