The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of science and technology, people pay more attention on the using of resource. As wood is a not inexhaustible resource, many researchers want to find advanced methods which can reduce the waste materials and enhance timber utilization rate. This paper studied the intelligent numerical control machine for wood processing. Firstly, the requirements of wood processing machine were...
This paper presents the construction scheme of brake shoe clearance security real-time monitoring system, the system take mine hoist brake shoe clearance for the monitoring object, with the support of microcontroller AT89C52 and VB6.0, combining the techniques of SQL Server, Man-machine interface design and other technical, it fulfills the signal acquisition and processing and transmission from the...
Because of the limit of the domestic configuration software which is in the use of scrutinizing the coal mine, the ActiveX technique is discussed and the design of the safety of coal mine, which utilize the ActiveX technique, is actualized. The fig of system frame and the implementation of part of modules are also given. This system can provide the friendly interface for the controlling of coal mine,...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
In view of the information leakage brought by removable storage device, the paper designed and implemented the anti-leak security system based on C\S architecture. The system taken filter driver technology to provide fine-grained and flexible access control over removable storage devices and file transparent encryption and decryption, and implemented the effective monitoring of removable storage devices...
As the visits to databases in the network application become more and more, the DBMS, which is the core of network calculation, attracts increasing attention. The research on the self-calculating, which mainly includes self-configuring, self-restoring, self-optimizing and self-protecting, handles the internal resources management of the DBMS. But it can't handle the management of external workload...
This paper presents an approach to providing better safety for adolescents playing online games. We highlight an emerging paedophile presence in online games and offer a general framework for the design of monitoring and alerting tools. Our method is to monitor and detect relationships forming with a child in online games, and alert if the relationship indicates an offline meeting with the child has...
This paper proposes a framework for consolidating laboratory data by adopting an Enterprise Service Bus as a backbone for interchanging laboratory data between: medical instruments, the Laboratory Information Management System and the Hospital Information System. A laboratory test result is one of the major components in medical diagnosis and procedures. It can be used to plan a patient's treatment...
To overcome the shortcomings of compatibility with different CAN (Controller Area Network) communication devices and applicability in different fields for the current real-time monitoring systems for ECU (Electronic Control Unit) based on CAN bus, a novel architecture for the monitoring system was put forward, and the corresponding monitoring software has been developed, which consists of a communication...
The emerging computational grid infrastructure consists of heterogeneous resources in widely distributed autonomous domains, which makes job scheduling very challenging. Although there is much work on static scheduling approaches for workflow applications in parallel environments, little work has been done on a real-world Grid environment for industrial systems. Utility Management Systems (UMS) are...
In the Age of Information, network education pays more attention to the application of IT technology and the training of talents, which makes learning more of customization and of opening up. In order to better enable learners to go beyond the limitations of space and time to acquire knowledge; in order to provide excellent learning environment for greater freedom and greater choice of learning activities...
Though water pollution control and prevention technologies have made a great progress, most polluting enterprises even have never heard of them, not to mention use them. So we design an technologies sharing model based on information Grid, and focus our discussion on the process of searching and invoking the wanted technologies with mobile agents.
There is presently considerable research interest in using wireless and mobile technologies in patient health monitoring particularly in hospitals and nursing homes. For health monitoring, an intelligent agent based hierarchical architecture has already been published by one of the authors of this paper. Also, the technique of monitoring and notifying the health of patients using an intelligent agent,...
The diagnosis, treatment and management of hydrocephalus remain a challenging issue, particularly for diagnosis and prognosis of hydrocephalus, improving current shunt treatment, predicting its success and evaluating its functionality. Nowadays, diagnosis procedure depends mainly on the surgeons observation of the clinical symptoms, neuroimages and instantaneous of intracranial pressure recording...
Within service orientation (SO) web services (WS) are the defacto standard for implementing service-oriented systems. While consumers of WS want to get uninterrupted and reliable service from the service providers WS providers can not always provide services in the expected level due to faults and failures in the system. As a result the fault management of these systems is becoming crucial. This work...
To provide personal services in a ubiquitous environment, it is necessary to identify users without giving a psychological pressure to them. This paper proposes a configuration of the sensor network used to identify a user based on his or her sole pressure distribution on a sensor mat that uses a hetero-core optical fiber. Specifically, it presents a filtering algorithm used to determine the pressure...
Many network management stations are designed statically to accomplish a set of defined functions taken from object IDs. As the implemented MIB objects for under-development WiMAX tend to grow, redesigning a deployed network manager would occur many times. Therefore, providing a more generalized and customizable network manager would become an alternative solution. In this paper, we design a customizable...
Exploring the trivial workflow data needs high performance data processing technology. In this paper we put forward analysis method of workflow execution data based on data mining. The main idea of it is to retrieve the workflow data to a data warehouse and adopt OLAP technology and data mining method to support customers to select different measures and view the corresponding data in different dimensions...
Recently the concern about network security has been increasing rapidly, certain malicious programs like Trojan horses are highly hazardous to the Internet security. In this paper, we firstly discuss the current research and developing trend to anti-Trojan approach on behavioral analysis. Moreover the behavioral features of Trojan at the stage of installation will be analyzed and summarized. Further...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.