The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Internet of Things (IoT) connects physical world to the cyber-world, which may impose predicable and unpredictable changes to enterprise business models and our everyday life. In this paper, we propose a model to describe the impact of IoT on the material, information and capital flow as well as carbon footprint through the supply chain, and further support the model with possible business scenarios...
This paper introduces the relevant contents of the software interface and web page display for LXI instruments. Based on the hardware and software environments, two methods of implementing the software interface for LXI instruments are introduced. The realization of operating panel with W3C for LXI instruments is described in detail. The techniques of implementing real-time interactive operating interface...
This paper proposes a small, power saving embedded Web server for home appliances. The proposed device operates with a real-time operating system on a 32 bit RISC microprocessor. A TCP/IP protocol stack, HTTP, FTP, SNTP server and client applications were developed. The prototype server requires one fortieth the power of a general server using a PC. The software resources are about 1.8 MB. Demonstrations...
Multi-player online gaming is one of the most popular applications on the Internet nowadays. Due to the mobility requirements and the growing popularity of WiFi services, a significant number of users access the Internet through IEEE 802.11 Wireless LAN. Hence, the performance of highly interactive real-time online game under wireless environment is receiving attentions from researchers. In this paper,...
To ensure the safe and stable operation of wind farms, it is necessary to monitor the various operation parameters real-time. This paper introduces the Embedded Web Server technology; using DSP+ARM double CPU structure, designs and realizing the wind farm remote monitoring system based on the Embedded Web Server. This system also realizes the dynamic interaction and multiple user authentications for...
For the Internet of Things (IoT), this paper analyzes several required characteristics of the objects, investigates key technical considerations to solve problems and illustrates enhanced services using smart objects.
Compared with logistics of ordinary things, Chemical Logistics is flammable, explosive, toxic and corrosive and other characteristics. Storage and transport of specialty chemicals has inevitably brought a series of serious problems and potential problems because of its particularity, so the safety of chemical logistics management is very important. How to achieve real-time monitoring chemical logistics...
The concepts and principles of layered design method and collaboratively using of different tools for developing network application system are presented in this paper. The recommended layered architectures are given respectively for the applications based on Client/Server model, Distributed Computing model and Web Database model. The advantages and disadvantages of layered design are also analyzed...
The popularization of the Web and the advent of new information and communication technologies of mobile devices make possible new aspects for management, interaction and information sharing. In petroliferous area, monitoring systems on mobile devices have been used for process optimization, data monitoring, reporting, alarm generation and identification of failures in real-time on oil wells platforms...
Motivated by existing gaps and inefficiencies in the paper-based manually processed disease surveillance and notification systems in India and Sri Lanka, the Real-Time Biosurveillance Program (RTBP) introduces technology to health departments in Tamil Nadu, India and Sri Lanka, to answer the question: “Can software programs that detect events in public health data, and mobile phones that collect health...
This paper is based on NDRC project "National Large and medium-sized agricultural products market informatization construction projects," developing the logistics process of real-time tracking management system for real-time Management of agricultural products in China. The real-time monitoring system of the logistics is designed with four subsystems: testing the temperature and humidity...
Ad hoc collaboration across organizational boundaries is gaining importance. In a networked world, organizations interact across diverse system landscapes with partners and customers. Traditionally, facilitating the collaboration of dispersed participants in heterogeneous environments required the same software on all client systems. This entry barrier can be lowered by leveraging the ubiquitous web...
The following topics are dealt with: intelligent systems; soft computing; operations research; bioinformatics and biomedical simulation; discrete event and real time systems; signal processing; human factors, social and economic sciences; civil, mechanical, chemical, industrial, manufacturing and control engineering; energy, power generation and distribution; virtual reality, visualization and computer...
"Clickable Real World" is a new methodology to retrieve real-time real-world information from the web. The key point is that the query here is the name and the attributes of a given landmark, which is given by taking a picture of the landmark by a mobile phone camera. The user can feel to directly click the landmark in front of him/her by the shutter clicks. One of the great advantages of...
Recently, the variety and vastness of computer networks have increased rapidly. To keep networks stable and reliable, network administrators have to understand the nature of network traffic flows. We have developed a cardinality-analysis method that analyzes cardinalities in TCP/IP headers. The cardinalities can be used to detect abnormal traffic such as DDoS attacks and Internet worms. However there...
This paper aims to investigate the public information consultation service (PICS) of e-government in China after the promulgation and implementation of `The Regulation of the People's Republic of China on the Disclosure of Government Information'. A survey is carried and finds out that at present, PICS of Chinese e-government are for more remain at the initial stage of publishing certain information...
Several peer-to-peer solutions have been newly suggested in recent years to resolve the problems in the existing P2P architecture such as Soribada and Napster as well as the client/server architecture. We design a content-sharing application based on the JXTA that is a P2P solution of the Sun Microsystems. It is for a community activity and has seven modules to share several kinds of contents with...
Realizing the software based on MIDI (Musical Instrument Digital Interface), with which MIDI instruments geographically distributed over Internet could be real-time played or synthetic performed. By access local MIDI input instruments to obtain signals, the software can help access local MIDI input instruments to implement local play. At the same time it can also obtain MIDI message in real-time and...
This paper propose a novel call admission control (CAC) scheme that considers real-time and non-real-time nature of a call before allocating resources for its progress in a network. The scheme accumulates the benefits of different CAC schemes for best optimization of the available resources. It has combined the three major schemes- reserve guard channel, buffer based and prioritization. Application...
In the past few years, social networking websites such as Facebook and Myspace become very popular. The usage rage of social networking websites even exceeds that of Google. Followed by the popularity is many potential networking threats. How to prevent and improve these threats to avoid their expansion has become a major challenge. This paper categorizes social networking websites into three main...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.