The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A displacement back analysis, named as CACA-SVM, was proposed by combining the Support Vector Machines (SVM) and the Continuous Ant Colony Algorithm (CACA). The model used both the nonlinear characteristics of the Support Vector Machines to reduce numerical calculation and the global optimization performance of the Continuous Ant Colony Algorithm to avoid trapping in local optimum. The model was applied...
Using advanced computer information technology and power system, Real-time Environment Protecting Supervision and Control System (REPSCS) of heavy loads in the Inner Mongolia Electric Power Grid is studied. REPSCS can monitor the operation of the heavy load companies' main equipment and environmental protection electrical equipment. The operation data of those key equipment are collected, processed,...
We propose a photoelastic pressure sensor using a liquid crystal (LC) tunable fiber polarizer. The polarizer contains an etched single-mode fiber sealed in an LC cell. A low-index LC is used as a tunable birefringent cladding of the fiber. Any electric-field-induced LC director reorientation may thus affect the fiber's light-guiding characteristics. Different polarization states experience different...
The Internet and computers did not invent or even cause privacy issues. The issues existed long before the creation of computers and Internet. The existence of the Internet, computers and large data storage make it possible to collect, process and transmit large volumes of data, including personal data. In this paper, we shall study the privacy from following two different views, namely legal framework...
Once the computer system is intruded, the change from normal to abnormal is a gradual procedure. Setting up a calculating model based on danger theory for danger signal during the procedure will improve the accuracy and efficiency of artificial immune system (AIS) greatly. In this paper, the method of classified danger sensed (MCDS) for windows process intrusion detection based on danger theory is...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.