Multicast is the ability of a communication network to accept a single message from an application and to deliver copies of the message to multiple recipients at different location. With the development of Internet, M...
详细信息
Error correcting coding is used to protect against errors introduced by transmission media. Error correcting code enables the communication systems to have a reliable transmission over noisy channels. Cognitive radio ...
详细信息
Error correcting coding is used to protect against errors introduced by transmission media. Error correcting code enables the communication systems to have a reliable transmission over noisy channels. Cognitive radio is a creative technology proposed to increase spectrum usage by allowing cognitive users to use the unused spectrum in changing environments. During the spectrum allocation for primary user and cognitive user, lot of information may be lost due to burst errors and power issues. In this paper, we will describe the performance of LDPC codes for cognitive radio.
This paper presented a virtual experiment system of computer networks. The system is designed based on a real network laboratory environment and experiment content. With Client/Server structure, MVC software developme...
详细信息
ISBN:
(纸本)9780889868168
This paper presented a virtual experiment system of computer networks. The system is designed based on a real network laboratory environment and experiment content. With Client/Server structure, MVC software development mode, C + + programming language, .NET and VRML virtual reality technology, etc., the system realized the virtual networking functions including topological drawing, equipment configuring, connectivity test, three-dimensional display, online discussion and management, etc. The practice has proved that this system expanded the operating environment and the ways of network experiment, and provided an experiment platform for the computer network teaching which is lacking in the real experiment environment.
This paper firstly introduces the main design concept of a novel movable service robot prototype for the elderly and the disabled. The robot has the characteristics of simple structure, low cost, double working arms, ...
详细信息
ISBN:
(纸本)9780769535593
This paper firstly introduces the main design concept of a novel movable service robot prototype for the elderly and the disabled. The robot has the characteristics of simple structure, low cost, double working arms, the vision-based guidance and the wheel motion method. Secondly, the key technology points of the robot are presented and analyzed. Such as double working arms, visual positioning equipment, movable platform, control system and path planning etc. Among them, the double working arms have different configuration structures, and with the double working arm's coordinated control, the robot can realize the special object's tracking, fetching, stable transferring etc. In addition, the other key technologies of the robot are also presented. Furthermore, all above these studies provided the significant theoretical and experimental foundation for the further study of the concept-accompany robot, which has the humanlike characteristic and the ability to do daily simple housework.
This paper presents a business gaming simulator via fuzzy constraints-directed approach for supporting collaborative problem-based learning. In this gaming simulator, the structure of the problem is displayed as decis...
详细信息
computer Security is a serious concern in today's growing environment of network. Every computer network is affected by malicious attacks in the way of security violations with varying degrees. Unauthorized access...
详细信息
computer Security is a serious concern in today's growing environment of network. Every computer network is affected by malicious attacks in the way of security violations with varying degrees. Unauthorized access and disruption of services are the main concern of security. In this paper, we are presenting a novel detection of network errors by studying the raw packets of TCP/IP collected in the network. Our aim is to determine various reasons how the abnormal packets appear on the network and also to evaluate, what way such packets can cause actual damage to the network. We study and divide the abnormal packets obtained during our experiments into several categories based on their type and possible related cause. This analysis would hopefully provide a better implementation of security in the way of Intrusion Detection System in the network.
UML Activity Diagrams (UADs) are widely employed to model the behavior of software systems under development. To test the implemented systems, the UAD specification is a reasonable basis. Generating a complete suite o...
详细信息
development of new technologies brings new opportunities to all business sectors. The work presented here represents a connection of the ubiquitous computing with the real world business opportunities. We are namely f...
详细信息
development of new technologies brings new opportunities to all business sectors. The work presented here represents a connection of the ubiquitous computing with the real world business opportunities. We are namely focusing on some changes in the insurance industry. We address the more complex problem of business changes of introducing new insurance products connected with mobile phones, GPS and other technologies development. We suppose new risk model that integrates the net premium calculation with some methods of multivariate analysis. Thus, aim of this work is primary situated to predict some business and risk opportunities from ubiquitous computing and to analyze some important factors for successful implementation.
The current practice of open source software (OSS) evolves around sharing the source codes. However, without a prudent methodology in OSS software development, OSS users seldom participate in software development and ...
详细信息
The current practice of open source software (OSS) evolves around sharing the source codes. However, without a prudent methodology in OSS software development, OSS users seldom participate in software development and prefer just to be end-users. To identify and analyze the current usage and acceptance of OSS , a survey was conducted among selected OSS developers in Malaysia. The results, analyzed using SPSS and Rasch method, are quite unexpected, with many OSS developers still not fully using OSS tools in SDLC stages. This paper shall also propose a knowledge management system (KMS) framework for sharing software development using OSS to enable community-of-practice to share software development using OSS knowledge.
Botnet is a hybrid of previous threats integrated with a command and control system and hundreds of millions of computers are infected. Although botnets are widespread development, the research and solutions for botne...
详细信息
暂无评论