The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we give an introduction to Chinese standard Universal Transport Interface (UTI) for digital television receiving devices. UTI standard, with independent intellectual property rights, is based on the high speed USB2.0 physical interface. It has two logical interfaces: TS interface and command interface. It aims not only to support the conditional access (CA) service, but also to support...
In this paper, we carry out a detailed investigation on two Train Inauguration Protocols proposed by WG43 for IEC 61375-2-5: ETB Train Inauguration (ETBTI) and Train Topology Discovery Protocol(T2DP). ETBTI uses Layer 2 LLDP to discovery neighbor peers and uses Layer 3 ETBIP to broadcast the information of single node to all the others. On the other hand, T2DP focuses on Layer 2 and modifies LLDP...
Syslog play an increasingly important role as a technological means of security audit in the monitoring equipment and resources. From the actual needs,the project design and realize audit logging . Compare the differences between RFC5424 and RFC3164, and achieve the syslog protocol with rsyslog. The project use PHP programming to implement user management interface and support to query log with Combination...
In order to improve the security and performance of authentication protocol in manufacturing grid, identity-based authentication protocol under standard model is constructed. Combining with the environment of manufacturing grid, this protocol can work under escrow and non-escrow models and different trust domains model. By introducing pseudo random function set, new authentication protocol realizes...
When speaking about high speed transfer, generally one thinks of 1-10 Gbps throughput. At the same time in case of a low performance device, 10-20 Mibps is also considered as high speed. The present case discusses the MOD5270 Ethernet module by Netburner Inc. for the 147,5 MHz processor of which it was a challenge to achieve this speed. The plan was to achieve 48 Mibps, however, according to the manufacturer...
This paper presents a new NoC Interface (NI) targeted for improving the performance of the Micronmesh Multiprocessor System-on-Chip (MPSoC). The previous version of the NI called Micronswitch Interface (MSI) can zero-copy messages as it sends and receives them. It offloads also some functionalities of the communication protocol from software (SW) to hardware (HW), but interrupt processing produces...
Consciously or unconsciously, we are using many kinds of “cards” in our daily lives. Among them, credit card, cash card, driving license, etc., are as important as our wallets. To protect the card holder from malicious use of his/her cards, it is necessary to authenticate the card user. For this purpose, a common practice is to ask the user to provide some key information (usually password) known...
Logistics management is concerned with the planning, implementation and control of the movement of physical objects and the associated information. This associated information is the domain of logistics management information system (MIS). In recent years, the ability to realize the profit and strategic potential of efficient and effective logistics of garment commodity has increasingly depended on...
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
Network Management Protocol based on SNMP has get wide application in TCP/IP. MIB is the common interface among functions of network management subsystem, and it is the key of implementing network management. This paper discusses the structure of MIB, the syntax of ASN.1 and the performance of MIB.
With the CAN/LIN network using in the Automobile Body Control System widely, in order to economically achieve the reliable communication in the vehicle, this article has designed a communication gateway based on ARM968E-S.This scheme introduces characteristics of ARM controller (LPC2919/01) and the CAN receiver (CTM1050T) in particular, achieved the software and hardware design of the CAN/LIN gateway...
This paper discusses the characteristics and key techniques of 3G mobile learning based on cloud services. Our research mainly focuses on mobile learning mode including active mode, passive mode and hybrid mode. And personalized learning method and resource integration approach are applied and analyzed. At last, we propose to employ cloud computing to mobile learning and build basic framework and...
Since the late 1980s, the simple network management protocol (SNMP) as the Internet management standard has been developed. The management of IP networks has exclusively relied on the SNMP. But the SNMP management framework has some weaknesses especially related to extensibility configuration management and efficient application development processes. Today, researchers and developers in the network...
The railway signaling system is a safety related system composed of several sub-systems which have to exchange information with each other. As the communication system may be subjected to intentional or unintentional external attacks, the application of specific safety techniques is necessary. In this paper, a safety protocol is designed. Compared with the general TCP/IP protocol, a safety layer,...
A CAN-BUS communication module for embedded system has been proposed in this paper, together with its hardware and software design. The motivation to design such CAN module is try to ease the development of CAN-BUS based embedded applications. With the CAN module, the engineers do not have to understand all aspects of CAN protocol, CAN controllers and CAN transceivers, therefore an industry automation...
Leslie Lampor proposed the theory of Temporal Logic of Actions(TLA),which can express model program and logical rules in one language at the same time. Secure Electronic Transaction(SET) is an secure protocol for e-commerce, Based on the open network and paying with credit card. The agreement defines the whole process of the internet transactions. And it has a complete authentication. Based on the...
Remote monitoring system based on GPRS is a modern monitoring system which is compose of radio communication technology, signal collection and computer network technology. This article introduces a wireless coal mine monitoring system based on GPRS communications technology. This system proposed in this paper has achieved a good result in the test.
The behavior adaptation of Software component is a crucial problem in component-based software engineering. Software component adaptation aims at generating, as automatically as possible, adaptors to compensate behavior mismatch during components interaction, and ensure the deadlock-freedom of components interaction at the architectural level. A general and safe approach is proposed to solve the behavior...
Voice over Internet Protocol (VoIP) over a wireless local area network (WLAN) is poised to become an important Internet application. However, unacceptable VoIP performance in the presence of coexisting traffic from other applications is still one of the major problems standing in its development way. For this point, in this paper, a novel adapted adjustment packet segmentation method is proposed to...
The recent interest in Wireless Sensor Networks has led to a number of clustering algorithms that use the limited energy available at sensors more efficiently. In this article, we present a heritable clustering algorithm based on HEED for low energy wireless sensor network. It brings in appointment mechanism to reduce the cluster head reelect overhead efficiently. In the cluster, TDMA communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.