The case study presents a series of partial discharge measurements, reflecting the state of insulation of 110 kV instrument transformers located in Sibiu county substations. Measurements were performed based on electr...
详细信息
The case study presents a series of partial discharge measurements, reflecting the state of insulation of 110 kV instrument transformers located in Sibiu county substations. Measurements were performed based on electrical method, using MPD600: an acquisition and analysis toolkit for detecting, recording, and analyzing partial discharge, product of Mtronix Precision Measuring Instruments. MPD600 consists of three acquisition units(to separate, this way, the DP signal from electromagnetic disturbances, based on the three Phase Amplitude Relation Diagram–3 PARD), an optical interface and a computer with dedicated software. The system allows measurements of partial discharge on site, even in presence of strong electromagnetic interferences because it provides synchronous acquisition from all measurement points. Measurements, with the ability to be calibrated, do render:● a value subject to interpretation according to IEC 61869-1:2007 + IEC 61869-2:2012 + IEC61869-3:2011 and IEC 61869-5: 2011;● the possibility to determine the nature of the fault by identifying defective *** the results, the 110 kV instrument transformer was directed to the repair shop and had the fault identified.
We propose a new digital watermarking method for the anticounterfeit of trademarks based on complete orthogonal U system. By designing an algorithm and analyzing experimental results, we find that the proposed method ...
详细信息
With the development of economic globalization, modern service industry has gradually become the main driver of economic growth, during which innovation has become the eternal topic, and clustering as well as networki...
详细信息
ISBN:
(纸本)9783662482247;9783662482230
With the development of economic globalization, modern service industry has gradually become the main driver of economic growth, during which innovation has become the eternal topic, and clustering as well as networking have become the main trends in the development of modern service industry in the future. Based on the knowledge and funds, these two kinds of network resources acting as "bridge", the paper highlights the main parts of the knowledge sharing and fund raising to improve the cluster enterprise innovation. The features of the cluster network include three aspects: network centrality, network density, and structural holes. Knowledge sharing and fund raising have a significant impact on cluster innovation mechanism, and on the contrary, the characteristics of cluster network will affect knowledge sharing and financing as well, and what follows next is that it will affect the cluster innovation mechanism.
Resembling the single server environment, if the multiserver environment using smart card provides the users to access the different servers after registering once with the registration center and uses the same passwo...
详细信息
Resembling the single server environment, if the multiserver environment using smart card provides the users to access the different servers after registering once with the registration center and uses the same password and identity for all the service provider's servers, then security would be the matter of great concern. So, remote user authentication scheme becomes necessary to provide a better security. In this regard, many dynamic ID-based remote user authentication schemes in multi-server environment using smart card have been proposed in the literature. In 2012, Sood proposed Dynamic Identity Based Authentication Protocol for Two-Server Architecture and claimed that his scheme is more efficient in terms of security. But it is pointed out that Sood's scheme is insecure against off-line identity guessing attack, off-line password guessing attack, privileged insider attack, user impersonation attack, session key recovery attack and many logged in users' attack. In 2012, Li et al.'s proposed a scheme for providing better performance than Sood's scheme. But unfortunately Li et al.'s scheme also is insecure against off-line identity guessing attack, off-line password guessing attack, user impersonation attack and many logged in users' attack. To overcome the above mention attacks for both the schemes and related attacks on remote user authentication like (identity and password guessing attack, user impersonation attack, server masquerading attack, insider attack, session key discloser attack, smart card stolen attack, replay attack, many logged in users' attack and stolen verifier attack etc.), we proposed an efficient dynamic ID-Based remote user authentication scheme in multi-server environment using smart card. After performance analysis, the proposed scheme has lower computation complexity, better communication cost and higher security that makes the authentication system more secure and efficient than both Sood's and Li et al.'s schemes published earlier.
Hadoop Distributed File system (HDFS) is a reliable and scalable data storage solution. However, it has great weakness in storage of the numerous small files. A merging method of small video files containing traffic i...
详细信息
One of the major research directions in robotic vision focuses on SLAM using RGB-D sensors. The information can be used for decision making of robots and other areas that require precise position as a feature. This pa...
详细信息
The Web service infrastructure has been an important software component on the Internet. A critical step in Web service applications is the service discovery method. The structured information in the web services desc...
详细信息
The traditional search engines don’t consider that the users interest are different, and they don’t provide personalized retrieval service, so the retrieval efficiency is not high. In order to solve the problem, a m...
详细信息
If we pause a moment to reflect on the innovations of the last twenty years in the field of information technology, we realize immediately as consumer electronics, computers and telecommunications have changed their b...
详细信息
ISBN:
(纸本)9783662492246;9783662492239
If we pause a moment to reflect on the innovations of the last twenty years in the field of information technology, we realize immediately as consumer electronics, computers and telecommunications have changed their balance of power. Today, Internet is so ingrained in the culture of the people who seems to be always there, and you can hardly imagine to live without it. Today mobile devices are computers, and their inter-connection and connection with several kinds of technological objects is ever more increasing. This has led to the emergence of new concepts, such as the Internet of Things (IoT), Machine to Machine (M2M), and People to Machine (P2M) and the consequent need to provide frameworks that allows communication and interoperability between heterogeneous objects. Furthermore, the increasing availability of data and especially of computational power allows things to serve not only as data producers but also as consumers. Thus we can think about internet of things as a cloud of services software and services composition. In such a highly mobile environment, both the user and "things" may be subject to frequent movement, demanding a frequent recomposition. In this paper, we propose a preliminary biological-inspired approach for adaptive software composition at run time. The approach leverages the concept of immune system to ensure dependability e.g. availability and reliability, of a composition of software and services in the Internet of Things.
暂无评论