The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of Internet technologies such as cloud computing and big data, the scales of distributed information systems in big companies have grown to enormous sizes. Automatic detection and diagnosis of system faults in the large-scale information systems is complicated and important in both practice and research. In this paper, we propose a Graph-based Fault Diagnosis approach in...
Continuous evolution of virtualization-related technologies have benefit greatly flexibility and reliability of software system. However, although virtualization removes binding between application and server underneath, it complicates the regular runtime hierarchy into an intricate structure, where cross-layer monitoring and holistic evaluation becomes challenging. Currently lots of monitoring practices...
The Cloud Security Alliance lists data theft and insider attacks as critical threats to cloud security. Our work puts forth an approach using a train, monitor, detect pattern which leverages a stateful rule based k-nearest neighbors anomaly detection technique and system state data to detect inside attacker data theft on Infrastructure as a Service (IaaS) nodes. We posit, instantiate, and demonstrate...
This paper presents a preliminary study of developing a novel platform for big data management, processing and analysis of modern power systems. The framework comprises a big data acquisition subsystem, a big data analysis subsystem, a decision-making assistance subsystem and an information integration subsystem. For the big data management system, a novel structure is designed according to three...
To secure IaaS cloud environments, multiple layers of security mechanisms must be deployed and monitored. When a threat is detected, it must be appropriately acted upon. A common problem with monitoring such approaches is the sheer volume of alarms generated. Some alerts may be false positives, others are informational. It is challenging for cloud providers to quickly interpret which events to act...
Some models based on (moderate resolution imaging spectrometer, MODIS) image data for estimating content of the Heavy Metal are developed by taking Taihu Lake as an experimental site in this study. Heavy Metal content measurements and MODIS images are obtained concurrently. The suitable MODIS bands and band combinations are correlated with Heavy Metal measurements. Then, using regression analysis,...
Transformer online operation state directly influences the operation state of the whole power system. A transformer online operation state assessment method is proposed in this paper. This method is based on history, real-time, future operation data of transformer, and five evaluation models for device, maintenance, state, operation, and plan are established. Six category twenty-five sub-index es...
Many concerns have been raised regarding the privacy issues in social media. The risks, as well as the security and privacy issues of social media in business, public policy, and legislation need to be evaluated and studied. However, there is lack of effective and practical way to quantify, measure, and evaluate privacy. In this paper, we propose a social network model, SONET, for privacy monitoring...
As information security chips are more widely used in the field of information security, the security of chips becomes increasingly important, which has also been a hot research field of information security. With the advances in technology, a chip-invasive method of attack which uses laser or focused ion beam (FIB) to change the chip's internal signal line, and then probe the chip's secret information...
In our study we apply the principal-agent model to study credit contract proposed by banks to motivate third-party logistics firms (TPL) and consider supervision as an important variable. Our results indicate that when supervision is introduced into contract, TPL can be motivated to work more efficiently. In particular, we give bank' efficient supervision set and bank can be better off by keeping...
Several shortcomings of the normal method on temperature measurement in Substation, such as the bad time-real function and the limitation of the environment and the infeasibility in airtight equipment are analyzed. Above methods can't applied to monitoring the temperature of closed equipments. Zigbee technology is used to the measurement system in substation. The Pt 100 temperature sensor and zigbee...
In this paper, we use the TCP/IP protocol stack and PPP dialer integrated in single chip terminal to gather information, through GPRS wireless communications to connect internet, transmitting the data to the upper monitor to analysis and process, realizing the remote monitoring to the transmission towers' on-line monitoring to ensure the reliability of electricity and raise the ability of troubleshoot.
This paper treats the massively used man - machine hybrid systems as the research objects and firstly defines their basic color collections and product elements. Then according to the definitions the bottom layer model of the human resource center, dynamic purchase order center, human-computer hybrid work center is established by making use of the CPN TOOLS modeling tool. Also, the top level model...
Based on PWV (Precipitable Water Vapor) data from the ground-based GPS (Global Positioning System), weather station's ground data and NCEP grid reanalysis dataset, the transport process of water vapor during the “7.17” heavy rainfall in Chongqing of 2007 is studied. The important role of remote sensing water vapor of the ground-based GPS (precipitable water vapor) is analyzed. It is shown that the...
Abnormal sensor signals may cause missed diagnosis in the fusion fault diagnosis system based on evidence theory. To diagnose the fault in time with abnormal sensor signals, fault-tolerance is required. An evidence redistribution method is proposed for the sensor fault-tolerance of fusion diagnosis system. The evidences directly calculated from sensor characteristic parameters are updated by an evidence...
NBTI reliability is becoming increasingly important as the CMOS technology scaled down to nanometer regime. It's necessary to find out approaches to measure the NBTI degradation easy and quickly. In this paper, an on-chip NBTI measurement monitor circuit is presented with purpose of monitor reliability and provide advance warning signs of failure for the chip.
We present results on long-term trends of precipitable water vapor over the Chinese mainland based on data from the crust monitor observation network of China (CMONOC), obtained during the period from 2002 to 2004. The correlation between GPS zenith tropospheric delay (ZTD) and radiosonde PWV amounts to 0.89, indicating that the variety of tropospheric zenith delay can reflect the change of precipitable...
Partial least square (PLS) is the most commonly used algorithm for near infrared (NIR) modeling. NIR modeling features that it's cheap, easy and fast to measure the NIR spectroscopy while expensive, difficult and time-consuming to measure the reference value for this spectroscopy. PLS often faces the challenge of that limited samples are available in training set to build a predicative model. To tackle...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.