In order to solve the problem of over-dependence on word frequency in traditional TF-IDF algorithm, a multi-feature keyword extraction method combined with grammar analysis is proposed. By integrating the features of ...
详细信息
In order to solve the problem of vulnerable password guessing attacks caused by dictionary attacks, replay attacks in the authentication process, and man-in-The-middle attacks in the existing wireless local area netwo...
详细信息
ISBN:
(纸本)9781538657522
In order to solve the problem of vulnerable password guessing attacks caused by dictionary attacks, replay attacks in the authentication process, and man-in-The-middle attacks in the existing wireless local area network in terms of security authentication, we make some improvements to the 802.1X / EAP authentication protocol based on the study of the current IEEE802.11i security protocol with high security. After introducing the idea of Kerberos protocol authentication and applying the idea in the authentication process of 802.1X / EAP, a new protocol of Kerberos extensible authentication protocol (KEAP) is proposed. Firstly, the protocol introduces an asymmetric key encryption method, uses public key encryption during data transmission, and the receiver uses the corresponding private key for decryption. With unidirectional characteristics and high security, the encryption can avoid password guessing attacks caused by dictionary attacks as much as possible. Secondly, aiming at the problem that the request message sent from the client to the authentication server is vulnerable to replay attacks, the protocol uses a combination of the message sequence number and the random number, and the message serial number is added to the request message sent from the client to the authentication server. And establish a list database for storing message serial number and random number in the authentication server. After receiving a transfer message, the serial number and the random number are extracted and compared with the values in the list database to distinguish whether it is a retransmission message. Finally, the protocol introduces a keychain mechanism and uses an irreversible Hash function to encrypt the final authentication result, thereby effectively solving the man-in-The-middle attack by the pretender. The experiment uses the OPNET 14.5 simulation platform to model the KEAP protocol and simulate simulation attacks, and compares it with the current more common EAP-TLS au
In this paper, the vehicle scheduling and routing problem of airline ticketing companies which provide free services of picking customers up and delivering them to airports is studied. Taking the time window constrain...
详细信息
It is known to all that context-aware computing with uncertainty is an important part of pervasive computing for proactive service. Because multi-source evidence context-aware information with uncertainty is dynamic a...
详细信息
In this paper,the vehicle scheduling and routing problem of airline ticketing companies which provide free services of picking customers up and delivering them to airports is *** the time window constraints,customer s...
详细信息
ISBN:
(纸本)9781467397155
In this paper,the vehicle scheduling and routing problem of airline ticketing companies which provide free services of picking customers up and delivering them to airports is *** the time window constraints,customer satisfaction and time-dependent factors into consideration,this paper presents the mathematical model which take minimizing vehicle use cost and carbon emission as its *** to the characteristics of the problem,a hybrid algorithm,which combines heuristic and tabu search algorithms,is designed to solve the ***,a simulated numerical case is employed to verify the validity of the mathematical model and the hybrid *** simulating experiments about the numerical case show that by the model and the hybrid algorithm a vehicle scheduling and routing plan can be found with significant reduction in carbon emission and without clear increase of the total vehicle operational cost compared to the plan by the traditional *** shows that the vehicle scheduling and routing plan found by the approach proposed in this paper is more environmentally friendly and does not significantly increase total vehicle operational cost of the company.
The CBOW (Continuous Bag-of-Words) model is a three-layer forward neural network that predicts the central word vector by the fixed-size window information. In fact, context has a very important role in understanding ...
详细信息
Erasure codes are used in many distributed applications. This paper applies Cauchy Reed-Solomon codes to P2P streaming systems which is different from classical Reed-Solomon codes. Due to churn in these systems, strea...
详细信息
Aiming at the growing problem of network congestion, an improved random early detection algorithm is proposed for the internal network and applied on a TCP congestion control algorithm based on partition of network se...
详细信息
For the actual need of future research and application, this paper proposes a new method that is a new fuzzy control system of fuzzy integral-genetic algorithm (FIGA). By fuzzy integral, it can study comprehensive eva...
详细信息
This paper will use fuzzy integral to structure the diagnostic model of gestational diabetes mellitus. The Sugeno measure is obtained by training of BP neural network. The BP neural network is easy to get into local o...
详细信息
暂无评论