The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the current situation where natural gas has become more and more popular, this study combines internal structure and working principle of diaphragm gas meter, and studies a rapid error-calibrating technology for diaphragm gas meter with sonic nozzle based on rotary equivalent volume. On the basis of existing standard apparatus, an overall automatic verification system of auto-detecting control...
People's increasingly relying on web applications to manage their digital assets makes web authentication a critical security issue. As most websites today still authenticate a user with only username and password, the authentication credentials can be easily compromised in a vulnerable browsing environment without the owner's notice. Considering the browsing in mobile devices is more secure than...
The article designs the project of wireless communication between the PLC and the computer based on nRF2401 by analysing the communication principle of PLC and computer. The PLC implements communication with nRF2401 through the MCU, and the computer implements communication with nRF2401 through the controller based on MCU. It achieves wireless communication through a pair of nRF2401 module.
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
Homogeneous and stable magnetic field is essential for a high-resolution NMR spectrum, especially one which requires signal averaging or phase cycling. The field-frequency lock technique can effectively improve the long-term stability of the magnetic field. The whole design scheme of the lock system for NMR spectrometer is presented in this paper. The digital control is implemented with Xilinx Virtex-4...
Previous studies on the higher order mode cutoff frequencies for symmetrical TEM cells include matrix solutions from a mode matching method, approximate expressions based on the assumption of small gaps between the inner conductor and the sidewalls, or numerical simulations based on meshing the cross-section. Good agreement among the methods has been achieved in most cases. However, some discrepancies...
Attack graphs are important tools for analyzing network security vulnerabilities. Recently, the generation method of attack graphs is a hot topic to the security researchers. As previous works encounter the scalability problem and inaccurate input information problem, we propose a novel method to automatic construction of attack graphs based on probability. After introducing prior-probability, match-probability,and...
During the past few years, automatic computer examination systems have been widely used for computer-based tests. But these systems are based on the traditional question-answer examination style which is limited for the collaborative examination. The collaborative examination needs multiple examinees and can be parallel performed. The collaborative examination also should consider the context of the...
Computer greatly influences our educational environment. Over the last years, automatic computer examination systems have been widely used for computer-based tests. But these systems are based on traditional question-answer examination style which is not fit for the sequenced test. The sequenced test should consider the context of the examinee, e.g. the order of questions or the permissions of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.