Most WSNs are organized in hierarchical topology, in which broadcast communication is the most efficient way to send messages. Since broadcast communication using public channel, it is important to protect the broadca...
详细信息
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E– commerce web using. Firstly, being accordance with ...
详细信息
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E– commerce web using. Firstly, being accordance with usability testing theory and the analysis of the user experience elements on E-commerce web using process, a evaluation index architecture is structured with views including human-computer interactive’ , users’ and experts’ view. Then Analytic hierarchy process is used for weighting evaluated factors and the evaluation result is fuzzed. Finally an example is give to indicate that the evaluated model is effective to evaluate the quality of user experience on the E–commerce web using.
For better user personalization, this paper explores the collecting and processing method of network users’ behavior data with multi-source heterogeneity and analyzes network user behavior on the basis of context by ...
详细信息
For better user personalization, this paper explores the collecting and processing method of network users’ behavior data with multi-source heterogeneity and analyzes network user behavior on the basis of context by the theory called Situation Awareness. Then, a new efficient algorithm is presented by using internet context to ensure the model of user interest auxiliary. Further, a structure model of analysing network user behavior based on context-aware is designed. All above has provided an effective technical way for discovering the characteristic and changing law of the network user interest.
Diffie-Hellman key exchange algorithm, which is used in regular scenes base on the discrete logarithm problem, demands that typically two communication parties should struck up a lively conversation leading to a long-...
详细信息
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol ca...
详细信息
A quantum secure direct communication protocol with cluster states is *** with the deterministic secure quantum communication protocol with the cluster state proposed by Yuan and Song(***.,2009,7:689),this protocol can achieve higher intrinsic efficiency by using two-step *** implementation of this protocol is also discussed.
The next-generation of wireless systems represents a heterogeneous environment with different access networks technologies that differ in bandwidth, latency or cost. The most challenging problem is the seamless vertic...
详细信息
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is prop...
详细信息
ISBN:
(纸本)9781424479573
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is proposed in this paper. In this model, the circular queue structure is used in the dynamic shared memory buffer pool, which has improved the storage efficiency of real-time data flow;the circular queue data storage structure and an improved B+ tree index structure are used in the hard disk, which has solved the problem that how to store new data when the storage space is full, and improved the data retrieval efficiency in some degree. Test results show that this model has better data storage capacity and faster data retrieval speed.
Risk analysis is one of the most important stages in E-commerce (EC) project development. In this paper, a new method, based on Fuzzy Set Theory (FST) and Analytic Hierarchy Process (AHP), is proposed for the risk ana...
详细信息
Abstract -key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sens...
详细信息
Abstract -key management poses a main concern for security operation in wireless sensor networks. Most existing key management schemes try to establish shared keys for all pairs of neighbor sensors in homogeneous sensor networks. In recent, some research has demonstrated that heterogeneous sensor networks can achieve better performance in security than homogeneous networks. In this paper we propose a key-chain based key management scheme for heterogeneous sensor networks. The proposed scheme handles various events, such as pair-wise key establishment, cluster key distribution and renovation. Through the analysis of both security and performance, we show that the scheme reduces the node storage requirements, supports dynamic sensor networks, and also achieves better security than that of the existing sensor key management schemes.
Gaining increased attention, the problem of the computer viruses has attracted lots of security models to solve, most of which are not effective. There are two main reasons. 1) Some of them can not stop the viruses fr...
详细信息
Gaining increased attention, the problem of the computer viruses has attracted lots of security models to solve, most of which are not effective. There are two main reasons. 1) Some of them can not stop the viruses from running. 2) Antivirus database updates may cost a long period. This paper proposes a new immune model called self-immune model (SIM) with the main purpose of stopping the viruses from running. SIM checks the integrity of executable codes before the codes being executed by querying the security strategy database (SSD). If the integrity is broken, SIM will stop the execution. The most important thing is, the trust process tree (TPT) model can realize the dynamic SSD management. With these measures, SIM enhances the security and do no harm to the performance of OS.
暂无评论