The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Water resources monitoring has been widely used in river section, water source, groundwater, water function, social users using water, drain and sewage treatment plants, and so on. Water resources automatic monitoring and analysis technology can be divided into three aspects: data collection and analysis, data transmission, and data application and management. The application and management of water...
By this paper, the background for the occurrence of the industrial control configuration software(CS) is analyzed, the connotation of CS is given, the architecture of it is constructed, and the current situation of CS is summarized. Finally, the six development trends of CS are predicted, they are: function customization, function extension, application expansion, monitor networking, software standardization...
Because of the limit of the domestic configuration software which is in the use of scrutinizing the coal mine, the ActiveX technique is discussed and the design of the safety of coal mine, which utilize the ActiveX technique, is actualized. The fig of system frame and the implementation of part of modules are also given. This system can provide the friendly interface for the controlling of coal mine,...
A honeypot is a type of information system that is used to obtain information on intruders in a network. When a honeypot is deployed in front of a firewall, it can serve as an early warning system. When deployed behind the firewall, it can serve as part of a defense-in-depth system and can be used to detect attackers who bypass the firewall and the intrusion detection system (IDS) or threats from...
In order to realization electronic parts product appearance quality detection control, one kind of processor based on the intelligent knowledge automatic extraction and system intelligence modeling was presented. In the processor, wavelet-fuzzy technique and neural network technique are combined. Uses the fuzzy wavelet extraction image feature, and wavelet function is used as fuzzy membership function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.