The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of China's network economy, the strong demand for the types and personalization of logistics services is increasing, thus they embody an evident trend of network and socialization. The integration of Internet of Things technology is exactly to meet this trend, therefore, a new intelligently networked logistics service mode called “cloud logistics” has been proposed under...
A new cable wireless monitoring temperature scheme is proposed, which can monitor cable parameters of various cable, and can be monitored dynamically and transmitted to the dispatch center through the network which consisted with ZigBee network and CAN bus. Then, cable failures early warning function is realized. Simulation and piracies proved that reliability and flexibility of the system is increased,...
A new tire monitoring scheme is proposed in light of the defects of the existing tire pressure monitoring system. Parameters of various automobile tires can be monitored dynamically and transmitted to the driver meter through the network which consisted with ZigBee network and CAN bus. Then, auto tire failures early warning function is realized. Simulation and piracies proved that reliability and...
In this paper, we study a new class of attacks, the invisible LOCalization (iLOC) attack, which can accurately and invisibly localize monitors of Internet threat monitoring (ITM) systems, a class of widely deployed facilities to characterize Internet threats, such as worm propagation, denial-of-service (DoS) attacks. In the iLOC attack, the attacker launches low-rate port-scan traffic, encoded with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.