Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
In recent years, the interoperability, exchange, privacy, and security of electronic medical records (EMR) across healthcare institution has become an important international issue within medical informatics. Currently Taiwan's electronic medical records exchange center (EEC) system lacks a mechanism for patients to consent to releasing only portions of their EMR. Currently patients must consent to...
This paper aims to study factors influencing trust and purchase intention on the Internet, develop model of trust and purchase intention by empirical data, and analyze path of antecedents influencing purchase intention. This study identifies the factors proposed in the existing social commerce constructs: recommendation and referrals, rating and reviews, forums and communities, together with three...
Development in information systems has brought the need for universal access to data stored in computer systems using database approach. It should ensure quality, reliability, performance with emphasis on rising data amount. The first part of the paper deals with the index structure definition, index access methods, which delimit access type. However, another significant factor is the data security...
We consider a Gaussian network consisting of a source that aims to communicate to its legitimate destination via an untrusted relay node in the presence of an external eavesdropper. The source wishes to send two independent messages to the destination: one message must be kept secret from the external eavesdropper only, while the other message must be kept secret from the external eavesdropper and...
This paper adopts k-means algorithm to analyze the key characteristics of low-income groups in the application information of successful applicants of the Minimum Living Standard Security System (hereinafter called MLSSS). Based on this method, six evaluation indexes (including family population, average age, the proportion of children and elders, the proportion of the ill and the disabled, average...
We introduce the ‘security index’ of a discrete-time, linear time-invariant system under sensor attacks as a quantitative representation-free measure on the vulnerability of an observable system. Ideas from linear coding theory are employed in providing conditions for attack detection and correction in terms of a system's security index, along with methods for its computation based on different representations...
System Protection Schemes (SPS) are considered as an effective tool for enhancing the resilience of the power system towards rare contingencies. The validation of SPS is difficult by using conventional SCADA data due to its inherent low scan rate and skewedness. Under such condition, Synchrophasors has been found to be better suited for performance evaluation SPS and review of its design. This paper...
Evaluating security threat status is very important in network security management and analysis. Aquantitative hierarchical threat evaluation model is developed in this paper to evaluate security threat status of a computer network system and the computational method is developed based on the structure of the network and the importance of services and hosts. The evaluation policy from bottom to top...
Static Security Evaluation (SSE) is one of the most important real-time studies in power systems. Static security can be assessed by different machine learning methods. In this paper, one of the well-known classifiers, namely the Support Vector Machine (SVM), is used for solving the SSE problem. Proper operation of the SVM heavily depends on the appropriate choice of parameters. The optimization problem...
The development of high voltage technology provides technical conditions for the transmission of offshore new energy, but it is necessary to consider the operation status of power grid when we decide the way of grid connection. This paper focuses on the stability of the system and evaluates three access form — the high voltage alternating current (HVAC), traditional direct current (DC) and flexible...
The constraint condition affects the attack, but this impact is not considered by the existing decision algorithm. In order to make the decision algorithm more consistent with the actual situation, this paper gave an optimal attack decision method based on the correlation between vulnerability and constraint conditions. The method first establishes the attack logic graph according the attack template,...
The electric power system is one of the most complex engineered systems. It is, thus, a challenge to design a market that is efficient, transparent, and provides the proper incentives to market participants. Existing market models employ constraint relaxations, which enable various constraints to be relaxed (violated) for a high penalty price. This paper examines the practice of allowing transmission...
Critical infrastructures like smart grid and smart transportations are large-scale distributed CPSs and cyber-physical security is pivotal to their safety and security. Efficient security assessment can help administrators to protect CINs effectively and we propose a universal quantitative cyber-physical security assessment methodology which is based on cyber-physical dependence analyses. For given...
The features of non-payment problem of global economy, including mutual debts have been indicated in the matrix form in the paper. Afterwards this problem has been converted into linear programming setting and solved by the Simplex method. Note that, LP enables us to find the market value of the existing debts in the market. The calculated equilibrium prices of mutual debts mean that potentially there...
Cloud computing is used as a metaphor for the Internet, and internet-based computing that provides shared computer processing resources and the software and hardware pay-for-use to computers and other devices on demand. It is a model for enabling ubiquitous, on-demand access to a shared pool of configurable computing resources. Cloud allows to store sensitive data (Govt, Hospital) in which the digital...
The Information Retrieval in the World Wide Web (Web IR) plays an important role in the use of the Internet. An information retrieval process begins when a user enters a formal statements of information needs, known as query, into the system and ends when results are given. Results consist of several objects that match the query with different degrees of relevancy. The relevancy of the results is...
In this paper, the problem of simultaneously generating multiple keys in a model where the key generating parties have restricted access to public discussions is considered. The model consists of four terminals, i.e., Alice, Bob, Carol and Eve. Alice and Bob are connected via a noiseless channel while Bob connects with Carol and Eve via a wiretap channel. There is no direct link connecting Alice with...
P2P networks constitute the foundation for many scalable and fault-tolerant applications. These networks may consist of millions of peers due to their decentralized design. While each peer advertises the same service interface, the actual data provided by common large-scale P2P applications often yields an imbalance, i.e., particular peer subsets are more frequently contacted than the rest of the...
Assessing E-commerce web sites quality is essential not only to have recommendations for improvement but also to make comparisons with competitors. In this paper, the aim is to know the best criteria for the evaluation and obtain a weight for them using fuzzy Analytic Network Process (fuzzy ANP). The subjective judgments of the decision maker are expressed by fuzzy numbers. The decision making problem...
With the development of economy and increasing demand of electricity in East China, large scale external power is needed to balance the growing load. The abundant energy reserves in Western and Northern China together with the development of HVDC transmission technology provide a good solution for this problem. However, the large-scale HVDC/HVAC transmission may pose a great impact on the stability...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.