The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional method of security correction of power grid maintence scheduling exists problems, such as rough calculations, larger error of the results.The using of day-head forecast powerflow for security correction of power grid maintence scheduling will solve the above problem. This paper presents a auto-generated methods of day-ahead forecast power flow for security correction of power grid maintence...
In this paper, DEA modeling and efficiency evalutation is employed to assess the financial efficiency in more than 30 province china. The data of financial efficiency in each provinces and vadity in the financial scale as well as input indicators on finance was obtained. Through the comparison evaluations, the paper indicates that there are great difference in regional financial efficiency. At the...
A community intrusion detection system based on wavelet neural network (WNN) is presented in this paper. This system is composed of ARM (Advanced RISC Machines) data acquisition nodes, wireless mesh network and control centre. The data acquisition node uses sensors to collect information and processes them by image detection algorithm, and then transmits information to control centre with wireless...
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
The existent models aiming at information security risk analysis primary startle the problem from a technical view and the real-time assessment approaches are seldom studied. The knowledge based approaches for information security risk analysis are limited in rule presentation and risk management. The bottom-up approaches fails to support effective security decision and control. Real-time assessment...
The existent models aiming at information security risk analysis primary startle the problem from a technical view and the real-time assessment approaches are seldom studied. The knowledge based approaches for information security risk analysis are limited in rule presentation and risk management. The bottom-up approaches fails to support effective security decision and control. Real-time assessment...
Software architecture design is an important stage in the whole software development lifecycle. There are so many various concerns at architecture level which relate to all kinds of stakeholders and describe the all facets of problem domain. Unfortunately, they often tangle and scatter in the components and connectors, result in the final architecture solutions uneasy to evolve and reuse. So in this...
Traditional architecture design approaches suffer from the crosscutting features and behaviors, which scattered and tangled in the components and connectors, result in the final architecture solutions uneasy to evolve and reuse. In this paper, we propose an approach for multi-dimensional separating crosscutting concerns at architecture level, including: (1) an architectural meta concern space can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.