The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently, the widely deployed Wi-Fi devices generally reside in three non-overlapped channels, resulting in severe co-channel interference and performance deterioration. The avoidance of using Partially Overlapped Channels (POC) is mainly because of the complicated interference effects among them, which has not been well studied. In this paper, we build an OpenWrt based Wi-Fi interference measurement...
With the rapid development of the cloud computing, personal health record (PHR) has attracted great attention of many researchers all over the world recently. However, PHR, which is often outsourced to be stored at a third party, has many security and efficiency issues. Therefore, the study of secure and efficient Personal Health Record Scheme to protect users' privacy in PHR files is of great significance...
Residential wireless networks have grown rapidly in the past decade. Meanwhile, dense deployments and autonomous managements of home Access Points (APs) greatly increase channel congestion levels and degrade the user experience. To address such problems, this paper proposes an architecture in residential environments called Wi-Fi Union (WU), where home APs can voluntarily join WU and become "member...
Network calculus is a powerful methodology of characterizing queueing processes and has wide applications. In this work1, we focus on the fundamental problem of “under what condition can we derive stable backlog bounds using the current state of art of stochastic network calculus”. We model an network element (called a “node” here) as a single server with impairment service based on two best-known...
Real estate early warning system must be established rightly in the condition of rapid expanding for real estate market. This paper introduces how to construct real estate real estate information release platform, which is based on system architecture of ArcGIS server, a distributed WebGIS application development kit. Mechanism of geospatial data sharing is focused on web services, which is based...
Measuring instruments vary from one another in classification, name and attributes; therefore it is crucial to precisely manage the measuring instruments information and store them properly. For this reason, a distributed measuring instrument information management system is designed and implemented. The system uses the three-layer C/S structure and is built upon the .NET platform. The background...
Nowadays, all of library management systems for CDs attached to books are running independently: independent devices, independent systems, and making CD images independently. That brings huge waste of investment and labor. In this paper, we redesign the management system for CDs attached to books based on Cloud Computing. By comparing and analyzing the two systems, we can see that the system based...
Kerberos protocol is a famous identity authentication protocol and it is widely used in the network as a standard. But there is still not a strict proof of it base on the Formal method. That is very nervous for the users. So a security analysis of the Kerberos protocol using BAN logic is proposed in this paper, and the reliability, practicability and security of Kerberos protocol are proved.
Considering servers being the core position in network, this paper introduces how to monitor servers through simple network management protocol (SNMP). We expand MIB resources by defining MIB objects to monitor the resources of sever, and use multi-threading technology to collect data and process them, which can improve the collection efficiency. The experimental results prove that it is a successful...
As the Internet continues to grow; it becomes more and more apparent that the network is playing a more and more vital role. The traditional network managements just monitor the network movements and the network devices. But the network servers occupy to the core status in the network. Aiming at the network server monitor and management, we proposed a server monitor solution which is based on the...
In view of the present network management situation, in order to guarantying the network which can provide normal services, it is necessary to monitor the running state of network servers for its core status in the network. In this paper, a framework has been given, in which network-server management system was designed as Web-based proxy manager three-layer construction. By analyzing the simple network...
In a mobile network system at campus (MNSC) based-on SMS, a server is the gateway to connect databases with clients which sends requests and receives responses. This paper analyzes the procedure of designing and realizing MNSC with an academic querying system as an example. The SMS in campus based on J2ME introduced in this paper, differed from the one-way delivery of information, is the request and...
Getting on line via cell phones is becoming more and more popular nowadays, while many companies or organizations have begun to provide services of mobile searching. On the basis of vector space model, the custom-built user profile and the automatic user profile are combined to a new technology approach, which is called optimized Intelligent Query Algorithm. The algorithm makes use of the structure...
Phishing often causes more financial damages to enterprises and users than virus and worms. Proposed techniques so far mostly are to provide protection for the banks or other enterprise corporations and/or require changes in Web servers. Regular home users are left without protection against phishing, other than the traditional rudimentary email filtering. Furthermore, security toolbars on browsers...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.