The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The cost and effort of developing software systems in a new technical area can be extensive. An organization must perform a domain analysis to discover competing products, analyze their architectures and features, and ultimately discover and specify product requirements. However, delivering high quality products, depends not only on gaining an understanding of functional requirements, but also of...
The integrity and confidentiality of the multilevel security communication are guaranteed by using the key obtained from key negotiation process. To ensure the safety of this process is very important. The quantum key distribution process is unconditionally secure. This paper uses this process to distribute the authentication keys and the session keys, which are used in IPSec process. Thus, the method...
Internet of Vehicles (IoV) is a typical application of Internet of things in the field of transportation, which aims at achieving an integrated intelligent transportation system to enhance traffics, to avoid accidents, to ensure road safety, and to improve driving experiences. Due to its characteristics of dynamic topological structures, huge network scale, non-uniform distribution of nodes, and mobile...
Dual-energy Computed Tomography (DECT) is a useful tool that has been used widely in the security field and clinical diagnosis, because of its outstanding capability of material identification. One of the widely used pre-reconstruction methods for DECT is dual effect decomposition method. But the method only takes the compton scattering and photoelectric effect into consideration and ignores other...
To ensure security, cloud service providers employ security groups as a key tool for cloud tenants to protect their virtual machines from unwanted traffic. However, security groups can be complex and often hard to configure, which may result in security vulnerabilities that impact the entire cloud platform. To assist tenants in designing better security groups, in this paper, we propose and develop...
The quality of the creation of Operational Plan Ontology Class Hierarchies directly affects the quality and efficiency of the entire ontology creation. Starting from analyzing the logical basis of Class Hierarchies creation, this paper puts forward the rules and requirements of Class Hierarchies creation. In addition, it demonstrates concrete procedures of Class Hierarchies creation. Combining with...
With increased variable generation, the power grid operator faces more challenges in operation. This report presents several methods that the RTO developed to manage the uncertainties through better management of generation and demand. The results of an internal analysis indicate that clear benefits can be achieved through these enhancements. The RTO constantly reviews its operation and makes necessary...
Food safety has become a popular issue among people which obliges the government to pay more attention to it when more and more food safety accidents happened and brought out more damage to people. This paper, by searching for food safety accidents via the internet, shows the current situation of frequent food safety accidents and analysises the reasons. The paper wish furtherly arouses the senses...
Gaining a better knowledge of one's own network is crucial to effectively manage and secure today's large, diverse campus and enterprise networks. Because of the large number of IP addresses (or hosts) and the prevalent use of dynamic IP addresses, profiling and tracking individual hosts within such large networks may not be effective nor scalable. In this paper, we develop a novel methodology for...
The problems existing in the regulation of China CPA industry are researched, and the current conditions that the regulation of China CPA industry can choose are analyzed. Put forward the concrete scheme of the regulation mode of China CPA industry from three aspects, including of improving the system of law and the construction of the regulation institution, emphasizing the dominant status of the...
This paper reviews the high performance technical computing (HPTC) applications in Midwest Independent Transmission System Operator INC (Midwest ISO or MISO) various operation functions. The paper briefly describes the day ahead market, real time market and FTR market. Its ancillary service market design is presented as an example of the application of the high performance technical computing. The...
The maneuverability, besides the security and economy, is another factor to evaluate on the routing of naval vessel. Aiming to the lack of the considering of maneuverability influence existing in traditional automatic shortest routing methods, this paper proposes a method for automatic routing based on comprehensive evaluation on limiting conditions of maneuverability. The proposed method has defined...
Automation of semantic web service composition is one of the most promising challenges in semantic web service research area, in which security research on service composition has attracted more attention. In this paper, we present a model of Action labeled Kripke Transition System, namely AKTS which can abstract interaction behaviors involved in service composition and turn them into logic symbols,...
Spinning reserve (SR) is one of the most important resources used by system operators to maintain system security, but excess amount of SR which goes against economy must be avoided. A new unit commitment model is proposed in the paper, which adds expected customer interruption cost (ECOST) into the objective function. Thus a pretty tradeoff between system security and economy can be achieved while...
Mobile ad-hoc networks (MANET) has highly dynamic topology, open access of wireless channel and unpredictable behaviors; however, absence of effective security mechanism render MANET more vulnerable to positive attacks. Conventional assessments always require large sample data satisfy specific distribution and establish models through subjective recognition, thus lack common applicability, objectivity...
Previous studies of government performance have ignored the effects of organizational culture on government performance. Integrated the results of the studies and found that spiritual culture, administration culture and behavior culture are the three common factors among organizational culture factors that effect on government performance. However the research on the relation among the three factors...
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
Abstract-To study the effect of Xiaoyaosan on changes of behaviors (the open field test, elevated plus maze test and Y-maze test) in chronic immobilization stress (CIS) rats. Methods: 28 male Sprague-Dawley rats were randomly divided into control group, model group and Xiaoyaosan group. CIS was used to induce stress in rats of model group and Xiaoyaosan group, 3 h a day for 21 days. Xiaoyaosan was...
In dual energy computerized tomography (DECT) which is widely used in industrial areas and security inspection, metal artifact reduction (MAR) is a troublesome problem. Pronounced streaks appear in the atomic number reconstruction and the value appears to be highly inaccurate when metal objects are present. In this article, a practical MAR method for DECT is proposed. Firstly, sinogram segmentation...
In the designing of the instruments with asset-backed securitization structure, the cost and contribution of different credit enhancement methods are varied greatly which result the difficulties to find the proper combination of credit enhancement structure. Considering the contribution quantity of credit enhancement structure, the proper credit enhancement combination can be find using the method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.