The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the application of independent component analysis (ICA) to statistical process monitoring is studied. This paper mainly focuses on studying on the fault detection and isolation principle based on the data model of ICA. Contributions of this paper are: (1) for the purpose of fault detection, two monitoring statistics are designated by detailed analysis on the data model of ICA; (2) a...
It is crucial for cellular data network operators to understand the service quality perceived by its customers. The state-of-art systems deployed in cellular networks mostly report service quality aggregated on cell site level, which is typically an aggregation of tens or hundreds of customers depending on the locations of the cell sites. In this paper, we propose to enhance the measurement of customer-perceived...
The purpose of this paper is to analyze passengers' moving direction through the video shot in the entrances and exits of the subway stations. The results of the analysis will be helpful to relevant departments to manage the traffic condition, making a decision in the face of emergency. First of all, this paper adopts Haar features and Adaboost algorithm to implement the detection of human's head...
With the cost of modern weapons, equipment procurement use and security (OSS) increasing, economic affordability becomes an unavoidable problem. Aerospace, defense departments, the services and other industries increasingly unable to afford such a huge financial even material resources and manpower cost. Based on the equipment maintenance cost estimation on the study, this paper focuses on the costs...
This paper presents a 3G wireless video surveillance system solution. The system has four cameras collecting real-time information compressed by MPEG-4 inside and outside one bus, then the information will be sent to the monitor center through 3G network. The system corrects video data with LDPC codes, and uses LDAP managing bus and cameras information in the terminal. Experiment shows that the monitoring...
With the advancement of sensor, communication and information technologies, Wide Area Monitoring, Protection and Control (WAMPAC) systems have been identified as the new generation of solutions to improve power system planning, operation and protection. There are a number of Southern California Edison (SCE) advanced initiatives that are related to the WAMPAC systems. Despite differences among various...
With the advancement of sensor, communication and information technologies, Wide Area Monitoring, Protection and Control (WAMPAC) systems have been identified as the new generation of solutions to improve power system planning, operation, and maintenance. With huge amount of real-time data collected through distributed sensors deployed in a wide area, effective information presentation has become...
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP's retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. While such an attack can significantly degrade the performance of all TCP-based protocols and services including Internet routing (e.g., BGP), no existing scheme clearly solves the problem in real network scenarios. In this...
At present many cities in our country have massive plans in constructing comprehensive transportation hubs. To realize security operation of it well, the paper proposes establishing "the regional security monitoring center" in the hubs. It can realize different complex transportation supervisory system's information sharing and the seamless connection. Firstly, the paper discusses on the...
A Shrew attack, which uses a low-rate burst carefully designed to exploit TCP's retransmission timeout mechanism, can throttle the bandwidth of a TCP flow in a stealthy manner. While such an attack can significantly degrade the performance of all TCP-based protocols and services including Internet routing (e.g., BGP), no existing scheme clearly solves the problem in real network scenarios. In this...
Continuous monitoring and diagnosis of network performance are of crucial importance for the Internet access service and virtual private network (VPN) service providers. Various operational constraints, which are crucial to the practice, are largely ignored in previous monitoring system designs, or are simply replaced with load balancing problems which do not work for real heterogeneous networks....
As the Internet steadily increases in importance, it is still based on a quite fragile routing design. From network operators perspective it is therefore crucial to detect end-to- end path performance due to routing outages early to either mitigate them directly or contact other entities to mitigate them. In this work we demonstrate the feasibility of a real-time tool for detecting degraded forwarding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.