The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With a higher level of electric vehicle load penetrated in the distribution network, reconfiguration could be employed to minimize energy losses. Based on a second-order conic programming formulation, an improved set of network radiality constraints is proposed using power-flow based network connectivity conditions. This proves to be a computationally more efficient method compared to the spanning...
The emergence of social network application and rapid development, makes the human use of the Internet has a great way to change. An in-depth understanding of the online social networks is necessary to insight into questions of human social behavior, study the structure of online social network, to design future online social network, and to understand the impact of online social networks on the Internet...
Based on IBE/ABE's Web security technology, an improved ABE scheme is proposed in this paper, which can represent any key by using "and", "or" logic and the threshold monotony of the access rules. In order to resist the collusion attack, multiple users use a combination of their keys to decrypt the ciphertext, it virtually eliminates the possibility of a conspiracy to know the...
Image segmentation and boundary extraction are very important in the fields of image understanding, image analysis, pattern recognition and computer vision etc., and geometric active contour model (GACM) is one of the most important tools in the areas of image segmentation and boundary extraction. While before using this model initial contour must be selected. In order to realize initial contour automatic...
For assessing the security and optimal strengthening of large enterprise networks, this paper proposes a new approach uses configuration information on firewalls and vulnerability information on all network devices to build defense graphs that show the attack and defense strategy. Some models including a defense graph model, attack-defense taxonomy and cost quantitative model, and Attack-Defense Game...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.