The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In earlier, Fault Analysis (FA) has been exploited for several aspects of analog and digital testing. These include, test development, Design for Test (DFT) schemes qualification, and fault grading. Higher quality fault analysis will reduce the number of defective chips that slip past the tests and end up in customer's systems. This is commonly referred to as defective parts per million (DPM) that...
Because of the limit of the domestic configuration software which is in the use of scrutinizing the coal mine, the ActiveX technique is discussed and the design of the safety of coal mine, which utilize the ActiveX technique, is actualized. The fig of system frame and the implementation of part of modules are also given. This system can provide the friendly interface for the controlling of coal mine,...
Wireless Sensor Networks(WSN) is a hot spot of the research of wireless networks currently, the key of achieving efficient transmission business is to control node energy and improve the network lifetime in wireless sensor networks. The paper first uses Boolean sensing model based on Poisson point process to identify the function of the rate of coverage and the node density in unit area, and then...
The proposed model in this paper is the intrusion detection techniques for mobile ad-hoc networks, which use collaborative efforts of nodes in a neighborhood to detect a malicious node in that neighborhood. The technique is designed for detection of malicious nodes in a neighborhood of nodes in which each pair of nodes in the neighborhood are within radio range of each other. Such a neighborhood of...
Recent Developments in sensor networking for industrial application emphasized need for reliable integration of sensor networks with the internet. For sensor network deployed to record the industrial process parameter in various place of industry, it is important that collected information be delivered as fast as possible with minimum delays. In this paper, an integration module is proposed. The objective...
With the construction of economic and ecological zone around Poyang lake, aquatic vegetation monitoring plays an important role in promoting economic and ecological zone construction. Research on aquatic vegetation monitoring technology based on wireless sensor network (WSN) is a novel topic. However, this method is able to solve the propagation delay, floating node mobility, and high error probability,...
In order to improve the recognition rate of the early fire, this paper analyzed the relationship between the image resolution and fire recognition rate from the application point of view. On this basis, we have adopted the Dempster-Shafer evidence theory and carried on the recognition experiment to the different resolution fire image under different environmental conditions. The simulation experimental...
Wireless Sensor Networks (WSNs) have attracted significant research interest in recent years because of their suitability to a wide range of real world applications. The envisioned Internet Protocol (IP) support for WSNs requires interoperability with existing management solutions, like Simple Network Management Protocol (SNMP), in order to provide remote management functionality and assure the correct...
Nowadays, Heart related diseases are on the rise. Cardiac arrest is quoted as the major contributor to sudden and unexpected death rate in the modern stress filled lifestyle around the globe. A system that warns the person about the onset of the disease earlier automatically will be a boon to the society. This is achievable by deploying advances in wireless technology to the existing patient monitoring...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
The trust of the critical systems is very important, for the corruption of these software can result in uncountable losses. This paper describes the policy of high-reliability critical system development, including its' attributes, means and impairments. The idea, employing with redundant diverse modules to reduce the risk of failure, works very well in other many fields. According to the idea, we...
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
Tele-health is an inter-disciplinary area where the delivery of health, medical information and services over large and small distances is possible by combining electronic information with communication technologies. Deaths from cardiovascular diseases have decreased substantially over the past two decades, largely as a result of advances in acute care and cardiac surgery. These developments have...
In the era of Internet-based services, companies increasingly use Web technologies to interact. Due to the inherent heterogeneity both at data and process level, ensuring interoperability between Information Systems is difficult. To automate electronic exchanges between businesses, the classical approach is to follow strictly at runtime a common interacting protocol that must be defined beforehand...
M2M has been integrated into the national "Information Industry of science and technology develops 11th Five-Year Plan and 2020 long-term planning framework" as a key supported project. Network communication as the core of M2M technologies also restricts its development. SimCom Inc. produced SIM4100 is a TD-SCDMA/GSM mobile communication module solution. The article designs the minimal M2M...
The modern antenna design structure requires lowloss, low-dispersion, dimensional robustness and design flexibility. Continuous Transverse Stub (CTS) is an antenna technology that offers greater tunable bandwidth than waveguide or Microstrip patch antennas. This paper proposes a newer design of Continuous Transverse Stub (CTS) antenna The two major problems arises, while designing large bandwidth...
This paper described the current network of primary language XML in network applications, introduced its own XML language features and development to illustrate aspects of XML technology in the application of network security and significance. The network security is a systems engineering which is need to carefully consider the security needs of the system, and a variety of security technologies,...
Network intrusion detection is one of the hottest research issues on the network security recently. In the paper, three kinds intrusion detection model are introduced. By using Bayesian methods, Fuzzy Decision Engine and Immunity-Based Model, we can improve the performance of intrusion detection system and effectively reduce the false positive alarm. Based on the three models, some drawbacks of NIDS...
Data loss incidents, where data of sensitive nature are exposed to the public, have become too frequent and have caused damages of millions of dollars to companies and other organizations. Repeatedly, information leaks occur over the Internet, and half of the time they are accidental, caused by user negligence, misconfiguration of software, or inadequate understanding of an application's functionality...
Even though Intrusion Detection Systems (IDS) are in wide-spread use, the question of how to efficiently initiate responses to detected attacks has been discussed far less often, especially in highly dynamic scenarios such as tactical MANETs. Despite being flexible and robust in their ability to self-organize, these MANETS are distinctly more susceptible to attacks than their wired counterparts. Especially...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.