The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the popularization of computer applications and the development of Internet, the network has grown of very large-scale, and is constantly expanding, which bring a higher demand for secure network management. To make efficient secure management to large-scale network, we design a secure management method based on multilevel agent. We build a multilevel structure for large-scale network, and designed...
Wireless data broadcast is very suitable for delivering information to large user population. In this paper, we concentrate on data scheduling algorithm over multiple channels in mobile computing environments. First, we formulate the average expected delay of multiple channels considering data items' access frequencies, variable length, and different bandwidth of each channel. Second, we propose a...
During designing the high-resolution camera driver on Windows CE OS, it is a critical issue for the resource limited embedded environment that how to improve the data transfer rate, and make full use of the limited memory resources of Windows CE. This paper realized the 4 million CMOS camera driver on the PXA270 development platform by using Quick Capture Technology, with the data transmission of...
In order to further enhance the bandwidth of the data communication system in theodolite, a single channel serial optical transmission system was designed based on the studying of the 10BASE-X Gigabit Ethernet physical layer technology which meets the IEEE standard. The conversion between the 64-bit 156.25MHz TTL signals and the 4 channel 3.125Gbps PCML differential signals is carried out by FPGA;...
As a revolutionary technology in industrial wireless field, Wireless Networks for Industrial Automation-Process Automation (WIA-PA) standard is established by China. Wireless networks are easily disturbed, so enhancing the determinability, the power, stability and real-time of the data communication are more important. An adaptive deterministic scheduling scheme for WIA-PA Networks is presented in...
M2M, means “Machine to Machine”, including “Machine to Mobile”, “Man to Machine”, etc., is the most popular application form of Internet of Things (IOT) in current stage, whose data transmission is supported by cable, wireless, mobile and other technology, which may be significant security vulnerabilities and risks. In addition, in many use cases, it is likely that M2M will be deployed in very large...
Due to the transmission speed limitation of MIL-STD-1553B, no support for large data transmission especially, many departments have tried to improve the MIL-STD-1553B protocol. On this background, it is a necessity to develop a flexible and scalable simulation system to meet the demands of validating the improved protocol. Based on multi-thread technique, this paper designs an integrated MIL-STD-1553B...
With the fast development of World Wide Web, Web-based applications and services should allow user to get the right personalized information quickly and effectively. Collaborative Filtering acts a very important role in web service personalization and Recommender System. In this paper, Stability Degree was proposed to improve the accuracy of collaboration filtering both based on item and user, kinds...
The non-smooth data transfer was caused by Network congestion, and good congestion control algorithm is benefit to improve the network performance. Generally, network congestion algorithms are divided into two main categories, one is the control algorithm based on the data source, and the other is the control algorithm based on link. Different algorithms have different performance link. Link algorithms...
Data integrity in wireless sensor network is very important. Recent research has indicated that, due to its conservative CSMA/CA channel access scheme and RTS/CTS mechanism, it is not suitable to achieve data integrity in wireless networks. In our paper we propose a mechanism to achieve information completeness. We address this challenge by applying a search information model that associates information...
In the past few years wireless sensor networks have received a greater interest in application such as disaster management, border protection, combat field reconnaissance, and security surveillance. Sensor nodes are expected to operate autonomously in unattended environments and potentially in large numbers. Failures are inevitable in wireless sensor networks due to inhospitable environment and unattended...
In this paper, the Electro-optical Countermeasure Hardware-in-the-loop simulation system is introduced, which highlight to problem: real-time control and acquisition of communications data. We discuss the real-time mechanism by the combination of HLA time management mechanism for real-time data communication and out clock, and the double buffer of the acquisition method which ensures high frequency...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.