The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents Security Constraint Unit Commitment (SCUC) backup plan considering single contingency. The proposed method leads solution to obtain optimal units and reserve schedule. In equivalent linear expression of the problem, shedding costs are used to avoid divergence and resolve congestion problem. Obtained load shedding in contingency case are utilized to achieve an optimal reserve requirements...
Outage load caused by N−1 contingencies can be restored automatically or manually in distribution network. Therefore, the restored load can be considered as an index to represent the distribution network security level. In this paper, a security evaluation method is proposed, in which a MIQCP (Mixed Integer Quadratic Constrained Programming) based restoration model is used. Meanwhile, methods are...
With the rapid pace of globalization and outsourcing, supply chain integrity of ICT system is gaining more and more attentions. Integrity of ICT Supply Chain has a slightly different focus from network security. Due to the increasing complexity and formidable cost and timing, it's by no means enough to guarantee the integrity of a modern ICT product through technical testing and vendor screening....
As new and more sophisticated computer attacks appear across the Internet, sometimes with unknown dimensions and criticality, the implementation of individual security solutions become less effective and in some cases useless. Instead, a combined approach is required to guarantee an appropriate and cost-effective mitigation of such attacks. Most of the current work suggests the deployment of multiple...
Vehicular ad-hoc networks (VANETs) have a big potential to improve traffic conditions. However, they are exposed to security threats that influence their reliability because they use an open medium for communication. We propose a trust based security system used by drivers to receive only trustworthy information about traffic conditions. Trust indexes are computed for individual pieces of data referring...
In the recent years, more attention is given to firewalls as they are considered the corner stone in Cyber defense perimeters. The ability to measure the quality of protection of a firewall policy is a key step to assess the defense level for any network. To accomplish this task, it is important to define objective metrics that are formally provable and practically useful. In this work, we propose...
Due to the disaster factors that influence the ecological security of Mining cities, risk measurement and fuzzy optimization theories are used, and an assessment indicator system based on potential factors and a fuzzy iteration model about ecological security of Mining Cities are presented in this paper, from the point of safety and disaster concepts. Finally, a case is applied in the appraisal of...
This study will investigate whether current economic activities in china have explanatory power over stock returns, or not. Monthly data of Shanghai Securities Exchange Composite Index and a set of macroeconomic variables, including money supply (M2), Value-added of industry (VAI), are used in this study. Engel-Granger, Johansen-Juselius co-integration tests and Granger Causality test are used to...
By analyzing the changes of population growth and grain production, as well as per capita grain possession of Hubei Province, this paper aims to ensure grain reserves rates and fluctuations security index in grain demand and its supply.
The number of symmetric Latin squares is closely related with the security of the post-commutative quasigroups cipher. Let Ln denote the number of distinct n×n Latin squares. It is fairly well known that equation and asymptotically Ln ∼ (n over e)n2 as n ₒ ∞. Let Sn denote the number of distinct n × n symmetric Latin squares. In this paper, we give a lower bound of Sn and show that equation (n → ∞)...
An algorithm of applying Bedford's law to detect credit fraud in e-commerce is proposed in the paper and the feasibility is studied. The weakness of the algorithm for detecting financial fraud via Benford correlation coefficients is analyzed and a new detection method for e-commerce fraud defined as credit algorithm based on Bedford's law is established, providing better performance of reliability...
The possibility of employing the demand response in the electricity market environment can lead to an improvement on the power system reliability and unit's production scheduling. To inquire these concepts, two scenarios are defined to schedule day-ahead energy and spinning reserve market simultaneously based on deterministic criteria. In the first scenario, reserve capacity can only be provided by...
When the share rights concentration degree is high big shareholder will become the ultimate controlling owners of the listed company. This paper studies the preference of the directional add-issuance based on the realities of China capital market, and studies the effect of the historical performance, share rights concentration, asymmetric information, and operation risk on the re-financing options...
The security of digital images attracts much attention recently. For images the transformation can be implemented at two levels, the first one consists of the pixel value permutation and the second one consists of position permutation. In this paper, we propose an encryption scheme for digital images with new pixel position permutation method based on Evolvable Hardware (EHW). In this work, we use...
By using daily data of India market, an effort has been made to investigate the possible volatility and price-discovery relationships between the NIFTY spot index and index futures market with techniques of ARCH/GARCH model, Johansen's Cointegration test and Granger Causality test. The main conclusions of this paper are as follows: firstly, the introduction of stock index future (SIF) helps reduce...
Structural equation model is used to analyze factors which have influence on the adoption of online shopping of university students in Mainland China. Those factors include perceived usefulness, perceived ease of use, Internet knowledge, functional service & after service of online shopping, perceived risk, reputation, and the use willingness of online shopping. As the empirical results suggest,...
Securely authenticating a human user without assistance from any auxiliary device in the presence of powerful passive adversaries is an important and challenging problem. Passive adversaries are those that can passively monitor, intercept, and analyze every part of the authentication procedure, except for an initial secret shared between the user and the server. In this paper, we propose a new secure...
Risks of construction project are aroused by a series of factors with hierarchical structure, which includes main risk factors and sub-risk factors. Using the multidimensional features of risk factors to form utility function, and according to the evaluations of values of sub-risks given by experts to calculate the weights and then get the evaluations of main risks. Then we could use the results to...
Secure software is crucial in todaypsilas software dependent world. However, most of the time, security is not addressed from the very beginning of a software development life cycle (SDLC), and it is only incorporated after the software has been developed. Even when security is considered since the inception of the software development, there is no concrete way to quantify security of an SDLC artifact...
It is necessary to analyze the anti-terrorism performance of Taiwanpsilas security system after September 11, 2001 attacks. We use three stage data envelopment analysis model that Fried et al. (2002) developed, getting intelligence performance of the Investigation Bureau of the Ministry of Justice, to discuss the ability of anti-terrorism in Taiwanpsilas national security system. Putting 10 outputs,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.