首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 31 毫秒
1.
2.
3.
4.
5.
A commonly used method for achieving a prescribed security level in a telecommunication network is to manage extra capacities all over the network. This paper describes a number of computational methods, both exact and approximate, for determining a minimum cost network of extra capacities needed to achieve security under any given trunk dimensioning, routing and grouping policy. From a mathematical point of view, it is shown that the problem reduces to the determination of a minimum cost network subject to a number of non simultaneous multicommodity flow requirements. Since real life instances of such problems commonly result in very large linear programs of many thousands of variables and constraints, the techniques of linear programming would be unacceptably time and space-consuming. Instead, it is shown how the use of Lagrangean relaxation in conjunction with sub-gradient optimization schemes can lead to efficient and easy-to-implement solution methods. The various procedures described in this paper form the heart of a general software product for long and medium term planning applications (Supersec program) which has already been used to investigate the economical implications of security requirements in telecommunication networks.  相似文献   

6.
7.
8.
9.
10.
11.
12.
Alain Azoulay 《电信纪事》1984,39(5-6):221-232
This paper presents the work being carried out in the Emc field for the new telecommunication terminals so that the french telecommunications network should not be disturbed and a good service quality could be maintained even in presence of high level radio frequency ambients.  相似文献   

13.
14.
15.
Generally, an intruder must perform several actions, organized in an intrusion scenario, to achieve his or her malicious objectives. Actions are modeled by their pre and post conditions, which are a set of logical predicates or negations of predicates. Pre conditions of an action correspond to conditions the system’s state must satisfy to perform the action. Post conditions correspond to the effects of executing the action on the system’s state. When an intruder begins his intrusion, we can deduce, from the alerts generated byidss (Intrusion Detection Systems), several possible scenarios, by correlating attacks, that lead to multiple intrusion objectives. However, with no further analysis, we are not able to decide which are the most plausible ones among the possible scenarios. We propose in this paper to define an order over the possible scenarios by weighting the correlation relations between successive attacks composing the scenarios. These weights reflect to what level executing some actions are necessary to execute some action B. We will see that to be satisfactory, the comparison operator between two scenarios must satisfy some properties.  相似文献   

16.
The propagation constant of a line or a cable, and its characteristic impedance represent two parameters which are needed in order to calculate the variation as a function of the time of a current induced by an emp.For the aerial lines expressions which take into account the presence of the soil could be developed but the case of the buried conductors is of a more difficult approach. The aim of this study is to present solutions introduced by different authors and to compare them with a calculation method for the propagation constant using iterations, proposed by the authors. If this value is known it is shown that the characteristic impedance calculation of buried cables can be improved by avoiding the necessity to compute with a reasonable precision the impedance of the ground.  相似文献   

17.
The purpose of this paper is to evaluate theoretically and experimentally the transient electric field in anemp simulator. Using a time domain analysis, the mechanism of the field deformation can be analysed and consequently modifications can be introduced in the conception of new simulators (for example: rhombic simulator).  相似文献   

18.
19.
This paper aims to contribute to studies related to visual handicap in order to reduce/eliminate it with new technologies. It addresses shortly the main principle of 3D world human perception, the main rules for environmental pertinent data acquisition and their processing. The proposed state of art on blind people travel assisting aids (taa) allow to understand the requirements for new aids design. A few examples of research project show how solution from new information technologies (such as artificial vision, virtual reality, high densityvlsi, tactile systems, GPS, wireless networks, etc) can be integrated in new systems. These examples allow also to determine which concepts should be targeted when designing any new travel assistance for blind people autonomous and safe displacement, and to characterise new devices.  相似文献   

20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号