The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, a uniform calculus-based approach for synthesizing monitors checking correctness properties specified by a large variety of logics at runtime is provided, including future and past time logics, interval logics, state machine and parameterized temporal logics. Thus we can synthesize monitors from the logical specification in an uniform fashion to incrementally analysis the current execution...
This paper describes a real-time soil water content monitoring system from both perspectives of hardware and software. The system consists of an ATmega128 microcontroller with embedded μC/OS-II operating system, BD-I-type soil moisture sensors, RS-485 and RS-232 bus-based data transmission technologies. Compared to traditional microcontroller monitoring systems, the reliability and processing ability...
In order to monitor technical information in vehicle, monitoring system is designed based on CAN Bus. The hardware of data acquisition ECU is designed. By scheduling priority and send cycle, every node is optimized by considering bus average load rate and maximum delay time limit. Experimental results show that maximum delay time of node with lowest priority is reduced by 30% after modify, and CAN...
Virtual instrument technology and network technology combined, and building networked virtual instrument test System is the important development in today's3 society. In this paper, aiming at remote virtual instrument control by the data socket way using in the Lab view. Users can easily operate the remote virtual instrument by the release capacity of remote panel.
This paper proposes a framework for consolidating laboratory data by adopting an Enterprise Service Bus as a backbone for interchanging laboratory data between: medical instruments, the Laboratory Information Management System and the Hospital Information System. A laboratory test result is one of the major components in medical diagnosis and procedures. It can be used to plan a patient's treatment...
Situational assessment is significant for host-level security. Most existing approaches are generally limited to network security that is different from host-level security. In this paper, we introduce an approach to assess host security. Analyzing process and file behaviors, we propose a series of security indices, based on which we compute the value of process situation (PS) and file situation (FS)...
A intelligent monitor and control system on multi-factor of aquaculture environment based on wireless sensor networks is designed adopting BP neural networks. The system uses wireless sensor nodes to detect a variety of water quality parameters transmitted to the on-site monitoring host computer through sink node wirelessly. The control module consists of fuzzy controller and decoupling neural network...
Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed...
Progress in wireless communication has made possible the development of low cost wireless sensor networks. In recent years, as the development of wireless sensor networks, people have done some research on cluster-based protocol, about the proongation of the lifetime of WSN and decrease of energy consumed by the sensors. Clustering sensor nodes is an effective topology control approach, but these...
In combination with the specific conditions of water plant, the paper puts forward the opening information monitoring system structure for industrial process based on Web technology. From system development perspective, the key techniques of the system development, including Web application development, NETDDE and Socket data communication, ODBC access, data gather, control tactic and real-time data...
In recent years, greenhouse technology in agriculture is to automation, information technology direction with the IOT (internet of things) technology rapid development and wide application. In the paper, control networks and information networks integration of IOT technology has been studied based on the actual situation of agricultural production. Remote monitoring system with internet and wireless...
Wireless communication technologies can bring great benefits to industrial automation systems. But because of the high data losses and transmission errors caused by channel fading and interference, the hard real-time and reliability requirements of industrial automatic control are more difficult to be guaranteed. WIA-PA is the new Chinese industrial wireless communication standard for process automation...
This study presents stress analysis of sheave wheel by a finite element analysis model and experimental tests. Simulation of stress field under two kinds of load condition was carried out with ANSYS. The corresponding relationship between stress and load of hoist as well as sheave wheel's phase angle were obtained. Then field experiments of sheave wheel stress under three kinds of conditions, which...
Assessment for computer network attack is a technology for assessing hostile attacks against computer network system. In the paper, relevance vector machine is applied to assessment for computer network attack. Compared with support vector machine assessment method, the RVM method can provide better classification accuracy. The experimental data collected in the paper include U2R attack, R2L attack,...
Internet Protocol (IP) telephone, a new way of communication, is growing rapidly in the telecommunication industry. A number of major phone carriers are competing to gain customers in home and business markets. However, there are very few schools at the university level that offer IP Telephone courses. It is rare to find documentation on curriculum and laboratory development, even though some schools...
Here introduces a monitor system technically based on ARM7 embedded micro processor (HMS30C7202) and Micro C/OS-II embedded operating system. The paper provides the scheme of the principal, introduces the connection method of outside signals, tells about how to transplant the Micro C/OS-II to the operating system, and shows the programming emphases and some source code of the majority of the program.
An ETC system based on RFID technology uses radio wave to identify cars passing through the toll collection site and automatically debits toll rate from the car owner's pre-paid account. RFID technology and its application in highway ETC system is analyzed in this paper. SNMP is a kind of protocol that has been widely used in network management system for many years. Because of its easy use and strong...
With the pervasion of Internet and the sharp increase of the number of netizens, Network public opinion has been serving as an effective method in the monitoring and reflection of social public opinion. However, Regulatory Authorities are inclined to concern more about public opinion in a special field while it is too difficult to acquisite the expected information that relates to a special area from...
The condition-based maintenance (CBM) technique has been widely used in the power plant in China. Feed water pump is one of the most important general requirements in the power plant. Its reliability plays an important part in the safety of the complete running. On the basis of practical situation in one power plant, a system for condition-based maintenance of the feed water pump in said power plant...
Rapid growth in sharing information using internet technologies laid the threats of copyright protection for digital multimedia contents. One of the remedy for intellectual property protection is Watermarking. This paper deals with numerous available digital video watermarking techniques and raised the issue of quality and size of watermarked video. Through experimental study, it has been shown that...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.