The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
N-1 security criteria is a key principle for distribution operation. However, it is hardly taken into account in modern distribution feeder reconfiguration models, which cannot satisfy security margin demands. To address this fundamental problem, this paper develops a new stochastic reconfiguration method for distribution network considering N-1 security and net loss. Firstly, three indexes-average...
Cyber‐physical system has been widely used in various areas as the integration of computing and physical system. As a typical application of cyber‐physical system, cyber‐physical surveillance system for transportation (CPSST) allows real‐time video monitoring to facilitate the deploying of smart transportation systems. For video streaming in CPSST, dynamic radio spectrum management is a key technology...
Recently extensive works have been devoted to the performance analysis of physical layer security in wireless communication systems. However, the combination of physical layer security and quality of service (QoS) for route selection in multi-hop wireless ad hoc networks (WANETs) still remains an open technical challenge. As an initial step towards this end, this paper focuses on a multi-hop WANET...
Radio-Frequency Identification (RFID) technology has fostered many object monitoring applications. Along with this trend, a corresponding important problem is to verify the intactness of a set of objects using that of their attached tags. Existing solutions necessitate the knowledge of tag identifiers (IDs), sharing the intuition that verifying whether any tag is absent comes after knowing which tags...
Accompany with the growth of the speed in network, people's living standard has greatly improved, but the threaten to its information's security has also appeared, as a important branch of information security, steganography is a useful method to protect the secret information safety. In view of the high complexity of current video steganographic algorithms, and combining with the trailing coefficient...
Radio-Frequency Identification (RFID) technology has fostered many object monitoring systems. Along with this trend, tagged objects' value and privacy become a primary concern. A corresponding important problem is to verify the intactness of a set of tagged objects without leaking tag identifiers (IDs). However, existing solutions necessitate the knowledge of tag IDs. Without tag IDs as a priori,...
With the rapid development of world's information service industry, e-commerce has become the central focus for many international companies and transnational enterprises across the world. China's e-commerce has already turned into one of major forms of expanding business activities in today's rapid development. Using e-commerce enterprises can not only reduce transaction cost and raise transactional...
Classified protection compliance detection is one of the important methods in information system safety control. In order to solve the uncertainty in compliance detection process, this paper proposes a method of the analysis of classified protection detection based on Dempster-Shafer theory of evidence for rank 4 information system. Firstly, the method establishes a scientific and reasonable index...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.