The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of our economy and the strengthened foreign communication, logistics industry faces more and more intensive competition while having very rapidly development. It is necessary to build the public logistics information platform(PLIP) to meet forth stricter requirements for the instantaneity and accuracy of logistics information. But most Web-based systems are based on the original...
All kinds of sensor network have been deployed all over the world. Combining some of these networks, we can get a larger sensor network. The data of very large scale sensor network are polymorphous, heterogeneous, large in quantity and time-limited. In its application, how to store and process these data has become a key technology.
With the development of digital substation technology, sampled value and status information can be transmitted through optical fibers, and shared within the substation. Therefore, digital substation provides conditions for the study of integrated protection. Accordingly, this paper proposes a scheme for integrated protection, and mainly describes a method of real-time database modeling for integrated...
In order to overcome the problem that the fax server was inadequate on the spam fax prevention, this paper provided a spam fax detection and classification method based on clustering. The method took advantage of behavioral characteristics of spam fax. And it separated spam faxes from normal faxes with clustering method on the basis of the skew detection. Then use OCR keywords recognition technology...
This paper analyses the current technical limitations in the monitoring Web services which mainly focus on the lower layers rather than application layer in TCP/IP stacks. So, the paper puts forward an indicator and model system, proposes some technologies to monitor Web services. The indicators add userspsila behavior and features in comparing with the current technologies, and integrates some services...
This paper is a description of the successful implementation of a model-merge approach for creating and updating the power system model of the new energy management system (EMS) for the China Southern Grid Company (CSG). The power-system model of this new EMS is a merged model of the five models in the five EMS's serving the five province power systems that constitute the China Southern Grid. The...
Least privilege is a basic principle to be conformed to when design computer systems. For file access control, the paper decomposes least privilege as user least privilege and program least privilege. User least privilege is a set of file with the corresponding access mode with which the user can access the file, and program least privilege is a set of file with the corresponding access mode with...
In order to reduce the consumption of human and material resources in industrial control area, an intelligent power management system is designed and implemented based on the design idea of using out-of-band management devices to manage remote devices. C8051F340 is the core of hardware part, and task scheduling is implemented by operating system RTX51 in the software part. According to the test result,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.