首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
The economy, national safety, and health care are tremendously dependent on the faithful supply of power. The communication technology integration and sensors in power systems have been authorized as a smart grid (SG) that is revolutionizing the model of power generation, distribution, monitoring, and control. To know the Smart Grid compatibility, many problems are required to be directed. The safety of the smart grid is the most challenging function and very crucial difficulties. This paper proposed, a safe demand-side management machine deploying machine learning for the Internet of Things authorized phase is recommended. The propounded demand-side management (DSM) machine protects the effective energy use based on their preferences. A particular flexibility sample was proposed to manage incursion into the smart grid. Anelastic agent prognosticates swindling companies, the ML classifiers are utilized. Promoted power management and intermediate control companies are recommended for processing power data to improve energy usage. The proposed project's effective simulation is implemented to examine the efficiency. The outcome of the analysis discloses that the planned demand-side management (DSM) machine is less susceptible to the incursion and it is sufficient to decrease the smart grid's energy consumption.  相似文献   

2.
A secure and traceable E-DRM system based on mobile device   总被引:1,自引:0,他引:1  
In recent years, intellectual property violation events have caused enterprise to respect digital content protection. Illegal copying digital content abuses become a serious problem. Because the mobile devices are more portable and individualized than personal computers, anyone can access the network resources at anytime from anywhere. However, valuable digital contents without proper protection make the content vulnerable to unauthorized copying, modification and re-distribution, causing revenue losses to service providers. Thus, constructing an effective Digital Right Management (DRM) system has become an important issue.On the basis of the mobile device, we propose an efficient digital rights management protocol. We apply symmetrical cryptosystem, asymmetrical cryptosystem, digital signature and one-way hash function mechanisms in our scheme. To overcome the computing resource weakness problem of mobile devices, we also integrate digital certificate, hardware information and one time password mechanisms such that the security, persistent protection, integrity, authentication, track usage of DRM work, changeable access right, integration and portability issues will be assured. In this way, the mobile user can access the digital content securely in the enterprise via authorization mechanism.  相似文献   

3.
The application of ICT technology to agriculture has raised interest in smart farm systems that can remotely manage growing environments. Data transmission in smart farm systems uses wireless networks such as ZigBee and Wireless LAN and TCP/IP based wired networks. And also use the P2P network to share smart farm system data with other smart farm systems. There are security vulnerabilities that may arise in information communication environment in smart farm system unlike traditional farms, the smart farm system automatically stores and manages data for growth environments such as temperature, humidity, and CO2. Therefore, an attacker can use a security vulnerability to manage temperature, humidity, and Co2, which can cause significant damage. In this paper, we propose an authentication method that performs minimum encryption and decryption operations by combining session key and public key to securely control smart farm system. The proposed authentication method reduces the encryption/decryption time, the registration time, and facilitates the use of the smart card with low computing performance by using the session key compared with the existing authentication method.  相似文献   

4.
Now-a-days advances in mobile device technology aim to build complex computational systems providing a maximum level of flexibility, decentralization, simplest form of interactivity, and ease of use. Recently, the launch of the agent-oriented platform JaCaMo and its Android client based platform JaCa-Android have provided an appropriate level of abstraction to build smart mobile client server systems providing these attributes. By using these platforms, we have developed a multi-agent based Smart Mobile Virtual Community Management System (SMVCMS) that makes it possible to provide a decentralized and open management of virtual communities. This paper addresses the design and architecture of our multi-agent server and client application. It elaborates different features of our system; such as how a participant in virtual communities is supported by a Jason agent that encapsulates the logic and the control of the participation in a virtual community (such as publishing posts, notifying members, making recommendations for the user, etc.). It also discusses how the set of CArtAgOartifacts provides the basic functionalities and operations giving access to the functionalities for knowledge exchange in virtual communities, and personal agents onAndroid exploit these artifacts to execute their tasks while achieving their individual and collective goals. We have employed SMVCMS in the context of Smart Cities and found that the system fulfills the desired goals, such as decentralization of community management, personalized automatic management and discovery of communities, autonomy of agents and flexibility so that any agent can create its own community with the maximum level of ease.  相似文献   

5.
6.
增强智能手机安全的动态恶意软件分析系统   总被引:1,自引:0,他引:1  
分析了智能手机上恶意软件的现状和发展趋势,给出了当前防范手机恶意软件的措施及其不足之处.适应大多数手机用户的安全需求,提出了一种能够满足增强智能手机安全的方案--移动动态恶意软件分析系统.给出了恶意软件分析模块的具体设计和整个分析系统的实现构思.最后,指出了分析系统的不足并提出解决方法.智能手机恶意软件的现状使该方案具有很好的应用前景.  相似文献   

7.
8.
熊静  张旭  魏建  赵鸣  吴菁  鲍世谊 《计算机应用》2008,28(2):428-431
移动代理在未来的移动商务中具有举足轻重的地位,它能提供更好的灵活性和性能。但也面临着许多新的安全问题。以移动代理和SEMOPS模型为基础,结合现有的移动支付协议,抽象出移动支付系统通用的业务模块,提出了一种新的移动计算环境下通用安全移动支付系统框架。  相似文献   

9.
王国军  廖麟  马好 《计算机应用》2005,25(2):377-380
比较了各种确保安全组播通信的密钥管理算法和方案,针对移动环境下移动频繁、可靠性差的特点,讨论了在RingNet结构下移动因特网的组播密钥管理问题。  相似文献   

