The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When the hardware resources are limited for LwIP (A lightweight TCP/IP Stack), it's easily to come across the problem of high usage in memory allocation. Through in-depth analysis of related issues, an optimal design is presented which unifies the memory management in system and also adopts an optimal allotment. In addition, through a series of test and analysis, the practicality of improved LwIP...
Based on the ZigBee OTA technique which is accomplished in the Z-Stack protocol stack by TI company, In view of the problem of low efficiency and other problems of the ZigBee node firmware broadcasting upgrade, a multi-node concurrent upgrade scheme based on tree network is designed. From the experimental results, it is found that the multi-node concurrent update scheme is able to reduce the load...
Social network has extended its popularity from the Internet to mobile domain. Pervasive social networking (PSN) supports instant social activities based on self-organized mobile ad hoc networks. PSN is useful in reality when fixed networks are unavailable or inconvenient to access or when people are in vicinity. For supporting crucial PSN activities and enhancing user privacy, securing pervasive...
The intelligent document not only has the advantages of the traditional electronic document, but also specifies the dynamic operation behavior of a document, which makes the document able to interact with other applications when it's displayed and greatly enhances the document processing capacity. The article reviews the development of the intelligent document, proposes a Web Service-based architecture...
Using today's popular architectural concepts of the Internet of Things (IoT), through RFID and agreed protocol, we described the program of objects within a specific space with internet connectivity and data communication. In this paper, we achieved things on object identification, tracking and monitoring. Based on the platform of Visual Studio 2008 and SQL Server database which provided by the Microsoft,...
In the recent years, with the gradually deep researches of the Internet of Things (IOT), the DNS based on identity and IP (IIEDNS) also attracts people's attention. The major task of this paper is to solve the problems of security-authentication. Since the traditional identity-authentication technologies couldn't satisfy the needs to the identity and IP authentication of the IIEDNS, we propose an...
Information exchange and convert is an important part of Internet of Things. The establishment of information sharing platform is necessary. In this article, DNS service principle and existing registration-mechanism are being imitated, in order to present a new data sharing platform-IIEDNS which based on the Internet of Things. Platform used the DNS service principle to achieve the link among platform...
With the development of computer network, its security problem has been urgent at present. Authentication is an important part in the network security. It can prevent illegal user from accessing network. Traditional authentication method is password. But it cannot resist dictionary and playback attack. This paper would design an authentication framework which is effective and security by using LDAP...
With rapid development of Internet of Things, requirements for sensing layer of the Internet of Things have gradually been deep. RFID, which is one of the perception layer technology, has a long way to run. In this paper, a deep research on management of mobile RFID reader is done. The problem, which is de synchronization of data and configuration information with server, is found. WAN network management...
By analyzing the problems of using RFID technology, RFID-based information sharing platform is put forward in this paper, in which a number of industries and systems are integrated, in addition user authentication issues are analyzed and a simple authentication scheme is designed. The establishment of the platform solves the issue of resource sharing and avoids duplication of investment; it also solves...
Mobile networks, in particular the emergence of 3G networks, value-added network services will be brought some new opportunities. Electronic card as value-added services will be more room for development. We design and implement an electronic card system with a combination of the mobile network and the Internet. Users can access it through three ways (web, wap, and sms) to conduct electronic card...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.