Learn More
—Security protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design security protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, the current main analysis techniques using Colored Petri Nets (CP-Nets)(More)
This paper introduces the research of cognitive engine and application of artificial intelligence techniques in cognitive radio. The limitation of CR engine based on GA is analyzed, propose for improvement is proposed. The decision maker of CR engine should consider both the changeable factors and the unchangeable factors such as cost, bandwidth, signal(More)
May 12, 2008, an 8 earthquake happened in Sichuan province of China.The people of disaster areas suffered heavy losses. People of all nationalities in their generosity; dedicate onepsilas own love to the people of disaster areas through Internet. Unexpectedly, there is a part of the Red Cross official site have been Hackerpsilas unlawful invasion and(More)
In recent years, artificial intelligence machine becomes the hotspot in computing research. Rescue robot is an application in searching and rescuing of intelligent robot. A rescue robot should be provided with sensory ability, decision-making, environment information transmission and emergency rescue undertaking. The architecture of our first generation(More)
The Central Carbon Metabolic Flux Database (CeCaFDB, available at http://www.cecafdb.org) is a manually curated, multipurpose and open-access database for the documentation, visualization and comparative analysis of the quantitative flux results of central carbon metabolism among microbes and animal cells. It encompasses records for more than 500 flux(More)
With the fast development of cognitive radio, best decision problem in cognitive radio receives considerable attention. This paper introduces the research of cognitive radio. Genetic algorithm and itpsilas applications in decision maker are introduced. Based on biologic evolution principle, genetic algorithm can get the system best parameters by dominant(More)
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols function correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. BAN-like logic is one of the main techniques for analysis of authentication(More)
Search engines nowadays are becoming more and more necessary and popular in surfing the Internet. However, how these search engines like Google or Baidu works is unknown to many people. This paper, through a research into Open-source search engine Nutch, introduces how a common search engine works. By using Nutch, a search engine which belongs to Guizhou(More)
The AdaBoost.M1 is one of the machine learning algorithms. But it will fail if the weak learner cannot achieve at least 50% accuracy when run on these hard distributions. Random Forest is computationally effective and offer good prediction performance. A new approach AdaBoost.M1-RF algorithm, which using Random Forest as weak learner, is proposed in the(More)