The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In most existing video surveillance architectures for fleet management, a vehicle sends entire video stream back to the central server. This wastes bandwidth and cost. In this paper, we present a fleet management system that provides real time video surveillance function. Only when a surveillance service is initiated, an immediate peer-to-peer connection is built through the interactive connectivity...
The drift ice is very seriously that impact the navigation safety and port operation in Yalujiang estuary area. By collecting the datum of hydrometeorology, geomorphology and ice regime in Yalujiang estuary for many years, systematically analyzed the characteristic of drift ice influenced by the ocean current, wind and geomorphology. The destruction mechanism of navigation mark by drift ice are studied,...
Power shaving has recently been proposed to dynamically shave the power peaks of a data center with energy storage devices (ESD), such that more servers can be safely hosted. In addition to the reduction of capital investment (cap-ex), power shaving also helps cut the electricity bills (op-ex) of a data center by reducing the high utility tariffs related to peak power. However, existing work on power...
Transfer data in only one network segment is not a sticky work. However, communication between different network segments is worth studying. Especially when one or both sides network segment behind NAT devices. This text has a brief description about the classification of NAT, and explains the problems that need to be solved about NAT traversal. According to the features of NAT and the needs of our...
This paper describes the standard or test bed-agnostic interfaces offered by Community-Lab an exemplifies its use in a reference experiment, the Island Connectivity Experiment. The experiment provides a web application that shows a matrix of network measurements across a slice of test bed nodes from different community networks in the test bed. The experiment uses test bed-agnostic and interoperable...
Internet usage is increasing very rapidly. Increased usage of IP telephony and internet is increasing the need for unique IP addresses. IP address can be reused by using Network Address Translators (NAT). NAT is used for reusing IP addresses by connecting a series of nested private networks to public network under a single public IPV4 address. STUN and TURN protocols are used to identify the hosts...
This paper describes a demonstration of a novel architecture that frees service providers from having to design a direct connectivity mechanisms between end users. To confirm the applicability and validity of our proposed architecture, we assumed three use cases: machine-to-machine home security, content distribution service and real time network game services. The results of our implementation confirm...
Session Initiation Protocol is an IP based signaling protocol. SIP messages carry other protocols / messages in its body field to specify the details about the type of session to be initiated / modified / disconnected. SIP messages carry Session Description Protocol in order to negotiate capabilities between peers. SIP messages do not define any specific MIME type to carry only ICE candidates, in...
Phishing is one of the most common attacks on the networks today and a primary enabler for fraud and identity theft, and the increasing sophistication of the phishers makes it very difficult for users to distinguish between genuine and fake. Thus, it is important to mutually authenticate each other. The mutual authentication between two entities is essential to establish a secure link over public/closed...
Digital Accessible Information System format (DAISY) is designed for vision impaired users to access to electronic document. The purpose of this project is creating a reliable and free one-way audio link over the Internet to provide low-cost DAISY format transmission, which support vision impaired users to access and listen DAISY books as audio stream through the link. By connecting to this link,...
Electric vehicle (EV) does not offer the same advantages and disadvantages than ICE car. User behavior of EV is certainly influenced by the specificity of their vehicle as: autonomy, significant recharge time, as well as the recovery of braking energy. As a result, profiles uses of EV may be different from those already known for ICE equivalent cars. This paper proposes a characterization method and...
Finnish Meteorological Institute has instrumented coastal radars with radar servers for coastal ice field monitoring. The servers capture the radar data and processes one image per revolution with given parameters. The image time series provide real time high temporal and spatial resolution data on ice characteristics and are accompanied by kinematic products. The data are used in research and provided...
The concept of cloud computing is based on the time-sharing of costly resources and advantages of the economies of scale. Cloud computing applies conventional supercomputing, or high-performance computing power, to perform computations in consumer-oriented applications. It is a result of exploring ways and means to ensure availability of computing power to users through sharing of resources and algorithms...
Power shaving has recently been proposed to dynamically shave the power peaks of a data center with energy storage devices (ESD), such that more servers can be safely hosted. In addition to the reduction of capital investment (cap-ex), power shaving also helps cut the electricity bills (op-ex) of a data center by reducing the high utility tariffs related to peak power. However, existing work on power...
Large scale companies and institutions often have huge amount of electronic computing systems, these systems usually vary in hardware architecture, operating system and even network communication mode. They were built in different years, using different technology and platform, namely they are heterogeneous. How to maintain and upgrade these systems consistently is a big problem. This paper proposes...
Nowadays, while visiting services on the remote machine, the developer often need give the address information to the procedure. There are primarily two schemes for the developer offer parameters design. The first one is that giving the parameters by the parameter list of function. The second is that the program transfer parameters by the file of address information. For the first scheme the user...
This paper presents a solution of measurement and control network based on ICE distributed middleware in connection with features and requirements of distributed measurement and control system. Taking example of space tracing ship system, this solution not only achieves efficient network communication in heterogeneous environment, but also realizes functions in the measurement and control network...
There has been a rapid expansion of renewable energy such as wind power and solar power in recent years. However, when the generated power flows into a power system the frequency fluctuation occurs by the unbalance of power supply and demand is concerned since the output of wind power or solar power changes every moment. Therefore, this paper presents a new frequency control method of the power grid...
User authentication is critical in preventing system breaches. Existing authentication approaches usually do a onetime log-in authentication, but rarely incorporate mechanisms to differentiate the initial log-in user and the user who is currently taking control of the system, which may cause post-authentication breaches. In this paper, we study user authentication for both login session and post-authentication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.