The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Parking in modern world is always a subject of concern and isn't a task to be ignored as it was in old days. With modernization and introduction of digital devices, machines have taken a very important and irreplaceable role in human life. Parking nowadays is also done with the help of much advanced and sophisticated systems. The problem with most of these system is that they need a very high capital...
Concentration of Carbon monoxide (CO) and Carbon dioxide (CO2) that high in the air is very dangerous for human life. Carbon monoxide is a poisonous gas that damages the circulation of oxygen in the blood when inhaled, while carbon dioxide is one of the gases that cause global warming. Both gases are classified as colorless and odorless gas so that the necessary special tools to monitor their concentration...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
When attackers try to gain access to cloud infrastructure, platform, or service, cloud forensics must be performed to find out that who is behind the attack. To perform forensics in cloud environment, we need to identify and to analyze potential evidences, network traffic, registry, web browser history. Log acquisition is the process to collect log from available sources such as operating system logs,...
Today few organizations have a thorough understanding of what is on their networks at any given time. This study tries to develop Computer and Network Asset Manager (CNAM) that is a network management application which helps large enterprises, and Small medium enterprises (SMEs) service providers, manage their data centers and IT infrastructure efficiently and cost effectively. CANM collects information...
The Trigger and Data Acquisition (TDAQ) and detector systems of the ATLAS experiment deploy more than 3000 computers, running more than 15000 concurrent processes, to perform the selection, recording and monitoring of the proton collisions data in ATLAS. Most of these processes produce and share operational monitoring data used for inter-process communication and analysis of the systems. Few of these...
This paper presents a cheap and simple health monitoring system which is well applicable at home or in an institution. The system provides a good opportunity to gather and store health information about one or more observed patients. The collected information can help analyze the patient's state of heath. In the regularly gathered information the analyzer methods can search patterns which refer to...
In this paper we present an ambient intelligence system for modelling and control of power use within an office environment. We define a multi-scale model of the office worker, consisting of a coarse grained office user profile, together with a fine grained characteristics model to summarise their behaviours. Sensor data gathered from individual offices are used to create these models. Collected data...
This paper described a new geothermal intelligent management information system for the development of geothermal resources with the character of geothermal development and exploitation. The geothermal intelligent management information system includes nine powering module such as the GIS(Geographic Information System) second development module, visual management module, communication module, the...
Aiming at the independent distribution units of multi-access system, a remote door access management system is researched and designed based on Ethernet. The system uses MSP430F149, together with W5100, to be the control core of every access system unit, and to achieve real time data communication between the access controller and the upper monitor based on TCP/IP protocols. The communication mode...
Functions and features of configuration software are introduced. They are discussed in details the design project, function and realization of real-time monitoring water supply system in configuration software and the result is given. The project has been in use in water supply system of Xi'an Xianyang International Airport. It indicates by operation that the design project is practical and stable.
With the rapid development of Internet and information technology, network office, network education, paperless office has become increasingly popular. Computers and network have become the effective and essential tools of schools, families and enterprises. However, with the popularity of Internet behavior in a work or study environment, the problem that students and employees use the computer and...
This paper mainly deals with the data exchange by DDE technology between the higher engine system and site equipment. The system reads the data to Excel with realtime reports, or stores data to Access database, then generates history reports in flexible way with different inquire conditions. The role of communications protocol in monitoring and other applications is briefly introduced. By using VB...
The paper proposed a new management mode with a wireless management module based on GPRS and a wired network based on Winsock, with contrasting and analyzing the two management modes (wired network mode and KVM mode) about datacenter. Then implementation theory and technical solution of this mode were analyzed and illustrated, the system was designed. System experiment shows that the datacenter remote...
This paper analyzes the status of the computer lab and traditional management of several problems, made use of its software and manage the development of secondary development of access control systems and remote video monitoring systems to automate the management of design. Realization of the system mainly uses the middleware technology, pattern recognition, data mining technology to solve the organic...
Aiming at many monitoring systems focusing on real-time monitoring and so being difficult to more directly and conveniently understand the software performance issues by the historical data analysis and remote monitoring, this paper presents a server performance monitoring system program based on B/S mode. The program is divided into two main functional modules: the monitoring of current use of resources...
This paper presents the structure of buffering application used to store measurement information in an industrial monitoring software system. The buffering application is residing on the data acquisition computers and saves the values of the monitored measures in the unfortunate case of a network failure between the acquisition and server computers. Several development options are presented (with...
One of the main and serious threats on the Internet is Spam. Spam refers to the abuse of electronic messaging system by sending unrequested bulk messages randomly. Botnets are considered one of the main contributors to the sources of spam. Botnet refers to a group of software called bots. The function of these bots is to run on several compromised computers autonomously and automatically. Spamming...
With the increase of the amount of data and users in information system, the requirements of data integrity in system need to be improved as well. This article presents a data integrity checking method based on MD5 in order to ensure that the data of information system is in correct state. It also elaborates the principle of MD5 algorithm, researches a way to utilize data integrity checking method...
Most of transformer substations had installed all kinds of online monitoring systems of electric equipment, these systems were usually independency and redundancy, so they can not share computer resources each other, and it is not in favor of examining insulation states. A Support System for High Voltage Electric Equipment Condition-based Maintenance of Transformer Substation based on whole transformer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.