The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In connection with the smart grid construction background and characteristics of the Power enterprise's own, a computational model of Multi-species portfolio cross hedging, with fuel oil futures and stock index futures as the hedging instruments is proposed. Moreover, a real case is analysed in the paper for the power enterprises to manage their asset and cover the risk actively.
A test suit need be reused in regressing test, which may contain repetitive and redundant test cases. To decrease the cost of maintaining the test suite and executing test cases in regression testing, according to selective regression testing, we select the test cases that can test part of changes, and then do the reduction for these selected test cases. Based on the requirements of static path coverage...
We used the statistical sampling method to analyze the relation between the university teachers' network class upload quantity, visit quantity and university teachers' four personality characteristics: gender, age and title. Therefore universities should take the teachers' personality characteristics into account to adopt the effective measures for universities networking education building. University...
This paper introduces a DRM system for electronic document publication. Through merging the process of encryption and authentication, and the system can prevent from attacking through reverse engineering to a certain degree. In this system, a part of the encryption key is dynamically generated during the authentication process. So every client will obtain a deferent encrypted data when requesting...
The theory of families of odd-periodic perfect complementary sequence pairs(OPCSPF) is given. OPCSPF can be derived from the odd-perfect almost binary sequence and sequence pairs. Some characteristics of OPCSPF are discussed, and the necessary conditions for existence of OPCSPF is given. The methods are studied and proved which construct OPCSPF.
Adopting the investigation method and documentary analysis through the Fuzzy Mathematics, this paper studies the relationship between the public's winning the basketball lottery and their interest and investments for the sport basketball. It has optimized from the qualitative to quantities' points of view the guess methods for the basketball lottery, and then put forward the optimum one for the present...
This paper presents a novel hybrid approach for solving the Container Loading (CL) problem based on the combination of Immune Genetic Algorithm (IGA) and Integer Linear Programming (ILP) model. More precisely, an IGA engine works as a generator of reduced instances for the original CL problem, which are formulated as ILP models. These instances, in turn, are solved by ILP, and the performance measures...
Copyright protection of digital works is a serious problem today. It is worthy to research on how to use watermarking algorithm correctly according to special application. A secure watermarking protocol is designed in this paper to protect the copyright in digital museum. In our cryptography based protocol, a trusted third party is introduced into the system, and two watermarks are embedded into the...
Construction land suitability evaluation is essential for urban development decision. Back Propagation Neural Network (BPNN) is suitable for the non-linear issue. In this study, BPNN architecture has been set up, with 9 neurons of input layer and 4 of output layer. The neurons of input layer include indices related to topography, engineering geology, hydro-geology, and geo-hazard, which are determined...
Construction land location advantages and agricultural land suitability evaluation are the most important basis for land use decision in urban region. This article focuses studying on Hangzhou case, an urban region with very rapid construction expansion. In this study, GIS is using for spatial analysis and mapping, while K-Means Clustering (KMC) and BPNN for attribute data process. Factors including...
Network and host Intrusion Detection Systems (IDS) have become a standard component in security infrastructures. As the action of intrusion represents variable, complicated, and uncertainty characteristic, they face so many problems to resolve for intrusion detection. Each approach has its strengths and weaknesses. A truly effective intrusion detection system will employ both technologies. We discusses...
Neural network has been one of the most common methods used in the intrusion detection system (IDS). In this paper, we describe a method to deal with the common audit data set. It includes converting the string to numeric elements firstly, then omitting the unnecessary data and ensuring that the data has the reasonable range limit. The simulation results built upon Matlab software show good performance...
This paper used research method to make computer network benefit community personified. Responsibilities and management ways of composition in the community were studied. Nature, manpower and public foundational resources and its assigning management mechanism dependent by the community were studied. The results indicate interior of community has primitive instinct power to pursue maximization of...
A new model and framework of integrated software engineering environment based on product line was put forward in reference. This paper will continue to study and discuss the realization machinasim and method of the ISEE based on the new model and framework. Compared with traditional ISEE, This new kind of ISEE based product line will use multi-layer architecture and standard components bus. And then,...
Soundness is a vital property of Interorganizational Logical Workflow Nets (ILWN) which can efficiently model cooperative systems. But even though each logical workflow net (LWN) is sound, soundness of arbitrary ILWN is hard to decide. This study analyzes the causes of leading to deadlocks of interface transitions and unboundedness of interface data places: the incorrect order of transitions related...
On the question of optimal hedging ratio, the paper firstly draws the chance to choose market-entering point into the model. Using the replication principle of finance engineering, we make an assumed equity and get the optimal hedging ratio of the model, which gives the theoretical support to the practice. The conclusion is obtained that we should not only concern on the market-entering point, but...
By means of the coincidence degree theory and its related continuation theorem, the existence of periodic solutions of nonautonomous predator-prey model controlled by impulse are investigated in this paper. The results extend earlier ones where impulses are absent. Further, using numerical simulation method the influences of the impulsive perturbations on the inherent oscillation are investigated...
The success of Generalized Multi-protocol Label Switching (GMPLS) provides a solution that enhances IP by its remarkably advanced features particularly the improvement in data transfer rate. GMPLS can be well classified, managed and policed across different types of networks. In this paper, we discuss the GMPLS and its application for core optical network. The IP and optical layers are converging...
Network load balancing is the ability to aggregate two or more wide area network (WAN) connections in order to achieve greater reliability and overall throughput. This paper discusses traffic technology and flow optimization in optical network. Performance optimization of networks is actually a control problem. Traffic engineering should provide sufficient control in an adaptive feedback control system...
In migrating workflow system, the migrating instance which behavior is similar to mobile agent is dispatched to execute task on the workplace, so the migrating instance faces the same security problem as the mobile agent. However, most of the present protecting mobile agent security methods are in passive ways. In this paper, we propose a model with the danger detection algorithm to protect migrating...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.