The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In restructured power systems, generation and commercialization activities became market activities, while transmission and distribution activities continue as regulated monopolies. As a result, the adequacy of transmission network should be evaluated independent of generation system. After introducing the constrained fuzzy power flow (CFPF) as a suitable tool to quantify the adequacy of transmission...
Financial markets typically undergo periods of prosperity followed by periods of stagnation, and this undulation makes it challenging to maintain market efficiency. The efficient market hypothesis (EMH) states that there exist differences in structural complexity in security prices between regular and abnormal situations. Yet, despite a clear link between market acceleration (cf. recession in security...
Over recent years, many Private Information Retrieval (PIR) schemes have been designed aiming for computational efficiency and overall real-world practicality. In particular, some preprocessing techniques have been studied to reach those goals. Our main contribution is a new preprocessing technique that reduces overall computation and communication and allows the client and server to share some of...
Subway has become one of main means of transportation all over the world. How to deal with sudden subway accident is the serious problem the whole world should face to. In view of subway security issues, choosing one of Beijing metro lines as the research example, building a warning index system include of 14 indexes such as fire warning ability, power system, etc. and using the neural network model...
This paper establishes the index system of the safety evaluation of navigation environment from perspective of which affects the navigation safety. After that, Bayesian network security evaluation method is introduced and the fuzzy set theory is combined to construct a safety state evaluation model. Then the safety condition of the navigation environment is expressed in the form of safety probability.
Wetland is a very important part in ecological system and it offers various animals and plants habitat. Red beach which grows in tidal zone and intertidal zone between sea and land is one of wetlands with high productivity and variety. Wetland is a natural resource in fast dynamic property and one of currently important wetland remote sensing studies to extract and analyze wetland information. This...
A publisher-subscriber framework is generally develop on join network architecture. This framework allows authorized data distribution among subscribers through publishers. This is an open overlay network. It has some security issues including integrity and confidentiality, authorization, validation etc. Also there is another problem regarding this network, such as Events secrecy and subscriptions...
In today's world of fast communication, to insure, the security and integrity of information is a big challenge. Data hiding also known as Steganography is one of the fields that deal in methods related information security and hide secret information and message other information. This paper elucidates the effect of data hiding in different number of least significant bits in the primary colors of...
As the International Data Corporation (IDC) estimated, public cloud services spending reached nearly 70B in 2015. While enterprise and public adoption of cloud applications and services is accelerating over time, security and performance remain as dominant concerns. As many studies try to address the security and performance of cloud data centers and cloud networks, it is unclear how to evaluate the...
One-way hash chains have been used to secure many applications over the last three decades. To overcome the fixed length limitation of first generation designs, so-called infinite length hash chains have been introduced. Such designs typically employ methods of asynchronous cryptography or hash based message authentication codes. However, none of the proposed schemes offers perfect forward secrecy,...
Numerous security incidents caused by malwaresand hackers have recently utilized anti-forensic techniquesto bypass analysis and detection. It is critical to build aknowledge base that would help understand such anti-forensictechniques. In this paper, we present a forensic analysis methodto detect an anti-forensic technique which leverages timestampmanipulation in NTFS file system. Our approach analyzeshow...
We present a novel multimedia data hiding system using over-complete transform dictionaries. The proposed design scheme is different from most existing schemes that use orthonormal (complete) dictionaries, e.g., discrete Fourier transform (DFT), discrete cosine transform (DCT), or discrete wavelet transform (DWT) matrices, etc., during data embedding and detection phases. This paper focuses on one...
Beichen district of Tianjin, located in the important node of Beijing-Tianjin golden corridor and high-tech industry area of Jingjintang region, has strong industrial foundations, while it is still faced with the problems that traditional industries account for high proportion of the industrial structure, inefficient use of industrial land, lack of enterprise innovation ability and shortage of resources,...
N-1 security criteria is a key principle for distribution operation. However, it is hardly taken into account in modern distribution feeder reconfiguration models, which cannot satisfy security margin demands. To address this fundamental problem, this paper develops a new stochastic reconfiguration method for distribution network considering N-1 security and net loss. Firstly, three indexes-average...
Aggregation operators for intuitionistic fuzzy information, the popular methods in group decision, face the challenge in this area - counter-intuitive result (the decision result is conflict with people's intuition under specific inputs). In this paper, the Mixed Intuitionistic Fuzzy Aggregation Operators (MIFAOs) are proposed to relieve this problem. Firstly, the Bivariate Mixed Intuitionistic Fuzzy...
This paper presents an assessment of the securityconstrained optimal power flow (SCOPF) solutions, under probabilistic generation and transmission contingencies. The proposed SCOPF approach schedules the optimal level of system security by balancing the security cost (i.e. out-of-merit dispatch cost) against the cost of corrective actions and expected cost of energy interruptions due to contingencies...
In recent years, under the action of multiple stress factors, such as global change, ecological function decay, extensive production, natural disasters and sudden environmental events are showing a rising trend , the ecological high-risk characteristics which is an inevitable process of industrialization is initially apparent in our country. So that, based on the analysis of regional ecological carrying...
This research identifies a number of key factors related to online consumer trust and establishes a model based on the System Dynamic method to find out the relationships between these factors and trust. This paper provides several contributions. Firstly it reviews the previous works of online trust and identifies the major online trust building factors which mainly consists of business factors, consumer...
Despite the promise of scalability, efficiency, low cost, the rapid adoption of cloud computing also raises many concerns. In particular, security, privacy has been at the forefront of discussions, research in recent years. In this paper, we consider the unexplored problem of malware detection on encrypted cloud storage, especially relevant when cloud storage facilities are used for data archiving,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.