With constant development of multimedia technology, large amount of image information is given more and more attention by people. High-quality image compression becomes the hot subject of current study. In this paper,...
详细信息
QoS (Quality of Service) constraintsfibased multicast routing is one of major issues in distributed multimedia on the network. An improved algorithm based CACO (Chaos Ant Colony Optimization) is proposed in this paper...
详细信息
This paper uses AMESim software to model the hydraulic system in the aerodynamic brake system. First we will have a brief introduction about the hydraulic system to be simulated. Than the hydraulic system is modeled a...
详细信息
The hospital medical treatment process can be modeled as a queuing problem. If the allocation of medical devices and resources is not well optimized, then the passing rate will be low and patients have to be waiting i...
详细信息
Wireless sensor networks (WSN) are a new selforganizing network as a kind of military applications by RF wireless communications, so its security is very important. Intrusion detection system always be deployed at eac...
详细信息
The implementation method and security measure of security about improving *** application are discussed from two aspects: .Net security platform frame design and application design. The Principles and characteristics...
详细信息
Fault diagnosis for hydraulic components has features of nonlinearity and high dimensional pattern identification, so it's difficult to do it accurately with small sample using some common methods. Aimed at this p...
详细信息
Industrial control system (ICS) plays an important role in the critical infrastructure, and any compromise in their security can result in grave consequences. Since the occurrence of “Stuxnet” event in 2010, the inf...
详细信息
ISBN:
(纸本)9781479905607
Industrial control system (ICS) plays an important role in the critical infrastructure, and any compromise in their security can result in grave consequences. Since the occurrence of “Stuxnet” event in 2010, the information security problems of ICS cause the intense attentions all over the world. How to assure the security of ICS has become a hot topic in governments, industrial sectors and academic community around the world. Currently, testbed technique has become an important and effective simulation solution for checking vulnerabilities and validating security solutions of ICS. In this paper, we review the existing research results of ICS testbeds in government sectors and academic community respectively, and analyze their functions and simulation capability. Furthermore, we make a discussion of ICS testbeds and a comparison of ICS testbeds in academic community. From this work, researchers can clearly know the status of ICS testbeds and promote the further searches in this hot field.
Development of information systems is becoming more and more complicated, especially in business fields. The major development mode is based on UP, which can be called a development process standard. In this paper, th...
详细信息
In order to meet the request of fast access of power system simulation software base on Oracle, two methods based on OCI (Oracle Class Interface) technology are presented in this paper. The method of Binding array is ...
详细信息
暂无评论