In order to intelligent central management of all kinds of separate high frequency vibrating screen, the network system is developed. The master uses industrial personal computer (IPC), the slave uses PIC16F877 MCV. C...
详细信息
Wireless sensor networks (WSNs) are a family of wireless network consisting of spadally distributed autonomous devices using sensors to cooperatively monitor physical or environmental conditions, such as temperature, ...
详细信息
The major impetus for the use of RFID technology is tracking personnel and objects to monitor and control movement. Traditionally, this task is accomplished using a centralized systems architecture in which every even...
详细信息
The major impetus for the use of RFID technology is tracking personnel and objects to monitor and control movement. Traditionally, this task is accomplished using a centralized systems architecture in which every event is transmitted to a host computer for validation. distributedintelligent systems are based on two principles: distributed communications and distributed intelligence. Together, these functionalities enable the implementation of networks that are highly robust, scalable, flexible, and facilitate their integration with client/server systems. We describe how RFID can be implemented using distributedintelligent systems to automate data collection for service queues, track and control personnel and goods, monitor and control inventory, and use dynamic digital signage for information dissemination.
A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor/control physical or environmental conditions, such as temperature, pressure...
详细信息
ISBN:
(纸本)9781424448364;9781424448371
A wireless sensor network is a wireless network consisting of spatially distributed autonomous devices using sensors to cooperatively monitor/control physical or environmental conditions, such as temperature, pressure or motion, at different locations. Main processing center gather information from remote locations while centrally controlling those centers. Reliability of communication can be achieved using routing and error checking algorithms. This paper briefly presents the design approach of a successful self organizing wireless sensor network, with multi master capability.
With over 360 ports of entry and 20 million sea, truck, and rail containers entering the United States every year, port facilities pose a large risk to security. Securing these ports and monitoring the variety of traf...
详细信息
With the Internet crime growing, such as phishing, money mules, personal data stealing and trafficking, DDoS (distributed Denial of Service), and other cases often heard by people from time to time. DDoS mostly uses b...
详细信息
With the Internet crime growing, such as phishing, money mules, personal data stealing and trafficking, DDoS (distributed Denial of Service), and other cases often heard by people from time to time. DDoS mostly uses botnet as source of attack, and distributes trojans and worms to infect hosts. Infected hosts become bots, and could be controlled by the botmaster. Botmaster uses command and control server to control bots. Because botmaster servers use dynamic types and encryption methods to communicate with bots, it's difficult to detect bots. In this research, we designed and developed a system to detect bot-like traffic and deny traffic of who looks like bots. We revised the NTOP program and integrated it with self developed perl programs. Our system will monitor the network layer and transport layer on network activities and send email/SMS to the network administrator to block suspicious botnet.
Division of Labor control is advanced function for distributed autonomous robotic systems. Many studies focussing division of labor control inspired biological phenomenon have been reported. However, the optimality is...
详细信息
Division of Labor control is advanced function for distributed autonomous robotic systems. Many studies focussing division of labor control inspired biological phenomenon have been reported. However, the optimality is not discussed because decentralized control is typically complicated. In this study, we propose the division of labor control method for robot group that enable adaptively select whether homogeneous state or heterogeneous state against working conditions and address the optimality by mathematical analysis. To evaluate the effectiveness of the proposed method, the computer simulations are carried out and we confirm that robot group implemented the proposed method inevitably organize the division of labor state with group performance improvement.
The work contains the analysis of the design methodology of an unmanned aerial vehicle (UAV), which is able to carry out environmentalmonitoring, define the location of various objects and targets with high accuracy,...
详细信息
The work contains the analysis of the design methodology of an unmanned aerial vehicle (UAV), which is able to carry out environmentalmonitoring, define the location of various objects and targets with high accuracy, map the seats of fire and areas of environmental contamination, fulfil patrolling functions to solve the tasks of the National Armed Forces and police, carry out meteorological research, etc. The original UAV design is provided with special compartments to carry useful load (engine, batteries, surveillance camera, control elements, 80 etc). The UAV has a combined control system intended for the control in an automatic mode including the application of GPS system.
In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenance...
详细信息
In distributed environments, access control decisions depend on statements of multiple agents rather than only one central trusted party. However, existing policy languages put few emphasis on authorization provenances. The capability of managing these provenances is important and useful in various security areas such as computer auditing and safeguarding delegations. Based on the newly proposed logic, we define one type of authorization provenances. We exemplify the applications of these provenances by a case study.
In order to intelligent central management of all kinds of separate high frequency vibrating screen, the network system is developed. The master uses industrial personal computer (IPC), the slave uses PIC16F877 MCU. C...
详细信息
ISBN:
(纸本)9781424446995
In order to intelligent central management of all kinds of separate high frequency vibrating screen, the network system is developed. The master uses industrial personal computer (IPC), the slave uses PIC16F877 MCU. Concrete hardware connection, serial communication program flow about MCU and serial communication program about IPC by using Visual Basic 6.0 are given. The system has been put into use. The practice shows that it has reasonable design and has good performance.
暂无评论