Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 4

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
The bearing response of pile foundations for cross-sea bridge subjected to lateral loading is investigated through threedimensional finite element numerical analyses. In the analyses, non-linear behavior of concrete is simulated using smeared cracking model, and the strain-stress relationship of rebar is modeled through perfectly elasto-plastic model obeying Mises yield criterion. The finite element model is validated against published lateral static loading test in situ. The effect of reinforcement ratio of reinforced concrete and vertical load level is explored on the displacement of pile head and lateral capacity of pile. The results show that for the pile with low reinforcement ratio, the allowable lateral capacity is controlled by concrete cracking, however the allowable lateral capacity is controlled by the displacement of pile head with high reinforcement ratio. The vertical load applied on the pile head may reduce its displacement but increase simultaneously the maximum moment in the pile body. Therefore, the optimum vertical load level is 0.4~0.6 times of the vertical ultimate load of a single pile.
EN
Personal identification is particularly important in information security. There are numerous advantages of using electroencephalogram (EEG) signals for personal identification, such as uniqueness and anti-deceptiveness. Currently, many researchers focus on single-dataset personal identification, instead of the cross-dataset. In this paper, we propose a method for cross-dataset personal identification based on a brain network of EEG signals. First, brain functional networks are constructed from the phase synchronization values between EEG channels. Then, some attributes of the brain networks including the degree of a node, the clustering coefficient and global efficiency are computed to form a new feature vector. Lastly, we utilize linear discriminant analysis (LDA) to classify the extracted features for personal identification. The performance of the method is quantitatively evaluated on four datasets involving different cognitive tasks: (i) a four-class motor imagery task dataset in BCI Competition IV (2008), (ii) a two-class motor imagery dataset in the BNCI Horizon 2020 project, (iii) a neuromarketing dataset recorded by our laboratory, (iv) a fatigue driving dataset recorded by our laboratory. Empirical results of this paper show that the average identification accuracy of each data set was higher than 0.95 and the best one achieved was 0.99, indicating a promising application in personal identification.
3
Content available remote Key Escrow Scheme with the Cooperation Mechanism of Multiple Escrow Agents
EN
To combat crime and terrorist organizations, government expects to monitor the suspicious communication but the leak of personal privacy is a common problem. Assuming that there are two Escrow Agent groups (Escrow party), one is designated by the government, while the other is unofficial. The two groups can achieve mutual supervision and dependence, thus implementing monitoring for users by the cooperation rather than by only a single one. If the number of the mutual participation is less than the required threshold number, the monitoring cannot be achieved. Therefore, an equation set corresponding to the specific program can be constructed, for example, multiply ith equation and jth equation to get an (i+j)th equation. As long as this kind of equation set is established, various key escrow schemes involved by several Escrow Agent groups can be constructed. Nowadays, the increasing political, economic, and cultural exchanges all over the world will lead to more and more transnational crime and terrorist attacks, so this program can be adapted to the multinational (or multi-organization) key escrow cooperation.
PL
Analizuje się możliwości monitorowania transakcji w przypadku wielu escrow agents – depozytariuszy. Metoda ma na celu ochronę rynku przed atakami terrorystycznymi.
EN
Based on the existing two-phase commit protocol (2PC), this paper proposes a protocol adapted to the distributed real-time transaction commit, which can avoid the blocking problem when dealing with transactions by coordinator redundancy; additionally, by the "health loan" of the locked data, the concurrency of transaction implementation is expanded to save the waiting time. Experimental analysis shows that: when the average arrival interval time of transaction is small, the success rate of the improved commit protocol is significantly higher than that of 2PC.
PL
artykule zaproponowano protokół bazujący na dwufazowym protokole typu 2PC. Nowy protokół pozwala na oszczędność czasu oczekiwania – jeśli średni czas odstępu między transakcjami jest mały przepływność danych jest wyższa niż w klasycznym protokole 2PC.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.