The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A hydrological sensor network is a comprehensive monitoring system which consists of varieties of hydrological stations. The spatial optimization of the deployment of these gauging stations is critical for obtaining hydrological information effectively, given that sensing resources are often limited. In this paper, we consider the hydrological station siting problem as a continuous location problem...
In remote sensing data exploitation, the spectral mixture analysis technique is generally used to detect the land cover materials and their corresponding proportions present in the observed scene. Traditionally, a fixed endmember spectral signature for each land cover material is used to perform the unmixing task. In the literature, some scholars have proposed performing the unmixing by taking the...
Ultra-high-frequency (UHF) partial discharge detection has become a most important tool for condition maintenance of gas insulated substations (GIS). It is a prerequisite to make full use of the PD detection technology by ensuring the sensitivity and appropriate arrangement of UHF sensors. This paper presents a method for the evaluation on the performance of UHF sensors and their validity of arrangement...
In this paper, a type of sensor for the non-contact monitoring of lightning and switching overvoltage in power grid is presented. It is designed based on Pockels effect and stray-capacity coupling theory. Double-crystal structure is utilized to restrain the unwanted influence caused by natural birefringence. The transmission of the data is achieved by optical fibers which are immune to the electromagnetic...
In the era of big data and cloud, distributed key-value stores are increasingly used as building blocks of large-scale applications. Comparing to traditional relational databases, key-value stores are particularly compelling due to their low latency and excellent scalability. Many big companies, such as Facebook and Amazon, run multiple different applications and services on top of a single key-value...
With high expansibility and efficient power usage, tiered wireless sensor networks are widely deployed in many fields as an important part of Internet of Things (IoTs). It is challenging to process range query while protecting sensitive data from adversaries. Moreover, most existing work focuses on privacy-preserving range query neglecting collusion attacks and probability attacks, which are more...
The Static Security Assessment of power system is affected by the uncertainty of the power flow distribution introduced by renewable resources. In this paper, a fast contingency selection approach considering load and generation uncertainties is proposed. Firstly, a linearized interval power flow algorithm is developed for post-contingency simulation. Then, an interval number comparison method based...
Twitter has become one of the largest platforms for users around the world to share anything happening around them with friends and beyond. A bursty topic in Twitter is one that triggers a surge of relevant tweets within a short time, which often reflects important events of mass interest. How to leverage Twitter for early detection of bursty topics has therefore become an important research problem...
A displacement back analysis, named as CACA-SVM, was proposed by combining the Support Vector Machines (SVM) and the Continuous Ant Colony Algorithm (CACA). The model used both the nonlinear characteristics of the Support Vector Machines to reduce numerical calculation and the global optimization performance of the Continuous Ant Colony Algorithm to avoid trapping in local optimum. The model was applied...
This paper presents the design and implementation of an Embedded Laboratory Security Monitoring System (ELSMS). The system includes a web server which acquires video information through camera, and Wireless Sensor Network (WSN) which gets environmental parameters through sensors and sends them to the web server. Users can access the Monitoring Server (MS) through PCs or Wireless Mobile Terminals(WMT)...
In this paper, we investigate the security challenges and issues of cyber-physical systems. (1)We abstract the general workflow of cyber physical systems, (2)identify the possible vulnerabilities, attack issues, adversaries characteristics and a set of challenges that need to be addressed, (3)then we also propose a context-aware security framework for general cyber-physical systems and suggest some...
Driven by the Yellow River Mouth's management department daily affairs, this paper summarized their management affairs, designed the system overall framework and introduced 3S integration solutions, key techniques of the analysis of shoreline (river channel swinging, coastline flushing and isobath automatic generation). The analysis of the Yellow River Mouth's changing erosion/deposition and the map/line...
Virtual logistics is a modern logistics mode in which logistics efficiency can be enhanced and logistics resources can be saved greatly, while as logistics information platform is the technical base for it. This paper studies the structure of virtual logistics information platform based on Multi-Agent. It first argues the whole framework of virtual logistics information platform is mainly constructed...
The security and trustworthiness of enterprise networks have been a major concern in the research and practice of Intranet security. The security of endpoints and their network access are inevitably two important factors regarding enterprise network security. In this paper we present a novel architecture to enforce controls on endpoint application execution and network access, in which the policy...
The monitoring system in coal mine has special requirements for data query. Analysis shows that routing in the system should have four features: data-centric routing, supporting query of geographic position, low delay and high reliability of data transmission, robustness of topology. A mobile agent based routing algorithm with mobile sink and a dynamical weight metric which is derived from its current...
Wireless sensor network (WSN) is a novel technology in acquiring and processing information and has been an active research area in recent years. In this paper, firstly, a high reliability routing protocol is designed which is able to rapidly detect the change of topological and routing information of network, choose the best route, recover route when some nodes damaged. Secondly, the basic information...
This paper analyses three existing methods of WSN data storage. Based on disadvantage of data-centric storage(DCS), the shortest path first of DCS(SPF-DCS) is present. Compared to DCS, the advantage of this method is that home node finds only one node as its own replica node. SPF-DCS can reduce communication between home node and other nodes, decrease the power consumption of node and prolong lifetime...
Monitoring is crucial for effective management and efficient utilization of the cluster computers. The information extracted from the node by the monitoring tools is of different volume and accuracy with different monitoring purposes. The overhead of monitoring will increase with the increase of monitoring tasks. Also large volume of data needs to be managed and transferred to the monitoring application...
Wireless sensor network is applied widely in monitoring system of coal mine. An application environment of WSN in coal mine is analyzed to satisfy the data acquirement of mine monitoring. The result of analysis shows that routing protocols applied in coal mine should have four characteristics: data-centric routing mechanism, supporting query of geographic position information, low delay and high reliability...
Due to the special and complicated environment in coal mine, the reliability and energy-efficiency are both the primary issues to be considered during the design of the wireless sensor networks (WSNs) for coal mine. In this paper, we put forward a reliable geographical adaptive fidelity (RGAF) routing protocol, which is based on cluster-unit topology (CUT) for the WSNs in coal mine. RGAF utilizes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.