The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Compared with logistics of ordinary things, Chemical Logistics is flammable, explosive, toxic and corrosive and other characteristics. Storage and transport of specialty chemicals has inevitably brought a series of serious problems and potential problems because of its particularity, so the safety of chemical logistics management is very important. How can the implementation of the chemical products...
We often receive unwanted information from a variety of electronic systems mainly through emails, electronic boards and messengers, called spam. Spam is the use of electronic messaging systems to send unsolicited bulk messages indiscriminately. Widely varying estimates of the cost associated with spam are available in the literature. However, a stochastic and quantitative analysis of the determinant...
In general the idea of remote monitoring of various equipments and devices over the Internet is becoming a desirable practice in the process plants industries over the few decades. Over the years, there has been constant increase in the development of industrial automation through remote monitoring and diagnosis virtually through computers and Internet. The strong emphasize on the automatic XML report...
The Internet occasionally experiences large disruptions arising from both natural and manmade disturbances. It is of significant interest to develop methods to characterize these events. The characterization comes in the form of detecting disturbances early in their evolution, providing a classification of disturbances, and locating disturbances within the topology of the Internet. This paper presents...
This thesis investigated how performance of today's IP traffic metering and analysis applications can be improved by moving from a centralized, high-performance infrastructure, which executes these tasks, to distributed mechanisms, which combine available resources of multiple devices. The results achieved show that distributed IP traffic metering and analysis leverages bottleneck problems. The distributed...
The development of network economy and the transformation of business model (traditional business model transfers to the electronic business model) have a huge impact on the existing financial accounting. In the network economy, the traditional accounting business process exposes some limitations, which can not satisfy the needs of information users. As an accounting information system based on the...
With the development of information technology and network communications, accounting information system gradually move away from single version or manual operation, and become network accounting information system, which are low-cost, fast degree, real-time, paperless, efficient at the same time and also face openness and information technology risks. This paper analyses risk from network itself,...
The development of the E-business which is lying in the information and the network technology causes the market competition to be more intense. It becomes the key to the enterprise's competition between the supplier and consumer. It is the supply chain of the core enterprise in the enterprise's competition. This paper mainly describes the definition of E-business and Supply Chain management, and...
Building Equipment Internet of Things is a network which can connect all kinds of equipment in buildings together. This paper develops a management system for Building Equipment Internet of Things, which not only can acquire equipment operation parameters, environmental data and person location infomation, but also can publish these data to the Internet. The architecture of this system and some important...
We present a methodology for the real time alignment of music signals using sequential Montecarlo inference techniques. The alignment problem is formulated as the state tracking of a dynamical system, and differs from traditional Hidden Markov Model - Dynamic Time Warping based systems in that the hidden state is continuous rather than discrete. The major contribution of this paper is addressing both...
It is proposed to introduce the real-time video digital watermarking technology into the monitoring of the Internet TV which is out of International broadcast and TV system, building an effective monitoring system to resist the spread of illegal and pirate information. The monitoring system is expected to be of powerful operability, scientificity, strictness, normality and procedural. The system will...
Wireless VoIP is becoming an increasingly important application in recent years. This fact, coupled with the increasing interest in location based services, strongly suggest that tracking of wireless VoIP clients will become a widely deployed feature in emerging wireless applications. In this paper, we evaluate the capacity of WiFi networks carrying VoIP and tracking sessions for our novel architectures...
This paper discusses the challenges in searching imposed by the burgeoning field of Internet of Things (IoT). It first overviews the evolution of the new field to its predecessors: searching in the mobile computing, ubiquitous computing and information retrieve. Then, it identifies four research thrusts: architecture design, search locality, real-time and scalability. It also sketches several presumptive...
This paper puts forward a kind of design and implement about remote RFID reader communication control system, based on the Internet network. It particularly expatiates/OS-(the embedded real time operating system)'s replant process and multitasking environment, in which the hardware and software about the communication between the microcontroller LPC2210 and RFID reader is designed and implemented...
This paper will explain what a deterministic system is, why it is important for real-time mission critical control systems to be deterministic, and provide examples of what types of network protocols should be selected in order to ensure deterministic behavior. In evaluating determinism, the need to consider not only network throughput and latency, but also delay variability or jitter will be discussed...
Congestion control has become a research hotspot, because of the rapid growth of Internet. Random Early Detection (RED) algorithm is the most effective active queue management (AQM) techniques. This paper describes RED algorithm and its derivatives then presents a new algorithm. The packet-marking probability linearly with the average queue length is improper for the arrival packet at the gateway...
The evolution of the World Wide Web (WWW) service has incorporated new distributed multimedia conference applications, powering a new generation of e-services development, and allowing improved interactivity. Most common interactive real-time applications are fault-tolerant but suffer from QoS limitations; low-latency requirements and reliability are cumulative to conference success, it may easily...
Push message delivery, where a client maintains an “always-on” connection with a server in order to be notified of a (asynchronous) message arrival in real-time, is increasingly being used in Internet services. The key message in this paper is that push message delivery on the World Wide Web is not scalable for servers, intermediate network elements, and battery-operated mobile device clients. We...
Streaming media protocol-based applications share communication resources with regular Network/Internet traffic. So, they are exposed to any existing security attacks. In the present paper, we measure this relationship between attacks and applications by introducing a probabilistic verification evaluation. Our approach is novel in that, it is based on the concurrency between models. In addition, the...
The rapid scaling up of Networked Control Systems (NCS) is forcing traditional single-hop shared medium industrial fieldbuses (a.k.a. fieldbuses) to evolve toward multi-hop switched fieldbuses. Such evolution faces many challenges. The first is the re-design of switch architecture. To meet the real-time nature of NCS traffic, and to lay a smooth evolution path for switch manufacturers, it is widely...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.