Results 11 - 20 of 2566
Results 11 - 20 of 2566. Search took: 0.028 seconds
|Sort by: date | relevance|
[en] We study the attack vulnerability of network with duplication-divergence mechanism. Numerical results have shown that the duplication-divergence network with larger retention probability σ is more robust against target attack relatively. Furthermore, duplication-divergence network is broken down more quickly than its counterpart BA network under target attack. Such result is consistent with the fact of WWW and Internet networks under target attack. So duplication-divergence model is a more realistic one for us to investigate the characteristics of the world wide web in future. We also observe that the exponent γ of degree distribution and average degree are important parameters of networks, reflecting the performance of networks under target attack. Our results are helpful to the research on the security of network.
[en] This report provides a brief overview of several reliable Internet resources concerning food toxicology. Some helpful Internet resources have been identified on the basis of quality criteria, of their relevance and the languages availability. The report includes four topic areas, the first provides a brief description of international resources, the second focuses on European resources, the third provides a description of some national resources and the last is a short overview of some databanks available on web
[en] Internet is often used for transaction based applications such as online banking, stock trading and shopping, where the service interruption or outages are unacceptable. Therefore, it is important for designers of such applications to analyze how hardware, software and performance related failures affect the quality of service delivered to the users. This paper presents analytical models for evaluating the service availability of web cluster architectures. A composite performance and availability modeling approach is defined considering various causes of service unavailability. In particular, web cluster systems are modeled taking into account: two error recovery strategies (client transparent and non-client-transparent) as well as two traffic models (Poisson and modulated Poisson). Sensitivity analysis results are presented to show their impact on the web service availability. The obtained results provide useful guidelines to web designers
[en] At Belle II, detector signals are digitized inside or near the detector and collected via high-speed optical serial links. Each frontend digitization board equips an FPGA for a unified data link and timing system interface to receive the system clock, the level-1 trigger, other fast timing signals and to return status signals. Timing signals are serialized and delivered via a commodity category-7 LAN cable, through a tree-structure distribution network made from cascaded 1-to-20 distribution modules. We report the performance of this timing distribution system.
[en] INDRA is the first Information Technology company in Spain and it presents here, through a series of transparencies, its own approach for the remote experimentation architecture for long pulses (REAL). All the architecture is based on Java-2 platform standards and REAL is a totally open architecture. By itself REAL offers significant advantages: -) access authentication and authorization under multiple security implementations, -) local or remote network access: LAN, WAN, VPN..., -) on-line access to acquisition systems for monitoring and configuration, -) scalability, flexibility, robustness, platform independence,.... The BeansNet implementation of REAL gives additional good things such as: -) easy implementation, -) graphical tool for service composition and configuration, -) availability and hot-swap (no need of stopping or restarting services after update or remodeling, and -) INDRA support. The implementation of BeansNet at the TJ-2 stellarator at Ciemat is presented. This document is made of the presentation transparencies. (A.C.)
[en] Nowadays there is a gap due to the absence of an updated and formalized methodology that can be used to assess security levels in WSNs (Wireless Sensor Network) under IoT (Internet of Things) devices in nuclear environments (which are considered hostile environments and require a higher level of security). This gap causes information security professionals to have difficulties in making a broad assessment of the vulnerabilities in their WSNs, with greater concern when coupled with IoT devices. This work aims to present a methodology to evaluate the reliability of the use of levels security with IoT devices for nuclear installations using WSNs. The proposal of the methodology consists of 5 main stages and 21 substage, which are part of the category of a function in groups of cyber security results that are linked to programmatic needs and specific activities of mandatory execution. Understanding so that the security of a WSN considering the current IoT context for nuclear installations is necessary, where important characteristics in these critical environments should be explored (e g., the presence of radioactivity, in addition to the decontamination of materials and equipment, determine access to authorized persons). The application of the defense-in-depth concept of anomaly solution management and prevention against atypical events to provide an effective safety mechanism, ensuring its safe use in these high criticality environments. (author)
[en] JAVA DOOCS Data Display (JDDD) is the standard tool for developing control system panels for the FLASH facility and European XFEL. The panels are mainly started on DESY campus. For remote monitoring and expert assistance a secure, fast and light-weight access method is required. One possible solution is using HTML5 as transport protocol, because it is available on many common platforms including mobile ones. For this reason an HTML5 version of JDDD, running in a Tomcat application server, was developed. WebSocket technology is used to transfer the panel image to the browser. In the other direction, mouse events are sent back from the browser to the Tomcat server. Now thousands of existing JDDD panels can be accessed from remote using standard web technology. No special browser plugins are required. This article discusses the general issues of the webbased interaction with the control system such as security, usability, network traffic and scalability, and presents the WebSocket approach. (author)
[en] On the basis of analysis of the key elements that will affect the Internet Security Information System, the author takes UNIX Operating System as an example, and provides the important stages that must be considered when implementing the Internet Security Information System. An implemental model of the Internet Security Information System is given