Data preservation deals with ensuring that digital data stored today can be read and interpreted tens or hundreds of years from now. As the amount of data that needs to be preserved has been growing significantly, thu...
详细信息
Data preservation deals with ensuring that digital data stored today can be read and interpreted tens or hundreds of years from now. As the amount of data that needs to be preserved has been growing significantly, thus a standardized preservation process into big data environment is required. One of the standardized process recognized by ISO 14721:2012 is Open Archival Information system (OAIS). This research proposed a framework for data preservation process in big data architecture by using OAIS main components: Ingest, Archival Storage, Preservation Planning, Access, and Data Management. Based on the analysis, four out of five OAIS main components working in the proposed framework in the big data environment, which are Archival Storage, Preservation Planning, Data Management, and Access.
Compared with institutional pension and home-based care, community care system has an obvious advantage in the psychological cognition and service acceptance of the elderly. Based on the system theory, the effect of c...
详细信息
Compared with institutional pension and home-based care, community care system has an obvious advantage in the psychological cognition and service acceptance of the elderly. Based on the system theory, the effect of community care servicesystem on the quality of life of the elderly is analysed empirically. The study found that community infrastructure, community life care services, community self-governing services, and medical care services were positively correlated with the quality of life in the elderly. In this paper, the corresponding countermeasures are put forward.
One grand challenge in software defined networking is to select appropriate locations for controllers to shorten the latency between controllers and switches in wide area networks. In the literature, the majority of a...
详细信息
This paper presents the development of a hardware-in-the-loop testbed for a three-bus power grid interfaced with a simulated networked control system (NCS) for studying cyber security threats and their possible impact...
详细信息
This paper presents the development of a hardware-in-the-loop testbed for a three-bus power grid interfaced with a simulated networked control system (NCS) for studying cyber security threats and their possible impacts on the power grid. The three-bus grid consists of two generator buses, configured as slack bus (constant voltage and angle) and PV bus (constant power and constant voltage), and a load bus (PQ bus). The synchronous generators are driven by dynamometers serving as prime movers, and the field circuits controlled by insulated gate bipolar junction transistor (IGBT) DC/DC choppers. The load bus operates switchable resistors, capacitors, and inductors that are connected to the generator buses through transmission lines. The simulated NCS is implemented on an Opal real-time (Opal-RT) platform, which is a PC/FPGA based real-time simulator that can integrate hardware with software simulations, commonly referred to as hardware-in-the-loop (HIL). In general, HIL setups have the advantage that physical elements under test interact in real time with a simulated model of a large scale system and provide a better insight of performance of both the physical system and the controller. In this HIL experiment, the data acquisition unit (DAQ), and the controller are both implemented on the Opal-RT platform. The controller determines the duty cycle of the pulse width modulated (PWM) signals applied to the gate of the IGBT which controls the voltage applied the generator field circuits, thus producing desired terminal voltages of the generators. Experimental results are presented that show the effects of cyber-attacks on a generator control system. A baseline for the behavior of the three-bus system is first established by operating the generator under various load conditions for which the controller maintains the desired terminal voltage. Then, a series of denial-of-service (DoS) attacks in the feedback loop were launched. With no attack prevention mechanism in place, th
In recent years, the explosive development of mobile communications and networking, together with the wave of Internet of Things (IoT), has led to super-complex systems, which are difficult to model and manage. At the...
详细信息
In recent years, the explosive development of mobile communications and networking, together with the wave of Internet of Things (IoT), has led to super-complex systems, which are difficult to model and manage. At the same time, such systems are generating a large amount of data on a real-time basis, from both the user and network sides. How to utilize such data to relieve the dependence on restrictive, sometimes even unrealistic, system models are the key leading to more efficient and effective future networks, especially when under various resource constraints as in IoT systems. Fortunately, recent advancements in artificial intelligence (AI), empowered by modern machine learning algorithms, have demonstrated remarkable success in a variety of fields and are stimulating numerous data-driven approaches as well as applications. Combining the availability of big data in complex IoT communication networks and the recent advancements in AI, it now comes the time to renovate how we resolve network management issues to more efficiently and effectively fulfill the dynamic demands of network subscribers, especially in the presence of stringent network resource constraints. With the fuel (IoT data) and the engine (AI), data-driven network management will enable us to dynamically and adaptively meet the spatio-temporal network demands in the most resource-aware and resource-smart manner.
We perform an asymptotic study of the performance of filter bank multicarrier in the context of massive multi-input multi-output. We show that the effects of channel distortions, i.e., intersymbol interference and int...
详细信息
The massive amount of data makes the work of building a smart city more data-driven. However, due to volume, security and privacy reasons, data migration can be difficult in a large system. To build a bridge between d...
详细信息
The monitoring and warning system of main agro-meteorological disasters in Zhejiang Province is researched and developed herein based on technology of WebGIS. According to SOA and B/S structure, the system is construc...
详细信息
The monitoring and warning system of main agro-meteorological disasters in Zhejiang Province is researched and developed herein based on technology of WebGIS. According to SOA and B/S structure, the system is constructed on *** development platform by using C# and Java computer language, and applied in in Zhejiang Meteorological Department as a subsystem of “Zhejiang Modern Agricultural Meteorology Business system”.
Spatio-temporal analysis of Kilim River using Very High-Resolution (VHR) satellite image between the years of 2005 and 2012 are vital to assess river morphological changes and erosion detection over the specific time ...
详细信息
With the advent of rapidly evolving nanoelectronic systems, compact implementation of versatile and dense network-on-chips (NoCs) on a die has emerged as technology-of-choice for multicore computing. However, because ...
详细信息
暂无评论