The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The conflict problem of performance have to be solved when optimizing the product performance design parameters, which weakens other performances because of the optimization of certain performance. Therefore an extension transformation method is put forward to research the conflict resolution. The conflict problem of performance design is analyzed with the new customer needs of product performance...
Quick response to urgent relief right after natural disasters through efficient emergency logistics distribution is vital to the alleviation of disaster impact in the affected areas, which remains challenging in the field of logistics and related study areas. This paper analyzes the spatial data and the attribute data by space model and logistics models. Numerical studies with a real large-scale earthquake...
With the rapid development of computer, applied mathematics and reservoir engineering, which have provided a technology platform for the scientific management, digitalization and informationization of reservoir, the integration research of geological modeling and numerical simulation is more and more emphasized in oilfield. In this paper, the mathematical theory of streamline simulation is given....
Intrusion detection is an efficient method to detect the malicious node in the MANET. This paper presents the improvements of the existing data analysis and pattern-matching algorithm based active set, which develop a more effective BER.
Going beyond vulnerability scanning tools that make lists of known vulnerabilities locating on given individual hosts, attack graphs identify all possible attack paths that end in a state where an attacker has successfully achieved his goal. But the algorithmic complexity grows exponential in the size of the network. The access graph is proposed as a complement to the attack graph approach which is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.