The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Simulation is widely used to predict the performance of complex systems. The main drawback of simulation is that it is slow in execution and the related compute experiments can be very expensive. On the other hand, analytical methods are used to rapidly provide performance estimates, but they are often approximate because of their restrictive assumptions. Recently, Extended Kernel Regression (EKR)...
Robotic tool changer can make robot complete a variety of tasks once enter the work environment. To predict and evaluate the performance of the device, the solid model is established through the software of UG, and multi-rigid body and rigid-flexible coupling dynamic simulation can be accomplished by using software ADAMS and ANSYS. At the same time, the stress and strain analysis of the flexible part...
We consider the physical layer security for the downlink system, where the confidential messages can be wiretapped by both the intended users (IUs) and the external eavesdroppers (EEs). Regularized channel inversion (RCI) precoding is adopted for multiuser communication because it can control the mutual information leakage among users. And, to enhance the secrecy performance, artificial noise (AN)...
A new modified mathematics model is proposed based on fuzzy mathematics theory and adaptive weighted algorithm aimed at how to analyze the influence on communication network security. The proposed model is associated with the attention degree on security defense is executed. In the proposed model, the communication network security threat, communication network attack approach, network security character...
We present a systematic method to design ubiquitous continuous fast-acting distributed load control for primary frequency regulation in power networks, by formulating an optimal load control (OLC) problem where the objective is to minimize the aggregate cost of tracking an operating point subject to power balance over the network. We prove that the swing dynamics and the branch power flows, coupled...
In this paper, we provides a simple and accurate analysis by Markov chain modeling to evaluate the IEEE 802.11 DCF performance in the presence of capture effect. We extend the Bianchi's multidimensional Markov chain analytical model of IEE 802.11 DCF to characterize the behavior of DCF considering capture effect and packet retransmission limits. We compare the NS-2 simulation results with the derived...
The drastic development of E-Banking business has brought great cost saving and enormous rise of profit for commercial bank entities, so that every commercial banks are actively developing E-Banking business, and more attention and capital have also been inputted upon the development of information security ensuring products to ensure the safety of E-Banking. Because the information security ensuring...
For the purpose of managing risk in inter-firm knowledge sharing process in supply chain, based upon the different role the enterprise who proposes knowledge sharing initially in knowledge sharing process, this paper divides inter-firm knowledge sharing activities into two different types: demand-pulled and supply-pushed knowledge sharing mode. Then, considering knowledge transfer and absorption capabilities,...
In wireless sensor networks, sensor nodes are densely deployed for environmental monitoring, so the observation random data are highly correlated in space. This paper proposed a WSN data correlation model named OD Model based on spatial location according to the most universal mode of omnidirectional Boolean sensing. Both analysis and simulation results show that the accuracy estimation of OD Model...
China education-economy system is typical complex system. Both traditional region economic theory and complex social economic theory were used to analyze it. The econometric equation of system constituents' interactions was built based on the Cobb-Douglas production function. The integrated system model was built according to system dynamics. The simulation indicates that China education-economy system...
A threat situation analytical method based on the network graph theory model was presented. In this method, the attack cost of adjacent nodes and the calculating formula for its effectiveness value were defined, as well as the method to calculate the maximum threat path and node. It analysis the threat level of the target node and the threat path of a local area network. The results indicated that:...
This paper proposes an effective and accurate approximative analytical decomposition method for evaluating the throughput rate of a three-loop closed manufacturing system with unreliable machines and finite buffers. The main philosophy is to decompose the three-loop closed production line into three single loop closed lines and approximate the influence of each other by modifying the parameters of...
Multi-loop closed production systems widely exist in different industries, such as semiconductor assembly and test factory. Measuring the system performance is rather hard because of the complex interaction among the loops, but very important for the design, improvement and control of the production systems. In this paper, we propose an approximation method which is based on the overlapping decomposition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.