The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Countering network threats, particularly intrusions, is a challenging area of research in the field of information security. Intruders use sophisticated mechanisms to hide the attack payload and break the detection techniques. To overcome that, various unsupervised learning approaches from the field of machine learning and pattern recognition have been employed. The most popularly used method is Principal...
Nowadays, based on international relations and cooperation we do not discuss about a national energetic market, without connections with the rest of Europe. The economic, energetic cross-border exchanges, specialists educated in different universities from the entire world, represent a reality for the international scientific world. Only intense and permanent international exchanges can ensure development...
Arms race is a typical conflict among rational and non-myopic decision-makers (DMs). Nevertheless, the assumption of basis graph model for conflict resolution (GMCR) is not suitable for this issue that each DM possesses identical priority disregarding the difference of their capabilities. In order to handle with this drawback, this paper proposes a novel methodology, entitled capability-based GMCR...
The article considers public safety as the main trends in political and economic international relations that ensure inter-state “balance of interests”. Given the characteristics of its structure, place and role in the governance of the States. The authors propose the balance of priorities in solving problems in the global scale of the space in terms of development of mutually beneficial political...
The article presents an overview of major problems of integrated management systems implementation, provides a discussion on various integration problems of target management systems, both in terms of integration among systems, as well as in terms of integration into overall organizational structure of the company. Problems recognition process provides means for proper practical ways to resolve them...
Studies in the field of transport security are aimed more at finding new technical and technological solutions directly related to transport and the development of transport infrastructure. The authors of the work decided to look at the process of ensuring transport safety on a different plane-creating a model for assessing the processes presented at the territorial level. The assessment provides...
Compared to other remote attestation methods, the binary-based approach is the most direct and complete one, but privacy protection has become an important problem. In this paper, we presented an Extended Hash Algorithm (EHA) for privacy protection based on remote attestation method. Based on the traditional Merkle Hash Tree, EHA altered the algorithm of node connection. The new algorithm could ensure...
Restricted by the localization management and other factors, the social security level of the floating population in China is quite different. This study used the 2014 national population dynamic monitoring data, employment and living conditions, social insurance, housing and living conditions, public health and health conditions of the four first level indexes and two stage grey clustering model...
Happiness is affected by subjective feelings and objective conditions. While the health, wealth risks and so on that come along with serious diseases are important indexes affecting each factor of sense of happiness. It needs to build up happiness index to measure the influence of serious disease on happiness index of rural residents. The attained data conclusions have proposed optimized and improved...
The ideology carried by audio-visual product has a strong influence and guidance function. This paper starts from make a basic overview on audio-visual product industry ideology's security, construct the evaluation system of audio-visual product industry security, analyze the current situation and existing problems of audio-visual product industry ideology's security in China, and puts forward an...
The security of cultural industrial structural is one of the important contents of cultural industry research. On the basis of defining the security of cultural industrial structure, this paper analyzes the cultural industry policy factors which affect the security of cultural industry structure. They are talent policies, fiscal and financial policies, incentives and incentives policies, and international...
The security situation of China's futures industry is currently in good condition on the whole, with strong industrial competitiveness and control force, as well as low external dependency. However, under the new normal, there still exist some problems, such as fewer trading varieties of futures, irrational investor structure and the slow internationalization process and so on. So we must accelerate...
Energy security is one of the important factors for energy policy of the country. However, there are many concepts offered by the researchers on energy security, leading to such a diverse and complicated interpretation. Here we develop a novel concept which elaborates the global perspectives. It is realized through a deep evaluation on energy security evolution, followed by a philosophical study of...
This paper deals with a multi-period portfolio selection problem with fuzzy returns. A mean-variance-skewness model for multi-period portfolio selection is presented by taking into account four criteria viz., short and long term returns, dividends, liquidity and number of assets in the portfolio. The return and risk level are measured by interval numbers in the proposed model. Furthermore, an intelligent...
In the past twenty years the energy consumption of the world has grown significantly. There are many countries for which it is a huge challenge to ensure energy reliability and security. This situation is even getting more intense with the upcoming spread of renewable energy sources and the continuous need of lowering CO2 emission. Nuclear energy which is a possible solution for both difficulties...
Generally for most of the countries developing border areas is very important concern. However, due to security issues, most of the countries are not interested to place important industries in border areas. Tourism development is the most suitable solution for developing boarder areas. People Republic of China and Russian Federation are among big countries in the world and their border is about 4159...
This paper presents a case study from a project in Arusha region (north Tanzania), aiming at improving access to electricity in secondary schools through the establishment of a social enterprise, in charge of promoting rural electrification by applying the “4As Framework” with an innovative way and business structure. The work highlights benefits and challenges from the field, in order to drawn some...
Home Automation systems represent one of the most promising technologies for energy efficiency, which is currently considered one of main factors enabling an environmental sustainable growth. However, several barriers hinder a massive diffusion of Home Automation systems and their economic viability. The paper aims to analyze the economic viability of the adoption of a Home Automation system in different...
The Transmission System Operators (TSOs) in Europe are facing increasing challenges in both planning and operating their transmission systems. More integration of renewables increased the need for congestion management frequently. The highly variable energy output of renewables demands the expansion of existing network to accommodate them and managing power flows that are no longer centrally dispatchable...
We present a formal method for computing the bestsecurity provisioning for Internet of Things (IoT) scenarios characterizedby a high degree of mobility. The security infrastructureis intended as a security resource allocation plan, computedas the solution of an optimization problem that minimizes therisk of having IoT devices not monitored by any resource. Weemploy the shortfall as a risk measure,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.