The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Energy and carbon issue have gained a lot of attention in recent years. However, energy management and services of electric bicycles based on international standards are not very common. This work uses communication standards, including Energybus, MQTT and Bluetooth 4.0 to design an energy management service platform. We implement a system that integrates electric bicycles, smart mobile devices and...
Multi-agent consensus has been widely applied in engineering. The multi-agent consensus problem is studied in this paper. The protocol based on the event-triggered control is presented. The stability of the system is proved. The decay factor is introduced to the threshold function. Then the relationship between the decay factor and the trigger frequency, the convergence time and the inter-event time...
Convolution neural network (CNN) has been shown as one of state-of-the-art approaches for learning face representations. However, previous works only utilized identity information instead of leveraging human attributes (e.g., gender and age) which contain high-level semantic meaning. In this work, we aim to incorporate identity and human attributes in learning discriminative face representations through...
Infrastructure as a Service (IaaS), basically consists on the deliverance of virtual machines (VMs) to an IaaS provider, who can rise or shrink the number of VMs so as to offer fast and easy scalability according to variable workloads. However, according to the principle of Buckets Effect, the safety of the entire system relies on its most fragile component. This problem also exists in IaaS cloud...
In this paper an intelligent campus security tracking system (iCST) has been designed and implemented base on the RFID and ZigBee network. iCST reads the RFID tags data through FRID&ZigBee node, and then sends it to PC node by a custom wireless protocol on the ZigBee. PC node gives corresponding warning or hints by the result of matching master-slave RFID tag information. When the warning occurs,...
The publication and discovery of web service is one of the most important issues in Service-oriented architecture. The common Universal Description, Discovery, and Integration (UDDI) still has some defects, such as register information can be invalidated since it is not able to update actively, its centralized approach leads to a high cost of server, and service providers can't delete register information...
This paper proposes a design and implementation scheme of a general data link layer interface for embedded web server, which based on ARM7 and RTL-8019 NIC (network interface controller) hardware platform. The design aims at the characteristics that the embedded system is resources restricted and reduced any unnecessary operation process for improving the response speed of the web server. The logic...
Feedback-based error-resilient video coding relies on efficient transmission of feedback messages. The Audio-Visual Profile with Feedback (AVPF) for Real-time Transport Control Protocol (RTCP), i.e. RTP/AVPF, supports low-latency feedbacks. In this paper, a reference picture selection (RPS) method using RTP/AVPF-compliant feedback is proposed. A restriction period is first derived in the codec layer...
Data aggregation in wireless sensor networks eliminates data redundancy, thereby improving bandwidth usage and energy utilization. This paper presents a data aggregation algorithm, called MRDWA (Multi-Role Dynamic Weighting Aggregation), it mainly used in event driven WSN (Wireless Sensor Networks). MRDWA is based on cluster topology structure, and use different data aggregation algorithm according...
As an emerging model for new enterprise data centers, the cloud paradigm provides a disruptive market opportunity to better utilize computing resources and reduce IT complexity. To provide the cloud computing service, the provisioning of the cloud infrastructure in data centers is a pre-request. However, the provisioning for systems and applications on large number of physical machines is traditionally...
More and more of wireless sensor networks (WSN) are proposed in the past years. However, due to the differences of protocols between WSN and Internet, data exchange with these heterogeneous networks is a serious issue. In this paper, we propose an architecture, named IAPA (integrated wireless access point architecture) for WSN, that amended WLAN AP to convergence the heterogeneous networks. It is...
Modern software model checkers are usually used to find safety violations. However, checking liveness properties can offer a more natural and effective way to detect errors, particularly in complex concurrent and distributed e-business systems. Specifying global liveness properties which should always eventually be true proves to be more desirable, but it is hard for existing software model checkers...
With the increased interest in the Web services composition, more and more enterprises and businesses depend on this paradigm. Open, distributed and dynamic properties of the schema, there is a pressing need for secure services in daily transactions. Orchestration and choreography language provide basic services standards and interaction, collaboration, and negotiation standards among services, but...
There is a pressing need for secure services composition in agenda transactions. Orchestration and choreography language provide basic services and interaction, collaboration, and negotiation standards among services, but they don't give any secure manners or secure operation styles and specifications. Despite the interest of such security mechanisms, a formal module of them is still lacking. For...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.