The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of third-party payment in China, to some extend, it alleviates the problem of e-commerce and helps the development of e-commerce as well. However, it also brings some new issues, especially about government supervision. In this paper, the necessity of government supervision from three aspects is discussed because of the financial risks caused by the third-party payment. Furthermore,...
Network anomaly detection technology has been the research hotspot in intrusion detection (ID) field for many years. However, some issues like high false alarm rate, low detection rate and limited types of attacks which can be detected are still in existence so its wide applications in practice has been restricted. A new network anomaly detection method has been proposed in this paper. The main idea...
With the rapid development of e-commerce, electronic contracts are not secure enough for both businessmen and government, due to the absence of authentication, integrality, non-repudiation, uniform specification and centralized management. We propose that e-contract should involve digital signature as its primary element, and the E-Contract Record Center should be introduced into the management of...
Sensing coverage is a fundamental problem in sensors networks. Different from traditional isotropic sensors with sensing disk, directional sensors may have a limited angle of sensing range due to special applications. In this paper, we study the area coverage problem in directional sensor networks with the rotatable orientation for each sensor. We propose the optimal coverage in directional sensor networks...
This paper puts forward a strategy of intellectualized fire monitor based on embedded system in terms of problems arising from fire reporting. The monitor is intended to monitor the fire automatic alarm system, realize remote communication between the fire automatic alarm system and the administration center, receive directives from the center, and connect the center through audio and visual means,...
This article has analyzed the origin of the network behavior deviated from the norm, and it has proposed a system of network data behavior of examination. This system is between the firewall and the boundary router. It is responsible to monitor the network data stream about the financial service, and it makes the message return to original state effectively. It catches the suspicious network activity...
A biomedical signals monitoring system with multiple physiological signs measurement capability in real time is designed and implemented. This system performs a local vital sign data analysis using cell phone over wireless sensor network (WSN) technology and code division multiple access (CDMA) network. Cell phone-based personal medical recorder becomes popular to facilitate self-control of chronic...
The importance of effective and efficient traffic congestion monitoring grows with the enlarging of urban scale and increasing number of vehicles. We develop a traffic congestion monitoring system which is based on adaptive background subtraction. The system reads real time monitoring video from communications department and converts it into images. After that, we change them into corresponding gray...
Aimed at the features of event-driven wireless sensor network, a representation of the entire network communication quality named as “Routing-based global network Communication Quality Representation (RCQR)” is introduced and evaluated. In our simulation and test-bed experiments, there is subtle difference between LQG constructed by RCQR and the packet reception rate of the entire network. Moreover,...
Efficient coverage area and efficient coverage area ratio of node are put forward by analysis of coverage problem of wireless sensor networks (WSN). It is theoretically proved through math modeling, theoretical analysis and formula deducting that how much the maximum efficient coverage area, the maximum efficient coverage area ratio, the maximum of net efficient coverage area and the maximum of net...
Wireless ad-hoc sensor networks have been used widely in the physical world. One of the fundamental problems in sensor networks is the coverage in some complicated situation. In this paper, we studied the breach path problem for target in sensor networks with blind area, and defined the blind area of polygon in sensor networks. The existence of breach path and definition of maximal break path were...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.