The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When using the Ah counting method to estimate state of charge of battery on electric vehicle, it is difficult to measure the initial SOC, and will bring accumulated errors. In order to solve the above problem, we design an algorithm which integrates the open circuit voltage method (OCV), Kalman filter (KF) and Ah counting method (Ah) in this paper. With the help of Matlab/Simulink platform, a test...
The three-dimensional model of failure possibility is established based on operation state of elements, utility theory and probability theory, considering the dispatchers' operation experience and sensitivity to the weather. Using this model, the risk indices of power system can be simulated and calculated. The online risk analysis software of power supply(RAPS) for regional grid has been developed,...
Due to new needs of supply systems, new solutions must be developed and evaluated. One of the important tools is discrete simulation model. Companies and manufacturers can use it to perform analyses to estimate the impact of their decisions performance on the overall before they made any real system changes. In this paper, we consider multi objective functions and integrated inventory. Also, regarding...
Brake-by-Wire (BBW) system replaces traditional components such as the pumps, hoses, fluids and master cylinders with electronic sensors and actuators. Because of the increasing of the electronic components in the BBW system, there will be some errors occurred in communication channels because of the noise and Electro-Magnetic Interference (EMI). Moreover, system failures will be occurred by these...
Technical features and operational properties of PHEV are analyzed in the paper, and test methods and standard on fuel consumption and emission performance of such vehicles both in China and abroad are compared and studied, and some critical issues confronting PHEV in fuel consumption and emission evaluation in aspects of test cycle, test procedure, result calculation, etc., are discussed, and proposals...
Abstract-In this work, we study the application of Perron-Frobenius theorem for computing trust in the VANET environment. Safety critical and safety related messages in a VANET can lead to major changes in the behavior of vehicles moving on the road which can prevent unpleasant traffic situations. False messages can result in serious conditions like collisions. Trust management in VANETs is necessary...
In this paper we propose a method to hide colour watermark in the host image based on spatial domain technique. For the evaluation of Imperceptibility & Robustness of the proposed method we have calculated six different quality measure parameters. We have tested watermarked image against different noise attacks at different noise densities. The parameter so calculated gives the measure of...
Nowadays data are considered most important capitals of an organization, playing a main role in it, in addition to their contribution to software equipmentsand buildings. Different enterprises have different security requirements and different security controls should be applied with respect to its requirements. To preserve data in terms of security as well as comprehensiveness, a great deal of efforts...
The unbelievable evolution of Internet technologies & its applications need very high level the security of data during transmission over the unsafe communication network. Image steganography is a technique for hiding information into a cover image. Least Significant-Bit (LSB) based approach is most common steganographic technique in spatial domain due to its easiness and hiding capacity....
We design an algorithm to merge both RSA algorithm and Diffie-Hellman Algorithm of them to provide a user with even higher level of data security. Actually, our intent is to secure data of smaller as well as larger size by obtaining one randomly chosen key pair from set of RSA keys and one randomly chosen secret key using Diffie-Hellman algorithm and then applying RSA encryption to make even public...
Cyber crime used different new methods in modern era. Cyber crime not well defined. It is very typical to identify new types of cyber crime. Cyber crime is defined in proper and standard manner than easy to make cyber laws. This uncertainty makes problem to take decision against criminal. We need to make easy to identify of cyber crime then we punished criminal by new cyber laws. The Experimental...
Distributed computing is a method of computer processing in which different parts of a program run simultaneously on two or more computers that are communicating with each other over a system. Distributed computing is a type of segmented or corresponding computing, but the last term is most usually used to refer to dispensation in which different parts of a program run simultaneously on two or more...
Cloud computing is the apt technology for the decade. It allows user to store large amount of data in cloud storage and use as and when required, from any part of the world, via any terminal equipment. Since cloud computing is rest on internet, security issues like privacy, data security, confidentiality, and authentication is encountered. In order to get rid of the same, a variety of encryption algorithms...
The main aim of this paper is to provide a broad review of network security and cryptography, with particular regard to digital signatures. Network security and cryptography is a subject too wide ranging to coverage about how to protect information in digital form and to provide security services. However, a general overview of network security and cryptography is provided and various algorithms are...
VLAN's are widely used in today's enterprise networks to improve scalability & flexibility at core, distribution and access layers. VLAN's are no longer confined to LAN environments and are becoming more widespread in their use. Unfortunately VLAN security issues has raised concerns and caused some network architects to re-focus on the associated issues. Our paper focused on two key issues...
Improvement in the performance of a mesh network is significant when multiple radios become part of the each node with utilization of multiple channels. The mesh network met with the problem of assigning the multiple radios and channels and avoiding the interference. Key problem of channel assignment in the mesh network has been examined and proposed a model based upon the dynamic assigning the channels...
A wireless sensor network (WSN) consists of spatially dispersed and dedicated sensor for controlling and monitoring the physical conditions of the environment. Object-Tracking Sensor Network (OTSN) based applications are widely referred as the most interesting applications of WSNs. OTSN, is a kind of WSN, is used to track the objects in a monitored area and to report their location of objects to base...
Ad-hoc networks are becoming increasingly popular due to their wide range of uses. Mobile ad-hoc network have Nodes for at no cost to move and arrange them in random order. Ad-hoc networks are suitable for make use of in situation where an infrastructure would not unavailable or to deploy one is not cost effective. In ad-hoc networks MAC protocols are responsible for coordinating access from active...
Most of the software practitioners believe in Model-based test case generation. Advantages of this are the early detection of faults, reducing software development time etc. The most important part of the testing attempt is the test case generation. As a modeling language, Unified Modeling Language (UML) is generally used to describe design specification and analysis by both software practitioners...
As the web is growing very rapidly, the users get easily lost in the rich hyper structure. The primary goal of search engines is to provide relevant information to the users to cater to their needs. Therefore, finding the content of the Web and retrieving the users' interests and needs have become increasingly important. The different algorithms used for link analysis like Page Rank (PR), Weighted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.