The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays, the big data analysis is more and more widely used in information and telecommunication domain. Benefits from the big data analysis, both the telecommunication operators and Internet service providers could analyze user's interests more effective and predict user's expectation more accurate thus significant improve and add value of their services. Identity management in big data analysis...
Nowadays, the big data analysis is more and more widely used in information and telecommunication domain. Benefits from the big data analysis, both the telecommunication operators and Internet service providers could analyze user's interests more effective and predict user's expectation more accurate thus significant improve and add value of their services. Identity management in big data analysis...
With the development of wind power, how to use wind power fully has become an important research. In this paper, wind power accommodation robust model with security constraints considering demand response is built to accommodate wind power as much as possible. The robust model is a two-level optimal model: the upper level is to minimize the curtailed wind power and the lower level is to re-schedule...
In order to realize the spare parts supply accurate security scheme decision, this paper built up equipment spare parts accurate security scheme decision index system. We analyzed the alternatives of the spare parts accurate security based on set pair method and selected out the best supply project.
ERCOT has moved from a zonal market to an advanced nodal market since December 2010. In ERCOT, combined cycle trains (CCT) contribute a significant share of its total installed capacity. Therefore, how to accurately and efficiently model the CCT is one of the key factors for a successful EROCT nodal market. In order to facilitate market operations and ensure the system reliability, the ERCOT nodal...
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
In recent years, automated intrusion response has become a promising research problem in network security. Several approaches have been proposed to perform an effective automated response policy. However, these approaches have some limitations, i.e., heavily depending on attack alerts and not taking in account uncertainty of system runtime state. In this paper, we present a comprehensive sequential...
How to improve query efficiency in cryptograph database is an essential problem in database encryption technology. As one kind of methods for improving cryptograph query efficiency in database, existing cryptograph index technologies suffer from two main problems: low query hit rate and lack of information disclosure measures. In this paper, we propose a new cryptograph index method based on the probability...
In this paper, first, the technology of virtual private network (VPN) is presented, and a comparison of several tunnel technology is given. Secondly the structure of IPSec protocol is introduced, and FreeS/WAN software realization IPSec protocol based Linux is made a particular analysis. At last, the VPN gateway is realized by applying FreeS/WAN soft under Linux.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.