The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The aim of this study is to evaluate interlocking intramedullary nails in the treatment of fractures. We retrospectively reviewed 68 adult patients (for a total of 95 fractures) with isolated long-bone fractures who were treated with interlocking intramedullary nails between January 2010 and January 2012. The patients were followed for 18 months to observe the healing of the fracture, time, and the...
As a revolutionary calculation model, cloud computing technology can provide safe, rapid and convenient data storage and network computing services through the network in way of on-demand and extend easily. Based on the analysis and summary of the previous work, the key technology and the latest research progress of cloud computing are introduced deeply and comprehensively in the paper. The prospects...
The study presents exploratory research mainly on surfing behavior of smartphone users under a mixed network conditions. It mainly focuses on the following three aspects: variation trend analysis of the functions and operating systems of smartphone, explore the relations between the differentiation in user experience, social networks, emotional contagion sensitivity and cellphone surfing behavior...
A number of shocking cyber-attacks have happened in recent years, and the damage they have caused has led to the emergence of cyber-security as a consideration when designing embedded systems. Software vulnerability and physical attack are the most severe threats the system face. This paper provides information about hardware designed to monitor potential intrusions and incidences of unauthorized...
This paper investigates the impacts of circuit breaker performance on voltage instability corrective actions for power systems with distributed generations (DGs) under contingencies, and proposes a new computer network-aided strategy for stability improvement. This strategy aims to save a distribution system from imminent voltage collapse due to contingencies occurring in subtransmission system, distribution...
This paper presents the physical layer design comprising the Bus Guardian (BG) and Bus Driver (BD) used in an in-vehicle network compliant with FlexRay standards. FlexRay is a new standard for data/signal communication among electronic devices installed in a vehicle. The Bus Guardian is one of the most important components in charge of security and safety for the FlexRay standards. The Bus Guardian...
Recently, Das et al. proposed a dynamic ID-based remote user authentication scheme using smart cards. Liao et al. pointed out some weaknesses of Das et al.psilas scheme, and presented an improved scheme. However, an impersonate attack on Liao et al.psilas scheme is proposed, it proves that their scheme is also insecure. To overcome the weakness, the new scheme is presented. The advantage of the proposed...
Recently increased use of network-enabled devices in power systems, rapid development of distributed generations from renewable energy resources, and government-imposed open access competition have resulted utilities in greater reliance on computer networks for proper power grid operations. This paper proposes a new two-level architecture for power-grid computer networks and to strength the networks'...
This paper proposes a new strategy for computer network-assisted corrective actions against short-term and long-term voltage instabilities in the electricity power distribution system connected with renewable-energy distributed generations. The proposed strategy aims to save the distribution system from imminent voltage collapse due to contingencies occurring in the subtransmission network, distribution...
Operations of electricity power systems have recently become more intricate due to development of microgrids, execution of open access competition, and use of network-controlled devices, etc. Computer networks therefore turn into an integral component of modern power-grid operations. This paper proposes a new utility computer network security management and authentication for actions / commands requests...
This paper proposes a new network cyber-security architecture for smart (energy-efficient, environmental-friendly, cost-effective, etc.) power distribution system operations. The focus is on providing cyber-security for smart (time-of-use scheduling, smart metering, dispersed generation tracking, etc.) load-management devices that are networked for collaborative operations and accessible by utility...
This paper proposes a new computer network-integrated stability enhancement strategy for electricity power system connected with renewable-energy distributed generations. The proposed strategy aims to save a distribution system from imminent voltage collapse due to contingencies occurring in the subtransmission network, distribution network, or distributed generation circuit, by executing appropriate...
Power distribution system cyber-security concerns are increasing rapidly with growing demands for open accesses to the distribution systems for electricity generation and trading imposed by new government deregulations. This paper proposes a new integrated network security protocol layer, located below the data-link layer of DNP3 - a popular utility protocol, to enhance the data transmission cyber-security...
Potential effectiveness of cyber-attacks against utility networks using protocol DNP3 would increase rapidly, when DNP3 is employed over TCP/IP, because attacks succeed on the Internet can be used against DNP3. This becomes a critical concern for DNP3 since an outstation may be accessed from multiple masters of external networks. However, commercial Internet security does not provide applicable security...
Concerns for utility computer networks' security and reliability are growing rapidly due to increasing utility devices with connections to external networks. This aggravates vulnerability of utility networks to cyber-attacks through external connections. Though encryption can provide security for user data transmissions, encryption itself could not provide protections against traffic-analysis attacks...
Ongoing power system automaton and open access imposed by new government deregulations aggravate cybervulnerability of utility computer networks. This paper proposes an open-access-compatibility (OAC) security layer, installed beneath the data-link layer of the popular utility network protocol DNP3, to enhance data transmission security for utilities with open access capabilities. The OAC security...
Recent introduction of open access competition by governments in the electricity industry and increase use of network-controlled devices in the power system have resulted utilities in greater reliance on computer networks for their power system operations. This paper proposes a new network access control model that significantly increases the power system network security. The new model extends the...
Power system modernization with increasing operation automation and integration results in growing computer network access. This facilitates cyber-attackers' capabilities to assume control over power system operations that could cause serious blackouts. Security therefore becomes a critical issue for DNP3, a commonly used protocol for power system communications. This paper proposes cyber-security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.