The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the dynamic time warping (DTW) matching method, a novel appliance identification algorithm for low frequency sampling load data is proposed. First, residential load sequences are segmented into subsequences composed of single appliance load profiles and multi-appliance load profiles. Then, reference load sequences of all candidate appliances, which have identical lengths, are generated before...
Based on analyzing characteristics of a large quantities data of equipment fault and alarm of supervision systems of urban rail transit, this paper takes fault characteristic and regulations of monitors as the object to identifying hazard factors that may cause accident. It presents reduction strategy of monitoring data mining and builds clustering feature tree of fault model, in order to figure out...
Network Service Providers are struggling to reduce cost and still improve customer satisfaction. We have looked at three underlying challenges to achieve these goals; an overwhelming flow of low-quality alarms, understanding the structure and quality of the delivered services, and automation of service configuration. This thesis proposes solutions in these areas based on domain-specific languages,...
There are numerous methods for identifying network traffic in recent research. In our experiment, flow is collected by using parallel probe and network IP packets are captured based on WinPcap's packet collecting technology. According to the characteristics of application layer protocol, a scalable identification system is proposed and network traffic can be classified as different application classes...
Currently, promoting development of securing energy-saving product is the commonly wish. Power supply system of mining electric locomotive consistently keeps operation situation, whether or not the electric locomotive works, that leads a lot of electricity energy to be wasted and let out, bringing the security menace. A mineral Securing Energy Saving System (SESS) based on SCM is designed and a trial-system...
On some high-level confidentiality required intranet which is isolated from Internet physically, the illegal external link is a significant problem. It would lead to the leaking of internal network information. In this paper, we present the design, mechanism, implementation and evaluation of the pseudo-route based method for illegal external link detection. This method overcomes the drawbacks of existing...
Hybrid Dynamical Systems (HDS) constitute a wide class of common industrial applications, where the behavior is determined by the interaction between continuous and discrete dynamics, i.e. behavioral modes succession. The general principle of model-based Fault Detection and Isolation (FDI) algorithms is to compare the expected behavior of the system, given by a model, with its actual behavior, known...
Internet has provided many confinement services to all of us, sometime we need compare all the similar services or products to decide which one is the best for us. However, most of current web browsers don't render any comparing function for user. People have to manually extract the information on the pages then compare them. In this paper, first introduce the critical item comparing scheme then we...
The size, heterogeneity and dynamism of the execution platforms of scientific applications, like computational grids, make using those platforms complex. Furthermore, today there is no effective and relatively simple solution to the programming of these applications independently of the target architectures. Using the master-worker paradigm in software components can provide a high level abstraction...
This paper proposes three innovative point-to-multipoint protection schemes to provide efficient and reliable MPLS transport profile multicast services, which is particularly relevant for the fast growing IPTV broadcast service. The three proposed protection schemes are all based on the interconnected rings structure, which is a widely deployed topology of legacy networks and has the natural ability...
We investigated age-related changes in the semantic distance between successively generated words in two letter fluency tasks differing with respect to demands placed on executive control. The semantic distance was measured by Latent Semantic Analysis (LSA). The results show that older people have a larger semantic distance between successively generated items than young people, and that this effect...
Network monitoring is an important method of network management and preserving safe operation. This paper presents a switched LAN (local area network) monitor mechanism based on ARP spoofing. Using WinPcap library function to capture the packets in switched LAN, the method contributes to the follow-up data analysis and detection of attack. Experimental data and analysis results show the effectiveness...
InfiniBand networks are aimed to fulfill increasing communication demand of parallel applications in high performance clusters. However, the dynamic behavior of communication load may cause bottlenecked link(s) which lead to message congestion. Congestion spreading increases latency and reduces network throughput causing important performance degradation. In this paper, we propose a congestion control...
A revision of IEEE Std 1641 is coming to an end and is undergoing its approval cycle. This standard, which provides a method of accurately defining signals and tests, has been further developed with many improvements. The use of signals and events has now been extended to include digital signals. These three elements, physical signal streams, event streams and digital streams, provide the vital backbone...
Reduction of operational efforts and complexity are key drivers for RAN Long Term Evolution. It is also of interest to minimise operational effort by introducing self-configuring and self-optimising mechanisms. A self-optimising function shall increase network performance and quality reacting to dynamic processes in the network. To improve the efficiency and performance of the E-UTRAN system, an efficiency...
Quality of individual services is substantial to guarantee high performance and availability of overall composite service oriented systems. This requires the process of diagnosing service quality degradation and responding to it in a timely and non-stopping manner. This paper presents a modeling-based approach to coordinate the process of Web service management, configuring parameters or invoking...
It is well recognized that debugging or testing a distributed system is a great challenge. FiLM is a runtime monitoring tool that can monitor the execution of distributed applications against LTL specifications on finite traces. Implemented within the online predicate checking infrastructure D3S, FiLM models the execution of distributed applications as a trace of consistent global snapshots with global...
We have developed a malware analysis system based on process-level virtualization. Our BitSaucer system can dynamically generate a number of virtual execution environments as honeypots on one machine. It confines malware by creating a virtual file tree in a virtual execution environment and by redirecting outgoing network communication to another virtual execution environment on the same machine....
We investigate the use of gossip protocols to detect threshold crossings of network-wide aggregates. Aggregates are computed from local device variables using functions such as SUM, AVERAGE, COUNT, MAX and MIN. The process of aggregation and detection is performed using a standard gossiping scheme. A key design element is to let nodes dynamically adjust their neighbor interaction rates according to...
The Cygnus Dual Beam Radiographic Facility consists of two identical radiographic sources each with a dose rating of 4 Rad at 1 m, and a 1 mm diameter spot size. The development of the rod pinch diode was responsible for the ability to meet these criteria. The rod pinch diode in the Cygnus machines use a 0.75 mm diameter tungsten tapered anode rod extended through a 9 mm diameter cathode aperture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.