The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of information and automatic control technology, more and more industrial control system(ICS) like SCADA, is interconnected with Ethernet and directly connected to internet, which greatly improve the efficiency of data sharing and introduced in security threats at the same time. As the important components of critical infrastructure, if attacked, will behave abnormal and...
Along with the equipment support simulation system more complex, the principal problem of distributing simulation is how to eliminate the HLA shortcoming and the system integration bringing the high expense for platform and protocol difference. This paper analyzes the characters of Service-Oriented Architecture (SOA), then discuss the advantage of modeling and simulation based on SOA and put forward...
The multimedia conference system enables individuals or organizations in difference places to share voices, videos as well as documents and finally achieve real-time communication. However, existing multimedia conference systems lack the ability for multi-net terminals to access. Besides, existing systems that use the desktop way are too complex to install and are highly dependent on operating systems...
Security mechanisms within DBMSs are far from effective to detect and prevent anomalous behavior of applications and intrusions from attackers. In fact, intrusions executed by unauthorized users to explore system vulnerabilities, and malicious database transactions executed by authorized users, both cannot be detected and prevented by typical security mechanisms. In this paper we proposed a database...
The circulating current method can judge whether the multipoint earthing fault happens by monitoring the variety of metal sheath's circulating current value. This article introduce an on-line monitoring system which use the circulating current method to monitor the multipoint earthing fault of the metal sheath. In the hardware layer, we use distributed current sensors and microcontroller's acquisition...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.