The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Off-highway dump truck contains amounts of potential energy and kinetic energy. During the braking process, these two parts are consumed in the form of heat on the braking resistance, and the energy consumption will be about 24 percent of total energy consumption of the Truck. Hence, it is necessary to recover the braking energy. This paper, aiming at the characteristics of electric drive system in...
Transaction logging and snapshotting are techniquesused to deliver durability to the data in in-memory data stores. Absolute durability guarantees are delivered to a system bysequentially recording the transaction logs and snapshots to anon-volatile disk. Recent advancements in database restorationtechniques have given rise to lock-free fuzzy snapshots. Stillthe transaction log that completes the...
Due to high mobility and intermittent connections in vehicular networks, reliable and efficient Vehicle-to-Vehicle (V2V) communication is a challenging task. The Named Data Networking (NDN) paradigm is recently being applied to achieve efficient V2V communication, however, proactive V2V information diffusion conflicts with the receiver-initiated nature of NDN. This paper bridges this gap by exploiting...
In this paper, we propose a novel re-restoration mechanism based on fuzzy fault set under multi-faults in optical transport networks. This new scheme inherits from our already proposed FFS (fuzzy fault set) based restoration mechanism which is a reasonable trade-off between the recovery success rate and the remaining network risk resources. We mainly consider the link faults in the simulation because...
A perpendicular multi-layer (PML) architecture with multiple controllers and a dynamic orchestra plane (DOP) for multi-domain software defined optical networks is proposed in this paper. Cross-domain services with on-demand bandwidth can be deployed via unified interfaces provided by DOP. Practical capture of signal processing and emulation results are presented.
WIA-PA network, which is specified by IEC/PAS 62601 for process automation based on IEEE 802.15.4, is used for industrial monitoring, measurement and control. A novel WIA-PA gateway technology is developed to support EtherNet/IP protocol. By a prototype of wireless gateway, a wastewater treatment system is implemented with a WIA-PA network monitoring subsystem and an EtherNet/IP network control subsystem...
SSL VPN is the simplest solution technology which can be used to access to enterprise resources by remote users. There is no effective access control capacity in SSL VPN system. In this paper, we use UCON model to build a set of fine-grain access control mechanism that is used for SSL VPN system to strengthen its safety performance.
Enterprise collaborative business systems utilize the technical methods to make the information between heterogeneous systems exchanging the information and sharing the resources. Compared with the traditional integration methods, the use of Web Services is a more flexible solution to the enterprise collaborative business systems. This paper first explores the enterprise collaborative business systems,...
This paper studies the problem of constructing maximum-lifetime data gathering trees in sensor networks in which the power levels of sensors are heterogeneous and adjustable. In-network data aggregation is also employed to aggregate sensor data while they are being forwarded toward the base station. For sensor networks in which sensors have fixed and the same transmission power level, Wu et al. has...
The power is the most significant resource in wireless sensor nodes, so energy conservation is the most important factor in designing the protocol for sensor networks. In this paper, we study the problem of energy-efficient collection of the physical information from the target area. The coverage-preserving data gathering (CPDG) problem is to build up a tree, which minimizes the total energy consumption,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.