The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Geographical knowledge grid is a platform which utilizes grid computing technology and geo-information science to supply powerful spatial knowledge discovery and sharing ability. Due to the complexity of knowledge grid, we design a portal named as GeoKS-Grid Portal as the access point to the platform. This paper describes the design and development procedures and introduces the framework of the portal,...
With Ajax firmly established as a widespread Web application-development technique, it is possible to build GPS monitoring system based on B/S architecture, so a large number of Web GPS monitoring systems are released recently. This article analyzes the common GPS monitoring systems based on AJAX and points out three main existing weaknesses. Then the article introduces how to use AJAX push pattern...
We present an approach to network devices behavior profiling based on NetFlow monitoring and a bidirectional flows extension. Behavior profiles of network devices typically focus on communicating peers, amount of traffic and traffic structure. However, using an implementation of the bidirectional flows standard we are able to distinguish between servers, clients and single flows directly which increases...
An autonomous Internet Protocol (IP) camera based object tracking and behaviour identification system, capable of running in real-time on an embedded system with limited memory and processing power is presented in this paper. The main contribution of this work is the integration of processor intensive image processing algorithms on an embedded platform capable of running at real-time for monitoring...
Resource performance monitoring is among the most active research topics in distributed computing. In this paper, we propose an adaptive resource monitoring method for applications in heterogeneous computing environment. According to the operating environment of distributed heterogeneous system and the changes of system resource workload, the method combines periodic pull mode with event-driven push...
In order to alleviate the burden of network administrators in the network resource management field, a network resource management system is designed and implemented based on the design idea of SNMP. This system which based on VC++ platform utilizes the principle of network communication and the feature of network resource, implements management of the IP addresses and the monitoring of the servers,...
The popularity of a new generation of smart peer-to-peer applications has resulted in several new challenges for accurately classifying network traffic. In this paper, we propose a novel 2-stage P2P traffic classifier, called self learning traffic classifier (SLTC), that can accurately identify P2P traffic in high speed networks. The first stage classifies P2P traffic from the rest of the network...
We present an approach to the inference of automata models of Web-based business applications using only execution traces recording the externally observable behavior of such applications. The proposed approach yields behavioral models representing both the control flow of an application and the data variations corresponding to different types of users. We also describe how the obtained models allow...
The repair of faulty processes (workflows, web service compositions) needs information about the state of the involved Web services. We introduce an architecture where (Web service based) activities and their instances are treated as manageable resources. Based on the WAMO Model our activities provide detailed information about the state they currently hold, possible states they can reach, as well...
In this paper we investigate the formalisation of distributed and long-running stateful systems using our normative temporal specification framework. We analyse aspects of a component-oriented Grid system, and the benefits of having a logic-based tool to perform automated and safe dynamic reconfiguration of its components. We describe which parts of this Grid system are involved in the reconfiguration...
Dynamic program monitoring has been applied in software-intensive systems to detect runtime constraint violations and trigger system recovery actions. Uncontrolled monitoring activities may, however, delay detection of a violation for an unbounded time and, worse, affect the original system's schedulability. In this paper, we introduce the concept of predictable monitoring, which demands a bound on...
The dissolved oxygen is one of important factors to evaluate the quality of water. Currently, various aeration and oxygenation devices have been developed for increasing its oxygen concentrations in water. However, the operations of those devices usually depend on the human operation with experience. In this study, we have developed a PC-based virtual instrument (VI) system using LabVIEW, which can...
The wide spread of worms poses serious challenges to today's Internet.Various IDSes (intrusion detection systems) have been proposed to identify or prevent such spread. These IDSes can be largely classified as signature-based or anomaly-based ones depending on what type of knowledge the system knows. Signature-based IDSes are unable to detect the outbreak of new and unidentified worms when the worms'...
Environmental protection is China's fourth most important social issue, after healthcare, employment and the income gap. Especially for power factories, they become highlights of all pollution resources. In China, an online bag filter automatic monitor system for primary pollution sources is implemented and adopted in Inner Mongolia. This paper introduces analysis and implementation of OPC data interaction...
In object-oriented databases, the conceptual structure may not be constant and may vary due to variety of reasons like correcting mistakes, adding/removing features, updating database, etc. Class versioning is one the evolution strategy that addresses the above issues. However, class versioning may be yields some unexpected results to the database clients. The easiest method is to just set a cache...
Several trends in SIP application server deployments in large scale telephony environments exacerbate the classic problem of feature interaction : use of distributed feature servers, mixing of legacy and green-field feature servers, and the co-existence of multiple third-party feature implementations provisioned in the same environment. Next-generation SIP application servers will include an application...
This paper proposes HELP://, a simple light-weight protocol that runs over HTTP and is used to disseminate information from a server(s) to its clients during the time of a crisis. HELP runs on an architecture that is a hybrid mix between a pure client/server architecture and a peer-to-peer architecture. Its resemblance to one versus the other is dynamically decided based on load. In particular, under...
Leveraging a complex infrastructure such as the computing Grids requires an appropriate level of monitoring. Since it is a technology in development, the current computing Grid middleware offer very little monitoring capabilities from the users' point of view. Making the Grid closer to the users requires that the users have deeper insight of what is happening with the computational jobs they submit...
In recent years, IT service management (ITSM) has become one of the most researched areas of IT. Incident and problem management are two of the service operation processes in the IT infrastructure library (ITIL). These two processes aim to recognize, log, isolate and correct errors which occur in the environment and disrupt the delivery of services. Incident management and problem management form...
The determination algorithm of neighbor video cameras by deployed position and view distance of video camera is introduced in this paper. This algorithm is utilized to determine the neighbor video cameras in the automatic human tracking system. The automatic human tracking system is enhanced video monitoring system utilizing the mobile agent technologies. Information of the neighbor video cameras...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.