Learn More
—Security protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design security protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, the current main analysis techniques using Colored Petri Nets (CP-Nets)(More)
May 12, 2008, an 8 earthquake happened in Sichuan province of China.The people of disaster areas suffered heavy losses. People of all nationalities in their generosity; dedicate onepsilas own love to the people of disaster areas through Internet. Unexpectedly, there is a part of the Red Cross official site have been Hackerpsilas unlawful invasion and(More)
In recent years, artificial intelligence machine becomes the hotspot in computing research. Rescue robot is an application in searching and rescuing of intelligent robot. A rescue robot should be provided with sensory ability, decision-making, environment information transmission and emergency rescue undertaking. The architecture of our first generation(More)
This paper introduces the research of cognitive engine and application of artificial intelligence techniques in cognitive radio. The limitation of CR engine based on GA is analyzed, propose for improvement is proposed. The decision maker of CR engine should consider both the changeable factors and the unchangeable factors such as cost, bandwidth, signal(More)
With the fast development of cognitive radio, best decision problem in cognitive radio receives considerable attention. This paper introduces the research of cognitive radio. Genetic algorithm and itpsilas applications in decision maker are introduced. Based on biologic evolution principle, genetic algorithm can get the system best parameters by dominant(More)
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. BAN-like logic is one of the main techniques for analysis of authentication(More)
The Central Carbon Metabolic Flux Database (CeCaFDB, available at http://www.cecafdb.org) is a manually curated, multipurpose and open-access database for the documentation, visualization and comparative analysis of the quantitative flux results of central carbon metabolism among microbes and animal cells. It encompasses records for more than 500 flux(More)
With the development of wireless technologies, wireless networking market is thriving. IEEE 802.16J mobile multi-hop relay (MMR) network is likely to achieve great market success because it provides an attractive solution for the coverage extension and throughput enhancement of IEEE 802.16e network. However, security issues can restrain its development.(More)
The AdaBoost.M1 is one of the machine learning algorithms. But it will fail if the weak learner cannot achieve at least 50% accuracy when run on these hard distributions. Random Forest is computationally effective and offer good prediction performance. A new approach AdaBoost.M1-RF algorithm, which using Random Forest as weak learner, is proposed in the(More)