The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Tactical command and control system is a warfare information exchange and command system which is highly related to the national defense security. The tactical command and control system features include collecting the data sources from different tracking device sensor and merging the same or filtering the duplicate targets. System response time and the number of tracking targets are two major factors...
The reliability theory used in the design of complex systems including electric grids assumes random component failures and is thus unsuited to analyzing security risks due to attackers that intentionally damage several components of the system. In this paper, a security risk analysis methodology is proposed consisting of vulnerability analysis and impact analysis. Vulnerability analysis is a method...
Through a mount of simulations of power system emergency control, it is confirmed that action time of emergency control affects the transient stability of power system. This paper introduces control time component in the consideration of the existing emergency control model which is based on the dynamic security region(DSR). This paper quantifies the degree of system instability parameter after shedding...
In the financial market, the expected rates of security returns cannot be well reflected by historical data because of the high volatility of market environment. This paper deals with a fuzzy portfolio selection problem based on possibility theory. Due to ignoring transaction costs would result in inefficient portfolio, a possibilistic portfolio selection model with concave transaction cost is proposed...
With the rapid development of information technology, the computer has been more and more important in our lives. Especially it makes our working, learning and entertainments, and even consumptions dependent on the computer increasingly because of the popularity of network. However, the computer has brought us a lot of convenience, while it also makes us face with a variety of security risks. Computer...
The development of electric vehicles requires a lot of charging stations. The existing gasoline station expands charging services, which can save the land and can accelerate construction of charging station. Firstly, this paper analyses the similarities and differences between gasoline station and charging station. And then, it further analyses risk of the EV charging and gasoline filling integrated...
The disinfection effect of Copepod of zooplankton with chlorine dioxide was compared with that of chlorine. The experimental results showed that chlorine dioxide was more effective to kill Copepod. Copepod was completely killed by 1.0mg/L of chlorine dioxide for contacting 30 min but the required dosage were about 2.0mg/L of liquid chlorine. The body structure variety of Copepod indicated that the...
The inactivation of Copepod with available oxidants such as chlorine, chlorine dioxide, ozone and potassium permanganate were investigated under various working conditions of different oxidant dosage, organic substance content and pH value. The results showed that chlorine dioxide might be most effective to inactivate Copepod than other oxidants and complete inactivation effect may be attained by...
In this paper, a new image encryption algorithm is presented based on Henon chaotic system in order to meet the requirements of secure image transfer. Shuffling the positions and changing the grey values of image pixels are combined to shuffle the relationship between the cipher-image and the original-image. First, the Arnold cat map is used to shuffle the positions of the image pixels. Second, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.