The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Internet Protocol (IP) telephone, a new way of communication, is growing rapidly in the telecommunication industry. A number of major phone carriers are competing to gain customers in home and business markets. However, there are very few schools at the university level that offer IP Telephone courses. It is rare to find documentation on curriculum and laboratory development, even though some schools...
Computer games that handle realistic environments are becoming more popular in the game market. Games that make use of natural environments such as the spreading of fire or the flow of water need to be very carefully designed. In order to produce a desired effect of fire or water, a designer needs to try and test map properties several times. There has been an effort to use genetic algorithm to find...
The paper shows a working project that organizes a set of jobs to improve the learning of computer networking. It uses virtual machine to create a portable laboratory on which students do hands-on exercises anywhere. It first developed an ability indicator of computer networking. Then an online curriculum material is made and available on the Internet. Students are learning the computer networking...
An idea is a collection of thoughts, plan and images that flash through the brain. The factors such as stress, need, etc. influence the idea generation. If we consider the brain to be a machine present in our body, then thinking in the reverse way we can imply that a machine can also generate ideas. Machines are meant to serve the users. Developing such an Algorithm, which helps machine in generating...
Aimed at the quantitative analysis of pulverized coal ignition temperature, this paper presents a piecewise least squares support vector machine modeling method, where several sub-models are created according to the burning characteristics of lignite, bituminous coal, lean coal and anthracite coal etc. and the parameters of each sub-model are optimized independently. By implementing the piecewise...
This paper presents a formal methodology of modeling and verification about WTB-TCN device based on extended Petri net model. By translating the model into timed automata, properties of WTB-TCN device can be completely verified using symbolic model checking technique. The methodology proposed addresses the model checking of critical properties of WTB-TCN device including safety, liveness and fairness...
The main objective of this proposal is to automate control and communication systems of the train using High Performance Multi-core Embedded Processors (MCEP). This method will overcome the difficulties faced by the existing methods such as detecting cracks at rails, monitoring distance between rails, compartments monitoring, fire and smoke monitoring in compartments, and controlling of motors, transformers,...
Service Oriented Architecture perfectly manifests itself in Web services, which create seamless and loosely-coupled interactions. Web service utilizes supportive functionalities such as security, reliability and so on. These functionalities are called as handlers, which incrementally add new capabilities. However, adding new handlers into the execution path may cause performance and scalability problems...
It's a hard task for anti-ship missile (ASM) to select the target ship from multi-objects acquired by terminal guidance radar. In this paper, a method to select the target in a ship formation is presented based on iterated closet point (ICP) algorithm. The principle of this method is described as follows: (1) a ship formation is independently detected by fire-control radar and terminal guidance radar,...
To satisfy the special needs of confidential networks, a protection method of combining ingress and egress access control for network boundary security is proposed. In preventing network attacks, a combined mechanism of packets filtering firewall and intrusion detection system based on artificial neural network and rule matching is implemented to increase the accuracy of intrusion detection. In preventing...
In security protection, the hotspot of research is the linkage of intrusion detection to firewall and honeypot. At present the linkage System achieved is still limited to IPv4 Network. Based on the analyses of the structure of IPv6 NIDS, this paper aims at improving the real-time alert and accuracy of intrusion detection by means of AC-BM Fast Multivariate Matching Algorithm. The introduction of collaboration...
Petri net is a tool suited for describing system with the feature of concurrence, asynchronization, distribution and undecision. This paper studied and realized a modelling method based on Petri net which integrated Object-Oriented approach and Petri net method, calling Timed Object-Oriented Petri net. It's more powerful to describe complex system but with less complex Petri net structure. We researched...
In this paper, we propose a concrete schema to answer the imperative issue of hostname addressing in heterogeneous mobile ad hoc networks. The proposed addressing mechanism enables the MANET users to seamlessly communicate with any destination using its name rather than its IP address. These enhancements are introduced to AODV routing protocol and evaluated on an actual ad hoc network testbed. The...
We propose the ontology-based inference rule for an experience media authoring system. The experience media lets people feel realistic while satisfying the five senses. The experience media means the media recreating more realistic situation by utilizing various peripheral devices in addition to audio-visual contents. The proposed ontology has advantages in producing the experience media by defining...
With the rapid development of virtualization technology, virtual machine (VM) is widely used by cloud computing - the more and more popular computing paradigm. Thus, in order to guarantee the security of cloud computing, it is necessary to securely identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies on. This paper designs a system of trusted connection...
The functional evaluation of catalytic converter conducted by engine bench test is considered as one of the key techniques in the research and exploitation of catalytic converter. The integrated cordierite catalytic converter, modified from the precious metal Pt-Rh, was produced by the author with help of maceration. It has been applied in the engine bench experiment to purify exhaust under the condition...
As networks became an integral part of everyone's lives, advanced network intrusion techniques have been introduced by various crackers and network programmers. Many new technologies have also been implemented to secure the privacy of a networks but only big organizations are utilizing these technologies with their full potential as their implementation require costly resources. Here we have a comprehensive...
Clay microscopic structure, particle surface electric field and the interaction between ions in clay pore fluid have an important influence upon ion transport, but how to consider the influence of above factors on ion transport has been a difficult problem not solved. Establish microscopic Poisson-Nernst-Planck (hereinafter referred to as PNP) multi-ion transport model in the clay based on electrochemical...
Cloud Computing is a paradigm in which data, applications or software are accessed over a network. This network of servers is called as “Cloud”. Using a client such as desktops, entertainment centers, tablet computers, notebooks, wall computers, handhelds etc, users can reach into the cloud for resources as they need them. Cloud computing is on-demand access to virtualized IT resources that are housed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.