The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To realize real-time online detection of heavy metal pollution in aquatic environment, a new type of remote monitoring system was designed. The System mainly consisted of monitoring terminal, gateway, GPRS network and PC control center software. First, the concentration of heavy metal ions was detected by monitoring terminal through ion selective electrode array and the automatic compensation method...
In this paper, it presents E-RBAC model expanded on the traditional RBAC. The E-RBAC model has two ways of user authorization and introduces user group, module, role priority, it improves the system security and flexibility, reducing the complexity of the permission assignment. The expanded RBAC model can be easily applied to other information systems, now it has practical significance in the management...
Being aimed against to the software reusability and interoperability, we design a metadata-driven information management system. when developing a new application, we can search quickly, locate, and reconstruct on existing IT resources by meta-data description, discovery, mapping and conversion. In the three-tier architecture based on the SSH, we implement B/S model of information management systems...
This paper have designed a kind of UHF RFID based on ISO/IEC 18000-6B standard and supporting multiple fieldbus. Hardware were mainly introduced from the reader hardware and fieldbus control module circuits, and software were respectively introduced from system master programs and bus receiver and launching system software. With the development of RFID, developing supporting fieldbus UHF RFID has...
The paper present a method utilizing power variation to predict the topology changing and link state which are used to improve ODMRP Multicast Routing Algorithm. The improved protocol reduces the routing failure number and the delivery delay and enhances the performance of network in frequently changing topology conditions.
The wireless sensor network is composed of many low price sensor nodes, these sensor nodes form multi-hop wireless network and complete the large-scale sensing task in cooperation. The wireless sensor network has a widespread application prospect, it has attracted people's universal attention. In this paper, the traditional wireless sensor network's routing algorithm is analyzed and a directed routing...
People are paid more attention on Intrusion detection which as an important computer network security technology. According to the development trend of intrusion detection, Detecting all kinds of intrusions effectively requires a global view of the monitored network, we are developing a new intrusion detection mechanism based on cloud computing, which can make up for the deficiency of traditional...
Background processing technology is the overall protection of cloud computing system. Large-scale data processing technology plays a key role in background data collection and arrangement of the cloud computing. Google's MapReduce programming mode is a parallel programming model, widely used in processing and generating large data sets, and its scheduling mechanism is an important part of the model...
The QR code is a kind of two dimensional barcode, and is invented by a Denso-Wave company in Japan. QR comes from the abbreviation of “Quick Response”, and it can recognize in all locations. This article describes the basic principle and algorithm of distortion and geometry revision on images when QR is recognizing. Then according to the symbol structure of QR code, a effective method of getting image...
Wireless mesh networks (WMN) are receiving increasing development, which configuration multi-radio multi-channel nodes to improve channel resources utilization in the network topology architecture and achieve increasing efficient on the network throughput. The main goal of channel assignment algorithms in multi-radio multi-channel wireless mesh networks is to minimize the overall interference and...
Wireless Mesh networks (WMNs) is a new wireless network with great potential application, its security is also affected by people's attention. Establishing a distributed virtual CA is an important tool to ensure the security of the wireless mesh networks. In these scenarios, several nodes jointly reserve the system's private key. This article proposes a RSA key sharing scheme based on dynamic threshold...
With the stepping up of information technology in military, information is increasingly playing a key role which enhance efficiency for military command, training, battle. Connecting With the military networks among in army universities, research institutes, the size of the military information network is rapidly expanding, while the Hidden danger of information security also increase with the virus...
In wireless sensor networks (WSN), the measurement data of the neighbor nodes often have little differences. In view of this situation, a new algorithm called NNA based on layered routing protocol is proposed. By comparing the measurement data of the node with the cluster head's, if the difference of the data value is less than the threshold value set by the system, then the node will join to the...
At present, the UAV as the tactical communications relay played an important role in Battlefield Communication Support. The future development of UAV Ad Hoc network technology will provide the necessary technology to ensure the cooperative engagement of multi-UAV and its further integration into the battlefield communications network. This article begin with introduction to the UAV and the Ad Hoc...
In recent years, security risks of equipment are very prominent. In order to ensure normal operations, equipment inspection is required to standardization. Information technology is an important means of ensuring the safe operation of equipment. In this paper, a new equipment inspection system based on Zigbee is presented. This system is composed of data management center, wireless gateway, wireless...
Cloud Computing is developing as a key computing platform for sharing resources. How to effectively route storage resource in cloud is so difficulty. This paper presents Cloud Computing Dynamic Route Scheduling for Optimization of Cloud Database for enhancing the efficiency searching database of cloud computing.
As the next generation of computing architecture, cloud computing provides a variety of cloud services and has been used by more and more customers. As the access to the server is increasing, centralized computing architecture will produce bottlenecks, affect the quality of cloud computing services and bring the much inconvenience to users. This paper proposes a P2P Cloud architecture to improve on...
There exists faulty nodes in wireless sensor networks nodes, the existence of them can effect the localization accuracy, at the same time, traditional DV-HOP algorithm merely use the connectivity information between nodes, thus it may underutilize the proximity information available from neighborhood sensing. According to this, DV-RSD localization algorithm based on FIND is proposed in this paper...
Due to the characteristics of energy-limited, how to reduce the energy consumption of the wireless sensors network has become the crucial point. Research shows that it can reduce energy consumption to organize the nodes in the network into a hierarchical cluster structure. This paper synthetically analyzes several existing cluster algorithms, and then proposes an energy-efficient and variation-sensitive...
For barrier coverage issue of wireless sensor network, we propose a deployment scheme of sensor nodes for intrusion objects whose trajectory could be predicted. We provide the theoretical foundations for our scheme, and then analyze availability and reasonableness of our proposal from the perspective of the algorithm. This program only needs to activate nodes which are on the maximum probability path...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.