欢迎访问行业研究报告数据库

行业分类

重点报告推荐

当前位置: 首页 > 行业报告

找到报告 5731 篇 当前为第 511 页 共 574

报告分类:外文技术报告

  • 5101.应用于加州高速铁路的交通系统规划的节俭性建模和不确定性量化

    [信息传输、软件和信息技术服务业] [2013-12-13]

    This paper presents a parsimonious travel demand model (PTDM) derived from a proprietary parent travel demand model developed by Cambridge Systematics (CS) for the California high-speed rail system. The purpose of the PTDM is to reduce computational expense for model simulations, optimization and sensitivity analyses, and other repetitive analyses. The PTDM is used to quantify the significance of parameter uncertainties with the use of mean value first-order second moment methods for uncertainty quantification and sensitivity analysis. The PTDM changes the model resolution of the parent travel demand model from a traffic analysis zone to a county-level analysis. The three-step model contains trip frequency, destination choice, and main mode choice models and is calibrated to match the results of the CS model. The main mode choice model predicts primary mode choice results for car, commercial air, conventional rail, and high-speed rail. The PTDM uses data and models similar to parent models to show how uncertainty in travel demand model predictions can be quantified. This paper does not attempt to assess the reliability of parent model forecasts, and the results should not be used to evaluate uncertainty in the California High-Speed Rail Authority's ridership and revenue forecasts. However, the uncertainty quantification methodology presented here, when applied to the CS model, can be used to quantify the impact of parameter uncertainty on the forecast results.
    关键词:电子信息;系统;交通规划;建模
  • 5102.基于RFID的访问控制系统的安全意识程序的研究

    [信息传输、软件和信息技术服务业] [2013-12-13]

    In this study, a security method that protects data from an information system accessed by unauthorized persons through physical ways like eye contacts is proposed. In addition, it is applied to security awareness programs for improving security recognition and to contribute to the protection of important information. The security awareness program proposed in this study is able to detect the violation in physical security policies and to implement additional training related to warning messages or such violated security policies and that leads to present positive effects of changing user security awareness and corresponding works. It is expected that these effects are to be spreaded to the whole organization and influence for all members.
    关键词:电子信息;信息安全;网络安全;访问控制;意识程序
  • 5103.端对端面向服务的体系结构(SOA)项目的安全性

    [信息传输、软件和信息技术服务业] [2013-12-13]

    Service oriented architectures (SOA) present security challenges not present in the single-hop client-server architectures due to the involvement in multiple parties (transparent to the client) in a service request. Considering the additional security threats on SOAs, the interactions of independent trust domains require the establishment of trust across all involved partners as a prerequisite to ensure secure interactions. This project provides a solution for integration of scalable security solutions into SOA.
    关键词:电子信息;信息安全;网络安全;面向服务;体系结构
  • 5104.基于车辆运营系统的数据收集

    [信息传输、软件和信息技术服务业,交通运输、仓储和邮政业] [2013-12-13]

    This demonstration report describes the data collection, processing and analysis of cued-interrogation data collected with Sky Research's SKY3D vehicular platform at the Pole Mountain Target and Maneuver Area (PMTMA), near Laramie, WY. SKY3D integrates a MetalMapper sensor, real-time-kinematic global positioning system and inertial measurement unit (in the form of the Novatel SPAN) and a custom user interface on a Kubota all-terrain-vehicle. Cued interrogation data were collected by dwelling for 30 seconds over 2,370 anomalies previously identified via a full-coverage geophysical survey of part of the Bisbee Area of PMTMA. The data collection was conducted in the field over a 14 day period in July and August 2011. Production rate was as high as 39 points per survey hour with a maximum of 326 anomalies visited in a day. In this demonstration report we evaluate eight identified performance metrics for the technology including four pertaining to the data collection (reliability/robustness, survey rate, percentage of site covered, MetalMapper sensor position accuracy) and four to the subsequent processing and classification of the collected data (percentage of munitions correctly identified, reduction in false-alarm rate, appropriate specification of stop- dig point and minimization of 'can't analyze' anomalies). Six of the eight performance objectives were easily achieved, while one objective, 90of MetalMapper positions within 30 cm of each Target of Interest (TOI), was missed by 1 cm (90th percentile at 31 cm). The last and only qualitative objective on reliability/robustness was only partially met due to the electrical issues with the orientation sensor on the Novatel SPAN.
    关键词:电子信息;系统;车辆运营;数据收集
  • 5105.立足于个人计算机安全的虚拟机监控程序:机构研究议程

    [信息传输、软件和信息技术服务业] [2013-12-13]

