The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
VLBI (Very Long Baseline Interferometry), which combine many telescopes by the technical of interferometry, can achieve the effect of a large telescope observations. With the development of high-speed network, telescopes achieve real-time observation by network connection, which is called e-VLBI. In this paper, the network connectivity of radio telescope in China and Europe for e-VLBI is briefly described...
For the increasing demand on campus network, IPv6 (Internet protocol version 6) is going to replace the IPv4 protocol. IPv6 is playing an important role in many fields. Wireless sensor networks (WSNs) are undergoing rapid progress and attracted the attention of both the academic and the industrial research community in the last few years. This paper reports on the development of these protocols at...
A new approach was presented for MAS development under the Semantic Web circumstances which was named MDJSW (MAS Development Joined with Semantic Web). According to this method, the usage of Semantic Web standards for describing the knowledge structure isolates domain knowledge modeling from system architecture to support iterative and parallel development. Furthermore, OWL and SWRL language are employed...
Data consistency protocol for supporting client coherency and data integrity imposes great impacts on the performance of distributed file systems. This paper proposes a new form of data consistency protocol which aims to enhance I/O performance of various applications. Different from the past works, multiple acquisition functions are adopted to establish a desirable lock schedule, according to the...
A web service security analysis model based on program slicing is proposed, which can be used to find existence of critical information disclosure vulnerabilities and proliferation of such vulnerabilities in a web service net, and eventually improve protection of critical information. Web service protocol is analyzed to obtain external service interfaces; source code is sliced to obtain interface...
The Network Configuration Protocol (NETCONF) is proposed as a new solution for efficient configuration management of heterogeneous network devices. So the NETCONF-based distributed network management becomes a hot topic. In this paper, Web services and Peer-to-Peer (P2P) technologies are introduced in distributed network management to solve the problems of data collection, data sharing and locating...
Active replication is a common approach to handle failures in distributed systems, including Event Stream Processing (ESP) systems. However, one weakness of conventional active replication is that replicas, being equal and in the same state, are susceptible to common-mode crashes due to software bugs. We propose a new approach to active replication that assumes a failure model stronger than fail-stop...
In this paper, a novel key group agreement scheme based on two-tier architecture in wireless Ad hoc network is proposed. A centralized group key agreement is applied in the lower layer of network, and a distributed group key agreement is applied in the upper layer of network. Therefore, it gains the advantages of two key agreement modes to increase network flexibility and group key updating efficiency...
Current text messaging protocols over the world allow a rigid limit of 160 characters per SMS, using the default messaging system of the mobile. However this limit is often found to be too less under ordinary circumstances and very often, to communicate effectively, a concatenated message needs to be sent. This, coupled with exorbitant messaging rates adds to the reduced effectiveness and decrease...
In order to improve and to shorten product and production development as well as to reach a higher planning and product quality, in industrial companies the use of software tools is state of the art. Particularly in the field of manufacturing process planning known as Digital Manufacturing a wide range of different and specialized software tools is used, e.g. in assembly planning, logistics planning...
This paper proposes a novel transactional memory design: conflict graph based hardware transactional memory. It allows two conflicting transactions both to commit if they do not violate the condition of serializability. Simulation results show that conflict graph based hardware transactional memory outperforms the state-of-art transactional memory system.
Fault-tolerance is an important research topic in the study of distributed systems. To counter the influence of faulty components, it is essential to reach a common agreement in the presence of faults before performing certain tasks. However, the agreement problem is fundamental to fault-tolerant distributed systems. In previous studies, protocols dealing with the agreement problem have focused on...
In order to imitate the channel characteristics of 802.11n WLAN, this paper analyzes channel model mechanism of Markov stochastic process and implements the extensional module of 802.11n channel in NS2. In the end, through comparing simulation results with standard TGn model, we verify the accuracy of this module which provides efficient physical layer channel simulation foundation for the research...
Progress in wireless communication has made possible the development of low cost wireless sensor networks. In recent years, as the development of wireless sensor networks, people have done some research on cluster-based protocol, about the proongation of the lifetime of WSN and decrease of energy consumed by the sensors. Clustering sensor nodes is an effective topology control approach, but these...
In combination with the specific conditions of water plant, the paper puts forward the opening information monitoring system structure for industrial process based on Web technology. From system development perspective, the key techniques of the system development, including Web application development, NETDDE and Socket data communication, ODBC access, data gather, control tactic and real-time data...
An ETC system based on RFID technology uses radio wave to identify cars passing through the toll collection site and automatically debits toll rate from the car owner's pre-paid account. RFID technology and its application in highway ETC system is analyzed in this paper. SNMP is a kind of protocol that has been widely used in network management system for many years. Because of its easy use and strong...
Large-scale complex infrastructures are emerging as new computing platforms for the federation of world-wide mission critical systems over the Internet. However, standard approaches to data dissemination are still not adequate to the scale of these systems. The best-effort delivery guarantees of the Internet and the occurrence of node failures may compromise the correct and timely delivery of data,...
With the construction of mobile communication network system, the need of building an integrated network management system based on specialized network management using GIS technologies become more and more necessary. By analyzing the current status of mobile communication network management system, this paper proposes that using ArcGIS, Java, Flex and other technologies to implement the integrated...
Model-based testing helps test engineers automate their testing tasks so that they can be more cost-effective. When the model is changed due to the evolution of the specification, it is important to maintain the test suites up to date for regression testing. A complete regeneration of the whole test suite from the new model, although inefficient, is still frequently used in practice. To handle specification...
To promote the information technology development of the enterprise, achieve information integration and data share between different fieldbuses, by means of analyzing communication bus of industrial control system, the principle of the fieldbus protocol conversion is discussed. According to the basic construction of network, a scheme of fieldbus conversion is designed to accomplish the communication...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.