This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluat...This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.展开更多
A fast authentication mode based on Multi-Block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of the aut...A fast authentication mode based on Multi-Block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of the authentication modes in common use (for example, cipher block chaining-message authentication code mode). The dependence test results meet the requirement. The MBC mode is complete; its degree of ava-lanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the MBC mode has uniformity. The binary matrix rank test results imply that it is linear independent among disjoint sub-matrices of the output. Maurer’s universal statistical test results show that the output could be significantly compressed without loss of information. Run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test and random excursions variant test results fulfill the requirements of all. Therefore the MBC mode has good pseudo-randomness. Thus the security of MBC mode is verified by the way of statistical evaluation.展开更多
This paper aims to present and discuss the use of a power flow methodology based on Gauss elimination method to evaluate the performance of distribution network taking into account the neutral conductor absence at spe...This paper aims to present and discuss the use of a power flow methodology based on Gauss elimination method to evaluate the performance of distribution network taking into account the neutral conductor absence at specific sections, and a development of a methodology based on GA (genetic algorithm) capable of evaluating alternative solutions in different bars of the feeder, in order to propose appropriate solutions to improve the distribution network safety. Besides the technical aspects, the proposed GA methodology takes into account the economic feasibility analysis. The results of power flow simulations have shown that the presence of single-phase transformers along with the absence of the neutral conductor at specific sections of the MV (medium voltage) network may increase the Vng (neutral-to-ground voltage) levels of the feeders involved, jeopardizing the system's safety. On the other hand, the solutions proposed by the GA methodology may reduce the network Vng levels and improve the safety conditions, providing values close to the ones found before the neutral conductor theft.展开更多
文摘This paper first describes the basic theory of BP neural network algorithm, defects and improved methods, establishes a computer network security evaluation index system, explores the computer network security evaluation method based on BP neural network, and has designed to build the evaluation model, and shows that the method is feasible through the MATLAB simulation experiments.
基金Supported by the National Hi-Tech Research & Devel-opment Plan of China (863 Project) (No.2003AA143040) and Jiangsu Provincial Key Laboratory of Network & Information Security (No.BM2003201).
文摘A fast authentication mode based on Multi-Block Chaining (MBC) is put forward; and its security is proved. The MBC mode is for new generation block cipher algorithms. Its speed is about 13% faster than that of the authentication modes in common use (for example, cipher block chaining-message authentication code mode). The dependence test results meet the requirement. The MBC mode is complete; its degree of ava-lanche effect is about 0.9993; its degree of strict avalanche criterion is 0.992 or so. The frequency test results indicate that the output generated by the MBC mode has uniformity. The binary matrix rank test results imply that it is linear independent among disjoint sub-matrices of the output. Maurer’s universal statistical test results show that the output could be significantly compressed without loss of information. Run test, spectral test, non-overlapping template matching test, overlapping template matching test, Lempel-Ziv compression test, linear complexity test, serial test, approximate entropy test, cumulative sums test, random excursions test and random excursions variant test results fulfill the requirements of all. Therefore the MBC mode has good pseudo-randomness. Thus the security of MBC mode is verified by the way of statistical evaluation.
文摘This paper aims to present and discuss the use of a power flow methodology based on Gauss elimination method to evaluate the performance of distribution network taking into account the neutral conductor absence at specific sections, and a development of a methodology based on GA (genetic algorithm) capable of evaluating alternative solutions in different bars of the feeder, in order to propose appropriate solutions to improve the distribution network safety. Besides the technical aspects, the proposed GA methodology takes into account the economic feasibility analysis. The results of power flow simulations have shown that the presence of single-phase transformers along with the absence of the neutral conductor at specific sections of the MV (medium voltage) network may increase the Vng (neutral-to-ground voltage) levels of the feeders involved, jeopardizing the system's safety. On the other hand, the solutions proposed by the GA methodology may reduce the network Vng levels and improve the safety conditions, providing values close to the ones found before the neutral conductor theft.