Time filter

Source Type

Ma S.-X.,Henan Mechanic and Electrical Engineering College | Li S.-Y.,Henan Institute of Engineering
2nd International Workshop on Education Technology and Computer Science, ETCS 2010

Based on rough set theory and case-based reasoning technology, the paper designs a case-clustering algorithm, introduces the rough set theory and the presentation form of case and case base, analyzes the structure of the cluster, and emphasizes on the merging algorithm of cluster. According to the experimental results, the method enhances the related extent of the cases in clustering through using of user's feedback information, and effectively develops clustering to the cases of case base, so as to increase the efficiency of case retrieval. © 2010 IEEE. Source

Hao W.,Xinxiang vocational and technical college | Wei Y.,Xinxiang vocational and technical college | Wei Y.,Henan Mechanic and Electrical Engineering College
International Journal of Security and its Applications

The current encryption algorithm has some problems that key length is long, which is difficult to be memorized and kept so that a potential threat is caused to information security. The encryption key extracted from the biological feature is used for the encryption method, which has become a hotspot of the research. The Haar wavelet decomposition is carried out to the iris image, to extract the third-layer high frequency coefficient as the iris feature code. The random mapping function is used to generate a 128 - bit key. chi-square (χ2) test is used to analyze the key safety extracted. The results show that the key extracted from iris feature can meet requirements of the randomness and security of the encryption algorithm. © 2015 SERSC. Source

Duan C.,Henan Mechanic and Electrical Engineering College | Zhang C.,Henan Mechanic and Electrical Engineering College
Advanced Materials Research

Based on the study of coiler tension indirect control process, the purpose is to improve the control accuracy of the constant tension by the introduction of RBF neural networks and inverse system control theory. Depending on the physical characteristic of coiling tension control process, it could build the inverse system model for coiling tension control. By analyzing simulation results, this control strategy has great significance to the actual production. © (2012) Trans Tech Publications. Source

Qing-Yun R.U.,Henan Mechanic and Electrical Engineering College | Jing-Yi D.U.,Henan Mechanic and Electrical Engineering College
International Journal of Emerging Technologies in Learning

Intelligent generating test paper can be thought of as a typical fuzzy mathematical logic problem. First, the paper analyzes the quantitative evaluation criteria of the traditional test paper generation questions and shows the existing problems in practical application of it. Then the paper introduces two different fuzzy constraints principal disjunctive normal form concept and proposes an evaluation system combining quantitative with qualitative. Viewing at the particularity of constraint satisfaction problems of intelligent generating test paper, the paper uses heuristic knowledge and applies constraint satisfaction method combining generation test with membership correction constraint satisfaction methods to realize intelligent generating test paper. The experiment shows that this method obtains good results. Source

Shao M.-Z.,Henan Mechanic and Electrical Engineering College | Sun B.,Henan Mechanic and Electrical Engineering College | Xie R.-Y.,Henan Mechanic and Electrical Engineering College
Advances in Intelligent Systems and Computing

DNS Service is the basic support of Internet, which security plays a vital role in the entire Internet. With the constant deepening of network application, DNS has been the hot spot goal of DDoS attack. In view of the characteristics of DNS service construction, this paper analyzes the security problem which DNS faces, especially the principle of DNS spoofing attack and DNS cache poisoning attack, and puts forward some corresponding methods and defense programs. In conclusion, to different kinds of users, they can use practical and effective defense measures according to their conditions and demand levels of information security. © 2013 Springer-Verlag. Source

Discover hidden collaborations