The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Now that Distributed Denial-of-Service (DDoS) attack is one of the most serious network security threats, it becomes particularly important to detect it. In this paper, the author presents a method of mathematical analysis SYN Flooding attack detection. We can use this method to detect SYN Flooding attacks. With it, we can detect these attacks more timely.
A new remote data acquisition system for distribution network was proposed and experimented in this paper. The previous wired and wireless communication mode's faults which are the high construction costs, serious data losses, low capacity of resisting disturbance and poor security have been analyzed. The remote data acquisition system whose data transmission platform was consisted of general packet...
GPRS communications traffic in electrical load management system was analyzed, traffic anomaly and its causes were investigated, and corresponding countermeasures were put forward for the different reasons.
In order to solve the problem of extra work and low efficiency brought by resources heterogeneity in the Command Information System simulation, a design of virtual technology-based application frame is introduced. By using the new application frame, the heterogeneity of resources is effectively shield, and the efficiency of the system and the utilization rate of resources is then improved.
The SPI put forward by Motorola Company is a highspeed, full-duplex, synchronous communication bus, and its simple connect could save resources. More and more IC chips are using this protocol. Based on the wishbone bus interface, we design a high-speed and reusable SPI IP core.
This paper presents a design method of three point temperature acquisition system based on Ethernet. and described the hardware and software design of system in detail. the hardware section mainly describes the principle and use of Ethernet controler DM9000A which is widely used in industry. The software part represents the structure and transplant of the open source TCP / IP protocol stack uIP 1...
According to the characteristics of monitored objects in smart grid systems, we unified the structure of monitored objects, defined 8 properties for a monitored object, i.e. identifier, access rights, status, type, object value, name, description and syntax. We used the monitoring information base to facilitate organization and storage of monitored objects. This method use little storage space and...
The rapid development of the grid and communication technology for raising the level of power management automation provides a strong condition. Traditional data replication system in rural power network has not keep up with the pace of modernization, the change the traditional and inefficient data replication system has become the goal of power enterprises. Aiming at the deficiency of FC-SAN technology...
Bridge health monitoring system (BHMS) is able to simultaneously get all kinds of information which reflect the safety conditions of bridge structure, and provide scientific proof for the analysis of bridge health. At present, the BHMS developed only for specific bridge or several long span bridges, and the monitoring information is not shared as a single island, there is also not have a unified and...
According to the disadvantages of the recent current transformer in reliability stability and accuracy, which is caused by analog transmission and the shortage of the complex cabling with many nodes in the signal of current transformer, a three-phase power current transformer based on CAN transmission is designed. The design ideas and basic composition of the current transformer is intrduced in this...
This design mainly aims at the small and medium-sized enterprise. On its existing internal integration local area network, it realizes the special-purpose IP telephone network in the enterprise, and it also realizes the main purpose that is the “zero” long-distance phone bill trans-regional enterprise. Because of VoIP is the technology of analog voice signal digitized and making the real-time transmission...
There are a huge number of network attacks on the Internet, and are increasing each year. The condition of internet attacks is developing toward a distributed, collaborative direction. Internet attacks exhaust a lot of resources, take up a lot of bandwidth, making the victim host can not accept normal network requests, resulting in substantial economic losses. This paper is based on the analysis of...
It could improve the design efficiency and shorten the development cycle by the means of integrating various user-defined peripheral driver in the rule of Avalon bus in the SOPC system. The SPWM component with adjusted period and duty ratio has been achieved with hardware and software co-design method according to the Avalon bus specification in Nios II embedded systems, and it had been tested to...
With the development of embedded technology, embedded system in industrial control applications more and more widely, and the embedded Ethernet technology is particularly important, LwIP protocol stack, Ethernet in low-end embedded system applications may be provided, STM32 interconnected ARM processor and its official software for Embedded Ethernet application development offerred convenience condition...
Based on the influence area, the movement route and the drop site on sea of the middle-path sandstorm, phosphorus forms and distribution of the desert particles from 7 representative sites are analyzed using the sequential extraction method. The results show that the concentration of Total Phosphorus (TP) in the desert particles with different sizes is in the range from 308.12 μg·g−1 in Ulan Buh Desert...
A Chinese medical massage robot is developed for the clinical requirement of degenerative disease and chronic disease of middle-aged and old people. The mechanical architecture, control system, and other modules are introduced, and the experimental data is given. A massage adjustable platform, two 5-DOF manipulators are manufactured. A massage device that can accomplish various massage manipulations...
SIP protocol is an important protocol for IP telephony in recent years. DoS (Denial of Service attack) is a common and difficult-defended attack. For the characteristics of SIP protocol, a variety of DOS-attack manners are introduced in this Paper, then specific prevention mechanisms are given to enhance the security of SIP network.
With the pervasive computing and parallel computing time arrival, the traditional access control mechanism already ragged, this has prompted the dynamic access control technology, this technology makes access alter with the context of the changes, so it need to acquire dynamic context information. This paper gives the definition of the context information in dynamic access control, and on the bases...
In the communications of network, different RED parameters can be set to the WRED algorithm to suit for different levels of business, to reach the goal of differentiating the services. The package loss curve of the WRED algorithm is improved in this paper. Thus the throughput of the network enlarges and the rate of the package loss becomes lower. The improvement is testified by simulation of PTN network...
In the past few years, peer-to-peer (P2P) applications have generated the main part of the Internet traffic. Large amounts of network bandwidth have been consumed by various P2P applications, which decreases the quality of network services. Therefore, the ISPs and campus network administrators are eager to be able to manage the P2P traffic. However, the main problem of P2P traffic management is the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.