10.
As mobile and Internet technologies evolve, mobile services (e.g., Internet banking, social commerce) continuously expand and diversify. In order to use these mobile services, it is essential that security services, especially distribution certificates (e.g., bank certificates), relevant to mobile devices be provided. Some approaches to providing distribution certificates between a user's mobile device and a personal computer (PC) have been proposed. However, the existing approaches do not guarantee that the certificate in the mobile devices same with the issued one from the PC, causing constraints on mobile services such as mobile phone banking and mobile commerce (M-commerce).In this paper, we propose a novel approach that shares certificates securely without modification of the existing standard certificate format between a smartphone and a PC. We also implemented the certificate sharing system (CSS) in a virtual private network (VPN). The CSS provides strong end-to-end data security for the certificate with a key size of 192-bits which is able to guarantee an expiration date of three years. It also provides strong data security on physical devices with the use of device ID. The certificate that is shared between devices is available only through the CSS's authorization process. In addition, the CSS provides a flexible and extensible system for sharing certificates in enterprise environments. The CSS module of a PC was implemented by way of a standard web language, and the CSS module of a smartphone was developed with the assistance of mobile applications with a small size of 1210KB.  相似文献   

11.
New applications of smart devices interacting with other computing devices are recently providing interesting and feasible solutions in ubiquitous computing environments. In this study, we propose an interactive virtual aquarium system that interacts with a smart device as a user interface. We developed a virtual aquarium graphic system and a remote interaction application of a smart device for building an interactive virtual aquarium system. We performed an experiment that demonstrates the feasibility and the effectiveness of the proposed system as an example of a new type of interactive application of a smart display, where a smart device serves as a remote user interface.  相似文献   

12.
13.
Since organizations have recognized needs for industrial technique leakage prevention, they tend to construct industrial security system causing huge consumption of budget, yet many of them are not affordable to organize industrial security team to operate integrated industrial security management system with consistent investment and maintenance. It is fact that there only occur instant introductions of certain system. In this study, we designed industrial security management model for organizations’ industrial technology leakage prevention which is differentiated from those of large enterprises based on current status of small and medium-sized organizations’ industrial technology leakage. Specifically we analyzed current status and vulnerability of organizations’ industrial technique leakage and we designed industrial technique leakage prevention management system for organizations. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that organizations may estimate an appropriate level of investment on industrial security and develop countermeasures for control by utilizing this study result.  相似文献   

14.
从网络适应性、接入方式多样性、接入平台多种类的移动接入需求入手,针对移动安全接入现有的缺点,提出了基于用户的接入控制和管理技术,给出了接入认证方案.并采用一体化的方法,设计了移动安全接入的体系结构,实现了一种新的一体化移动安全接入系统,解决了基于移动通信和互联网的接入安全问题.  相似文献   

15.
We have developed an approach to implementing a system for managing situated knowledge for complex instruments. Our aim is to develop a system that guides a user through the steps for operating complex scientific instruments. A user manual is often inadequate support for a community of users, so direct communication with an expert is often required. One reason for this is that not all of the author’s expert knowledge was included in the manual, thus limiting the contents to explicit knowledge. This is a main concern of modern knowledge management practitioners who are attempting to design systems that consider both explicit and tacit knowledge. The key is to distribute explicit knowledge through interaction with the real world so that users can develop tacit knowledge as well as acquire explicit knowledge. We describe technical difficulties related to referencing the real world, which is required for interaction, and describe a novel approach to building a low-cost three-dimensional pointer for obtaining the required knowledge, which constitutes our preliminary result.  相似文献   

16.
结合临床护理工作和物联网的特性,明确了移动护理系统的研发目标,研究设计一种新的移动护理通用架构及其最小标准功能集.该通用架构已在浙江大学医学院附属邵逸夫医院试行并初见成效.  相似文献   

17.
本文提出了一种保护移动Agent不受Agent平台攻击的旅行协议.该协议基于Agent旅行的历史记录,在一定的条件下允许Agent所有者检测对Agent代码、状态和执行流的非法篡改.这个协议具有很高的安全性能,能够检测旅行途中的Agent平台时Agent数据的篡改,能够防止重播攻击.  相似文献   

18.
本文提出了一种保护移动Agent不受Agent平台攻击的旅行协议。该协议基于Agent旅行的历史记录,在一定的条件下允许Agent所有者检测对Agent代码、状态和执行流的非法篡改。这个协议具有很高的安全性能,能够检测旅行途中的Agent平台对Agent数据的篡改,能够防止重播攻击。  相似文献   

19.
随着火电厂信息化建设的快速推进,工控系统将实现高度数字化和智能化,对传统控制系统的计算、存储以及安全防护能力提出了较高的要求。基于中国电子PK体系,提出一种自主安全可信的智能电厂控制系统构建方案,通过云边协同机制,有效提高工业控制系统的边缘计算能力和基于自动预判、自主决策的智能化水平;进一步基于网络安全防护规定,提出了云-网-端一体化的积极防御体制。  相似文献   

20.
Wireless mobile services are computing applications that run on handheld wireless devices. Such applications must work within the daunting constraints of the devices, which include memory, processing power, input capabilities, and size of display. It is therefore important that mobile services take into account the user’s context, optimize resource usage, and minimize input effort imposed on the user. In this paper, we present the design and implementation of a smart agent-enabled system for personalizing wireless mobile services and advertisements for Java 2 Micro Edition (J2ME) or Java ME, and Wireless Application Protocol (WAP) enabled devices. We use software agents for context filtering because such autonomous software entities have characteristics that can benefit mobile devices and the wireless environment, and the Composite Capability/Preference Profiles (CC/PP) standard for defining profiles for user preferences and device capabilities. The system incorporates the use of artificial neural networks to adaptively and iteratively learn to select the best available service based on contextual information. The system is evaluated using practical operating scenarios, as well as empirical data and results show an 87% success rate in the selection of the best available service.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号