The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio frequency identification (RFID) uses wireless local area network technology, which limits its scope of application. And the data security isn't well protected because of the limited hardware resource of cheap electronic tag. In this paper, we realize the combination of TCP/IP and RFID technology by the Ethernet interface of SAMSysMP9320 reader/writer. This is accomplished by assigning IP address...
Dual-core platforms are growing as a new industry trend as platforms with only one core cannot easily perform the diverse functions in current embedded system applications, such as smart phones. We establish an easy-to-use co-simulation dual-core virtual platform to validate the functionality of hardware and software jointly. In our platform, the hardware components are implemented by SystemC, and...
Three dimension (3D) graphics applications have been widely used in handheld devices which are an inevitable tendency in the future. In this paper, we model a complex 3D graphics SoC hardware by using SystemC and run some testbenches on this platform. For speeding up the simulation time, we adopt Transaction Level Model (TLM) and implement two type of rendering approaches, tile-based and triangle-based,...
Quality of the service (QoS) plays an important role in the life-cycle of scientific workflows for composing and executing applications. However, the quality of network services has so far rarely been considered in composing and executing scientific workflows. Currently, scientific applications tune the execution quality neglecting network resources, and by selecting only optimal software services...
Different mutation operators have been developed in evolutionary programming, such as Gaussian mutations, Cauchy mutations, Lévy mutations, and some mixed mutations. Experimental results have often been focused on comparisons of performance among different mutations. Besides measuring the performance, this paper discusses how to evaluate Gaussian mutations, Cauchy mutations, and Lévy mutations using...
Syslog play an increasingly important role as a technological means of security audit in the monitoring equipment and resources. From the actual needs,the project design and realize audit logging . Compare the differences between RFC5424 and RFC3164, and achieve the syslog protocol with rsyslog. The project use PHP programming to implement user management interface and support to query log with Combination...
Exclusive-OR (XOR) gate is one of the critical components in many applications such as cryptography. In this paper, we present an efficient multi-input XOR circuit design based on pass-transistor logic (PTL). A synthesis algorithm is developed to efficiently generate the PTL-based multi-input XOR circuits. Both pre-layout and post-layout simulation results show that our proposed multi-input XOR design...
DDoS attack is a major Internet security problem-DoS is that lots of clients simultaneously send service requests to certain server on the internet such that this server is too busy to provide normal services for others. Attackers using legitimate packets and often changing package information, so that traditional detection methods based on feature descriptions is difficult to detect it. This paper...
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
Network Management Protocol based on SNMP has get wide application in TCP/IP. MIB is the common interface among functions of network management subsystem, and it is the key of implementing network management. This paper discusses the structure of MIB, the syntax of ASN.1 and the performance of MIB.
In order to improve the management efficiency and convenience of the access control system in intelligent building, according to the new demand, a network entrance guard management software has been in this paper developed based on original software for single computer system. Inquiring real-time network data, browsing real-time information and long-distance monitoring can be realized by use of the...
This paper investigates the intra-fleet and inter-fleet model for the solution of crew scheduling problem during airline irregular operations. The intra-fleet model is widely adopted in the airline industry where flight is grouped together and works typically within a fleet. The inter-fleet model on the other hand, splits of flight attendant groups and reassign of them across different fleet. Though...
Since the late 1980s, the simple network management protocol (SNMP) as the Internet management standard has been developed. The management of IP networks has exclusively relied on the SNMP. But the SNMP management framework has some weaknesses especially related to extensibility configuration management and efficient application development processes. Today, researchers and developers in the network...
The railway signaling system is a safety related system composed of several sub-systems which have to exchange information with each other. As the communication system may be subjected to intentional or unintentional external attacks, the application of specific safety techniques is necessary. In this paper, a safety protocol is designed. Compared with the general TCP/IP protocol, a safety layer,...
The rapid development of Networks and distributed computing technologies enables inter process communication mechanism more and more important, semaphore has many advantages in the distributed inter-process communication mechanism. This article is based on the daemon and provides implements of semaphore mechanism in the distributed system inter process communication, then associates it with the traditional...
Remote monitoring system based on GPRS is a modern monitoring system which is compose of radio communication technology, signal collection and computer network technology. This article introduces a wireless coal mine monitoring system based on GPRS communications technology. This system proposed in this paper has achieved a good result in the test.
Voice over Internet Protocol (VoIP) over a wireless local area network (WLAN) is poised to become an important Internet application. However, unacceptable VoIP performance in the presence of coexisting traffic from other applications is still one of the major problems standing in its development way. For this point, in this paper, a novel adapted adjustment packet segmentation method is proposed to...
RS485 Bus is adopted in part of communication structure in the process of remote control communication. Different RS485 communication line is difficult to integrate due to different control systems and communication protocols. Based on this, this paper presents a method which can integrate the original RS485 communication line together without damaging the existing RS485 communication structure, that...
In this paper, an intrusion detection model is proposed based on multilayer perceptrons neural network . In this model, HISTORY is used to collect data. Then, the data stream is converted its' data structure for preprocessing. We use pattern matching module to filter out some of the known intrusions, in oder to reduce the load of the next step on intrusion detection, and the efficiency and accuracy...
Multimedia communication networks have a large amount of data to transmit and should have high real-time performance. The requirement of their reliability is different from general computer networks. In this paper a kind of redundant technology based on hierarchical method is proposed. According to the idea of modular design, multimedia communication networks can be considered as two parts: bearing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.