The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to achieve ISO standard IEC-18000-2 for RFID air interface and transfer the RF data read from device through computer network, the design of the radio-frequency identification system based on uC/OS-II(a real-time operating system) and data transfer on UDP protocol are proposed. This passage introduced the design of system hardware and emphasized the process of software implementation and...
Network access control with intrusion detection system capabilities is currently being used to monitor and protect networks from malicious activities. In this paper, we propose a 3-tier architecture of a network access control that uses mobile agents to help reduce the shortcomings of currently available network access control devices. Our idea is to make use of the inherent characteristics of mobile...
Traffic monitoring and analysis is of critical importance for managing and designing modern computer networks, and constitutes nowadays a very active research field. In most of their studies, researchers use techniques and tools that follow a statistical approach to obtain a deeper knowledge about the traffic behaviour. Network administrators also find great value in statistical analysis tools. Many...
With the development of the computer network, and the great change in the demands of network management, any Network Management System is a process of development and perfection. Therefore, designing a rational system structure is the foundation to ensure the good scalability of the system. The main issues and characteristics of Network Management in Campus Network at present were analyzed in the...
A screen wall is a widely used application in reality and has been implemented in various methods. Traditional implementation methods always adopt dedicated devices according to specific hardware, which leads to poor portability and limited function. Compared with traditional methods, computer technology conduces to powerful image processing function. Additionally, clearer picture transmission could...
Intrusion detection is developed quickly because which has important position in network security. The method of SVM based on statistics learning theory is used in the intrusion detection system, which classifies detecting data efficiently, and achieves the aim that SVM can accurately predict the abnormal state of system. By the use of this method, the limitation of traditional machine learning method...
The availability of information technology to create content in digital form, to digitize existing printed material and to distribute all these resources over computer networks has provoked a broad public debate over the role of public libraries. This paper seeks to examine existing collaborative VRS systems with a view to achieving collaboration. This paper studies existing collaborative VRS systems,...
The VoIP suite of protocols are extended to propose a computer network capable of terrestrially storing in real time the flight data records and cockpit voice records of every commercial flight. The design process took into account the satellite access, the aviation, the black box manufacturing and the VoIP industriespsila recent developments. As a result, a system architecture development framework...
The paper deals with the design of the real-time net-worked control system (NCS) for the experimental magnetic levitation system (MLS) which is an example of the highly dynamic and structurally unstable controlled plant. The experimental system under consideration consists of the plant (MLS) equipped with sensor, actuator and a local computer responsible mainly for communication with a remote controller...
This paper discusses the use of mobile agents with timing requirements in a distributed system. The goal of this paper is to propose and to evaluate heuristics for imprecise mobile agents that should execute a mission while meeting firm deadlines. These heuristics are used to determine the itinerary of the mobile agents. They choose a behavior considering previous benefits collected by the mobile...
Distributed generations (DGs) powered by renewable energy resources have become increasingly popular and starts to show benefits, but their connection to distribution systems brings operation challenges that must be carefully monitored and controlled. This paper proposes a new network-enabled, real-time monitoring strategy for tracking the operating states of the distribution system, with a focus...
Real-time streaming media transmission is used widely in computer network, and audio-video synchronization is a key issue. Because of using RTP protocol in data transmission, the synchronization requirements can be solved if the time information in RTP data packets is used effectively. In this paper, combining actual application, RTP data packets are simplified appropriately in sending end, and implementation...
Nowadays dynamic behaviour performed by a computer network system shows the posibility to be addressed from the perspective of a control system. This paper discusses the use of Fuzzy Takagi Sugeno real time digital control with hardware-in-the-loop (HIL) magnetic levitator (maglev) using the xPC Target toolbox of MATLAB. Here the xPC Target is used as operating environment for real time processing...
The following topics are dealt with: scheduling analysis; distributed system; middleware; adaptive scheduling and control; timing analysis; computer network; real-time systems; energy management.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.