The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Taking security management of Software-Defined Networking (SDN) into consideration, the identification of attacks due to the SDN-specific vulnerabilities is of great significance. Thus in this case, formalization of security attacks becomes essential in promoting the identification process of attacks. This paper then proposes an integrated approach of attack trees and extension innovation methods...
A new type of tri-axial piezoelectric accelerometer is proposed in this study. It consists of a seismic mass and four cantilever beams that is distributed in a shape of X. Analytical model and FEM analysis were conducted to study its charge sensitivity and the fundamental/first order resonance frequency in the Z-axis, X-axis and Y-axis direction. The errors between the calculated results from analytical...
Researching for the multi-ribbed compound wall. Testing the thermal conductivity of materials. For thisMulti-Ribbed Wall, giving the Computational Method of the heat transfer coefficient. And getting the insulation thicknes which meet the requirements of the housing in cold rural areas.
Linearized small-signal transistor models share the common circuit structure but may take different parameter values in the ac analysis of an analog circuit simulator. This property can be utilized for symbolic circuit analysis. This paper proposes to use a symbolic stamp for all device models in the same circuit for hierarchical symbolic analysis. Two levels of binary decision diagrams (BDDs) are...
As network components are often highly interdependent and interconnected,an adversary outside can take advantage of multiple vulnerabilities in unexpected ways, incrementally penetrate a network and compromise critical systems. Attack graph is commonly used for analyzing network security level for its capability in reflecting all network vulnerabilities and their inter relationships. However, attack...
Since the stopped buses at bus station, there occurs the potential effect of capacity of adjacent lane. With the combination of the related results of traffic flow theory and queuing theory, the qualitative and quantitative analysis were worked out separately. Based on the effect time of bus stop on capacity of adjacent lane, the effect time model of bus station was established and then two capacity...
In order to implement unified evaluation of data modeling languages in network management domain, this paper proposes a multi-criteria method for relative measurement. Proposed method utilizes the Analytical Hierarchy Process approach by means of paired comparisons. Evaluation result of typical management data modeling languages by the proposed method shows that, none of the languages is yet remarkably...
The traditional intrusion detection systems (IDSs) play an important role in monitoring our network, but they lack abilities in automated intrusion response. Nowadays with the rapidly increased complexity and speed of the attacks spread, there has an urgent need in automated intrusion response. This field has already aroused wide concern. The main obstacle now lies in that accurate measurement of...
To minimize energy consumption, efficient broadcasting in ad hoc networks requires the selection of small sets of forwarding nodes and the use of small transmission radii. However, the physical-layer characteristics of radio links are such that receivers may not be able to decode packets sent to them, even without multiple access interference. We present an analytical model to show that the transmission...
Public parking facility location is a multi-index and multi-restriction problem. Based on the urban parking comprehensive planning and parkerspsila behavior decisions, it aims to meet the requirement of the parking service under the constraint of limited resources. Itpsilas not all of the parkers that will choose the nearest parking facilities, but all the demand points in facility that is influenced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.