The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a method for rapid and continuous monitoring of slope deformation by using terrestrial optical photogrammetry. This slope monitoring method is non-contact and has a high speed to calculate the position and displacement of slope points, which can be applied to the continuous observation and disaster warning of the problem area of the slope. The theory of this method is to obtain...
Current trend is to increase the overall use of electronic systems in daily life. Exemplarily, the complexity of automotive electronic control unit (ECU) systems is rising due to the number of components involved and the tighter interactions between these heterogeneous components (analog, digital hardware, or software), resulting in a more and more challenging verification. In this paper, we show...
A newly invented Structure Health Monitoring (SHM) technology, named as Intelligent Coating Monitoring (ICM), was verified by various lab-scale experiments along with full-scale fatigue tests to investigate ICM capability for monitoring crack initiation and propagation in metal substances. In order to apply the technology to civil aircraft, the ICM system was validated under real service conditions...
Network communication protocol reverse-engineering is important for malicious software analysis. Security analysts need to rewrite messages sent and received by malicious software according to the protocol to control the malware's malicious behaviors. To enable such rewriting, we need detailed information about the sent message by the malware program in target host in the network dialog. However,...
The applying of QPSO-FISH algorithm in the wireless senor network are mainly studied in this paper. Wireless sensor network is an energy-constrain network, coverage efficiency and power consumption are two important performance indicators. Maximizing the network coverage and minimizing the number of working nodes are network optimization goals. Establish an optimal model for coverage in wireless sensor...
There are numerous methods for identifying network traffic in recent research. In our experiment, flow is collected by using parallel probe and network IP packets are captured based on WinPcap's packet collecting technology. According to the characteristics of application layer protocol, a scalable identification system is proposed and network traffic can be classified as different application classes...
Virtual machine (VM) introspection is a powerful technique for determining the specific aspects of guest VM execution from outside the VM. Unfortunately, existing introspection solutions share a common questionable assumption. This assumption is embodied in the expectation that original kernel data structures are respected by the untrusted guest and thus can be directly used to bridge the well-known...
The sewage treatment system plays an important role in the environmental protection of the city, there are several kinds of parameters that need to be monitored simultaneously in order to make the progress under control. Wired monitoring system is still the main approach to monitor the parameter in the existing sewage monitoring system while it has the drawback of highly cost, poor expansion and difficult...
Node localization becomes an important issue in the wireless sensor network as its broad applications in environment monitoring, emergency rescue and battlefield surveillance, etc. Basically, the DV-Hop localization mechanism can work well with the assistance of beacon nodes that have the capability of self-positioning. However, if the network is invaded by a wormhole attack, the attacker can tunnel...
This paper describes a system design approach for wireless sensor network based wildfire monitoring, including the system architecture, hardware and software framework. Effectiveness of the solution is evaluated in terms of reactivity, reliability, robustness and network lifetime. The main contribution of the paper is the design of a sensor network that can meets the goal of reactivity and reliability,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.