The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Virtual instrument technology and network technology combined, and building networked virtual instrument test System is the important development in today's3 society. In this paper, aiming at remote virtual instrument control by the data socket way using in the Lab view. Users can easily operate the remote virtual instrument by the release capacity of remote panel.
Recommender systems signify the shift from the paradigm of “searching for items” to “discovering items” and have been employed by an increasing number of e-commerce sites for matching users to their preferences. Collaborative Filtering is a popular recommendation technique which exploits the past user-item interactions to determine user similarity. The preferences of such similar users are leveraged...
Enterprise business strategy and IT strategy is disjointed, which leads to the failure of many IT projects. The main reason of failure is lack of IT Enterprise architecture development at the initial stage of enterprise informatization. This paper discusses the content of IT planning, enterprise architecture and their relationship, and expounds the process of enterprise architecture development using...
“Network Information System” has emerged as an important research field. Researchers in computer science have successfully developed some network technologies includes security solutions, information query protocols, and data management services. However, along with the development of wireless network technology, there is a need of solution for efficient information interaction re-scheduling in the...
Even as the rate of IPv6 deployment increases, there continues to be a number of key technical, operational and political challenges that have limited the overall adoption rate of IPv6. This paper is intended to explore the IPv6 technical features, advantages, research improvements, potential business benefits. This paper also investigates how some of the challenges have slowed the transition process...
In security protection, the hotspot of research is the linkage of intrusion detection to firewall and honeypot. At present the linkage System achieved is still limited to IPv4 Network. Based on the analyses of the structure of IPv6 NIDS, this paper aims at improving the real-time alert and accuracy of intrusion detection by means of AC-BM Fast Multivariate Matching Algorithm. The introduction of collaboration...
A flow routing for optical networking play a vital roles in maintaining packet sequence. In this paper, an analytical method is proposed in order to show the effectiveness in increasing the goodput of the router especially during the congestion period. Discarding technique has been proposed in order to measure the goodput. There are three cases that have been investigated in this research such as...
This paper proposed an improved subdivision algorithm that based on quadrilateral mesh. Firstly, we implement quadrilateral mesh preprocessing to polygon mesh by paired method, and then adopt the strategy of slowing growth in the number of edges. After each subdivision, the number of meshes increase approximately 1 times, the result of twice subdivision nearly equal to the traditional 1-4 subdivision...
The resources of actual tracing tools for Control-Plane and User-Plan traffic are limited and most of them are crashing under the task of tracing 100% User-Plan traffic. This paper proposes a new tracing system for UP&CP traffic of Packet Core networks, like GPRS-UMTS networks, in order to verify their functionality.
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS nor any anti spoofing software.
This paper designs an RFID IP core by utilizing FPGA technology, which has advantages of internal task scheduling and high-speed encoding & decoding. The RTL design of base-band communication IP core based on modular method is presented. The RFID simulation model is established and the experiment results show that the proposed communication simulation model has a good performance, and the IP-core...
this paper shows the design and implementation of a video capturing and processing system, which can collect plate-profile information and process image in the spatial domain. Strategy of buffer storage is used in the collecting part; read and write two SRAM at the same time to improve the data throughput. In the processing part using Synchronous FIFO to implement sliding window whose function is...
The packer switching service of the third-generation mobile communication network (3G) has provide a broader range of services, while wireless local area network (WLAN) has a faster speed in information transmission, thus making these two complementary functionally. However, with the improvement of technology and increasing of mobile users, it has a significant impact on network communication when...
The continuous query is the very common form in the applications of data stream. For the infinity of data stream, the semantics of multidimensional continuous query based on time window is defined in this paper. The ultimate results are continuous computed on the state of queries with arriving of new tuple. There are a voluminous number of continuous queries registered in system, so it is difficult...
Dedicated service gateways provide Network services which direct traffic flows. Currently many researchers focus on gateway selection on the Shortest Route, Closest Gateway and not much on the congestion and network traffic in this route. In this paper, we have proposed a novel approach called Optimal Closest Gateway Mechanism with load balancing technique for traffic engineering. Instead of only...
Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured...
While many offline-based detection approaches have been well studied, the on-line detection of DDoS attack at leaf router near victims still poses quite a challenge to network administrators. Based on per-IP traffic behavioral analysis, this paper presents a real-time DDoS attack detection and prevention system which can be deployed at the leaf router to monitor and detect DDoS attacks. The advantages...
Ammonium dihydrogen phosphate(DAP) is widely used in the industry. Usually this product contains impurities and substances and may not satisfy the need of modern agricultural and industrial demand, so we must dip and recrystalize for high quality product. In the process of crystallization, the nucleation rate and the growth rate are the most important parameter, then we study these parameter in order...
A mean square error (MSE) duality between the multiple-input multiple-output (MIMO) broadcast channel (BC) and the MIMO multiple access channel (MAC) is proposed,where the transmitter has partial or even only statistical knowledge of the channels and the receivers have complete channel state information (CSI). The dual MIMO MAC has transmitters with full CSI, whereas the receiver has partial CSI or...
Hybrid ARQ with Incremental Redundancy (IR-HARQ) is one of the most popular coding technique for having a reliable transmission link. The efficiency which is the ratio between the number of correctly received bits and the number of transmitted bits is a crucial metric for analyzing the performance of an HARQ scheme. In the literature, closed-form expressions for the efficiency of the IR-HARQ scheme...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.