A delivery route optimization system greatly improves the real time delivery efficiency. To realize such an optimization, its distribution network requires solving several tens to hundreds (max. 1500-2000) cities Trav...
详细信息
With the development of network information technology, research and application of computer Supported Cooperative Work system (CSCW) is spread in various fields. Human-computer interaction is the important compositio...
详细信息
Grid is a hardware and software infrastructure which allows the sharing of flexible, secure and coordinated resources among dynamic collections of individuals, organizations and resources. The resources that are utili...
详细信息
Grid is a hardware and software infrastructure which allows the sharing of flexible, secure and coordinated resources among dynamic collections of individuals, organizations and resources. The resources that are utilized in a Grid network are complex. There could be computing resources (PDA, PCs, workstations, servers, and clusters), storage resources (hard-disks, memory), Input-Output resources (sensors, networks, printers) or logical resources (users, timers etc) [1]. With the evolution of Grid systems and with the high capacity data transfer, will occur security issues. This topic is known in the Grid field as some of the necessary element to ensure the safeguard of the resources. Networks are recognized as a critical infrastructure which grew over the years and which continues to grow, because of the increasing dependence on computer systems. The first step in addressing this infrastructure is to understand it. After that, a good analyze should be done in order to avoid the attacks that could occur and to maintain a reliable network [2].
In fact the mission for a danger control system consists of several phases. The system configuration, operational requirements for individual components, success criteria and stress on the components, can change from ...
详细信息
In fact the mission for a danger control system consists of several phases. The system configuration, operational requirements for individual components, success criteria and stress on the components, can change from phase to phase. Furthermore, the duration of any phase can use deterministic or random models. All these changes and possibilities affect the system reliability. Thus, in this paper, we analyze the danger's system reliability from this point of view.
Over the last years Wireless Sensor Networks (WSN) have been becoming increasingly applicable for real world scenarios and now production ready solutions are available. In the same period the upcoming combination of S...
详细信息
ISBN:
(纸本)9781424475605;9781424475629
Over the last years Wireless Sensor Networks (WSN) have been becoming increasingly applicable for real world scenarios and now production ready solutions are available. In the same period the upcoming combination of Service-oriented Architectures and Web Service technology demonstrated a way to realize open standardized, flexible, service component based, loosely coupled and interoperable cross domain Enterprise Software solutions. But those solutions have been too resource-intensive and complex to be applicable for limited devices like wireless sensor nodes or small-sized embedded systems. Thus, more and more research investigations have been launched to bring the aspect of cross domain interoperability to the field of embedded battery powered devices. Now it is time to show the potential of integrating Web Services enabled WSN solutions in Enterprise systems. The proposed laboratory assistance solution in this paper demonstrates the benefits of Web Service enabled WSNs for process monitoring and disaster management by extending an existing system in the Life Science automation domain.
When analyzing the Radio Frequency Identification applications, one might think of two essential hierarchies: the structures aiming to offer security to an RFID system and the structures aiming to offer functionality ...
详细信息
ISBN:
(纸本)9781424474325;9781424474332
When analyzing the Radio Frequency Identification applications, one might think of two essential hierarchies: the structures aiming to offer security to an RFID system and the structures aiming to offer functionality means, with no security issues. One should know precisely the significance of these notions. Radio Frequency Identification represents an advanced wireless technology, which integrates an essential solution within the fields of intelligent chips and automation technologies. In this paper, four protocols based on updating the tags' identifiers by means of RFID readers will be compared, in order to carry out an analysis over the jeopardizing points that threaten the security and privacy of RFID systems. Cryptography signifies a way of creating RFID systems more secure. A chaotic matter is brought into discussion, by the following situations: to find out if it is a protocol of identification or authentication that is necessary, depending on various RFID applications or systems. Such analysis over RFID security has carried out wide thoughts.
The present paper proposes a tool based on fuzzy Petry Nets for modeling the recurrent of the decision functions. The analysed system-a producer-consumer distributed energy production systems is structured on hierarch...
详细信息
The present paper proposes a tool based on fuzzy Petry Nets for modeling the recurrent of the decision functions. The analysed system-a producer-consumer distributed energy production systems is structured on hierarchical levels and is synchronized in relation with successive external requests. Thus, each hierarchical level is capable to repeatedly carry out a fixed decision scheme and executes this action in temporal windows which are progressively increased. Between hierarchical levels there is an information subsystem based and LIFO and OOPN (Object Oriented Petri Nets). The proposed structure includes also a recurrent aspect in the decision function's capability to be rerun on a hierarchical level by preserving information from the previous level. The present paper enhances similar approaches of the authors, carried out through the recurrent modeling of the monitoring function.
This paper deals with a possibility of non-destructive diagnostics of solid objects by software analysis of vibration spectrum by accelerometers. By a use of MATLAB platform, a processing and information evaluation fr...
详细信息
ISBN:
(纸本)9788070438657
This paper deals with a possibility of non-destructive diagnostics of solid objects by software analysis of vibration spectrum by accelerometers. By a use of MATLAB platform, a processing and information evaluation from accelerometer is possible. Accelerometer is placed on the measured object. The analog signal needs to be digitized by a special I/O device to be processed offline with FFT (Fast Fourier Transformation). The power spectrum is then examined by developed evaluating procedures.
The human brain possesses a highly structured surface. A quantitative examination of the cortical surface is of particular interest for many questions, e.g. the investigation the relation between the spatial frequenci...
详细信息
Industrial communication systems standardize communication protocols and services. Interoperability within automation and control systems need additional application definitions. This is usually organized with fieldbu...
详细信息
Industrial communication systems standardize communication protocols and services. Interoperability within automation and control systems need additional application definitions. This is usually organized with fieldbus profile specifications. Profiles become part of the overall development process of the device manufacturer. Unfortunately, today's profile descriptions are very informal and have nearly no support for the development process. This paper presents a semi-formal profile specification approach, based on IEC 62390 and using a mixed UML and MS Word process. Result of both specifications is an XML representation which can be integrated in the device development process. This method is developed for the PROFIBUS User Organisation for PROFIBUS and PROFINET device profiles.
暂无评论