    The purpose of this paper is to propose the creation of a security- enhancing hypervisor for PCs as a collaborative agenda for the research community. This agenda is not necessarily about answering fundamentally new research questions. Rather, it is a call to action about a rare chance for the community to have substantial impact. If researchers demonstrate compelling near-term benefits from a modest security layer, then OS vendors may adopt such a layer as a way to increase security without costly reengineering. The introduction of this secure foothold into the consumer software stack could then yield significant long-term benefits by providing a much better avenue for deploying security solutions. This agenda consists of two parts: (1) exploring how hypervisors can address end-user security issues and (2) exploring how to architect a small, secure hypervisor that provides several of these facilities. We believe that there are interesting and worthwhile challenges in both parts. The rest of this paper is organized as follows. We begin by explaining why hypervisors provide a highly attractive insertion point for security (Section 2) and summarizing work in this area (Section 3). We then discuss security facilities that a hypervisor can provide in Section 4, with a focus on trusted paths to online services. We conclude by discussing challenges associated with our proposal in Section 5.
    关键词:电子信息;信息安全;网络安全;虚拟机;监控
  • 5106.网络安全

    [信息传输、软件和信息技术服务业] [2013-12-13]

    There are many common misconceptions on the objective, efficiency, and use of security on the Internet in general, and the Web in particular. This has directly contributed to the lack of real security in applications and services in the past. Well documented vulnerabilities and attacks have undermined the average user's confidence in the Internet. This trend will continue until better security tools are made available and safer computing is practiced by administrators and end users.
    关键词:电子信息;信息安全;网络安全
  • 5107.安全的群体内部的时间同步技术来改善基于组的无线传感器网络的安全性和性能

    [信息传输、软件和信息技术服务业] [2013-12-13]

    Time synchronization is required in wireless sensor networks in order to improve its performance. This improvement could be noticed in terms of energy, storage, computation, shared resources or bandwidth. One of the main applications in WSNs has been to decrease the energy consumption. A wireless network can save energy with this feature, but if this synchronization is corrupted, it could cause a worse behavior. Firstly, we will analyze which are the most important time synchronization issues. Then, a secure time synchronization method will be presented for group-based wireless sensor networks to avoid malicious attacks. The synchronization technique is based on a system model for secure intra-group synchronization. This system will use simple messages, where nodes of each group will exchange several parameters like time stamps, groupID, etc. in order to make a secure system. The system proposed has high scalability, due to group-based feature, while saves energy thanks to the designed synchronization technique. In order to test our proposal we will simulate several situations to show the performance of our synchronization algorithm.
    关键词:电子信息;信息安全;网络安全;无线传感器;时间同步技术
  • 5108.城市和交通数据系统,2012年

    [信息传输、软件和信息技术服务业,交通运输、仓储和邮政业] [2013-12-13]

    The report consists of 20 papers that explore patterns of use of transport modes; regional traffic congestion; the detection layout problem; multisensor data integration and fusion; commuters' demographic characteristics; average travel time estimates; short-term travel time prediction; vehicle reidentification and travel time estimation; travel time reliability; route-specific origin-destination tables; travel time data quality; fixed-point and probe-based detection systems; aggregate loop detector data; traffic ground truth estimation; video detection data; annual average daily traffic volume; estimating traffic speeds; travel times; lidar-based vehicle classification; and thermal image video sensors.
    关键词:电子信息;系统;交通数据
  • 5109.EPS/LTE和WLAN/802.11的安全性比较研究

    [信息传输、软件和信息技术服务业] [2013-12-13]

    Security in the wireless access network gained increasing interest over the last years. Its implementation varies from one access network to another. The current trend in wireless access network is towards implementing mechanisms for mobility management namely handoff process and quality of service control. Consequently, security should be taken into consideration at each handoff process which may occur between different technologies (inter-technology) or within the same (intra-technology). At the same time, security provisioning impact on network performances (e.g. end-to-end delay, throughput) should be controlled. This chapter aims to give a better understanding of security measures and protocols available in two distinct wireless network families, namely the Wireless Wide Area Network (WWAN) and the Wireless Local Area Network (WLAN). WWAN family includes the wide coverage area technologies such as the Long-term Evolution (LTE), also named as Evolved Packet System (EPS). On the other hand, WLAN are characterized by having a small coverage area. It includes the WiFi (802.11) technology. Each time, the chapter highlights the mechanisms employed by access network to ensure the trade-off between secured mobility and application requirements in terms of delay and throughput.
    关键词:电子信息;信息安全;网络安全;EPS / LTE;WLAN / 802.11
  • 5110.使用安全监视系统事件的网络威胁预测模型

    [信息传输、软件和信息技术服务业] [2013-12-13]

    There was a large scale of DDoS(Distributed Denial of Service) attacks mostly targeted at Korean government web sites and cooperations on March 4, 2010 (3.4 DDoS attack) after 7.7 DDoS on July 7, 2009 in South Korea. To detect and respond to them, malwares must first be detected by security monitoring system. In particular, availability of a method to detect and predict such malwares in advance will lead to preventing security incidents. This study will propose a method of prediction based on security monitoring event in Security Monitoring system and a functional configuration to realize the method and will assess the prediction model based on security monitoring events proposed through a test consisting of the stages of learning, prediction and evaluation.
    关键词:电子信息;信息安全;网络安全;监视;网络威胁
首页  上一页  ...  506  507  508  509  510  511  512  513  514  515  ...  下一页  尾页  
© 2016 武汉世讯达文化传播有限责任公司 版权所有 技术支持:武汉中网维优
客服中心

QQ咨询


点击这里给我发消息 客服员


电话咨询


027-87841330


微信公众号




展开客服