The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents the design and implementation of an Embedded Laboratory Security Monitoring System (ELSMS). The system includes a web server which acquires video information through camera, and Wireless Sensor Network (WSN) which gets environmental parameters through sensors and sends them to the web server. Users can access the Monitoring Server (MS) through PCs or Wireless Mobile Terminals(WMT)...
In this paper we introduce a novel approach for host protection based on a security subsystem for continuous monitoring and control of user applications. To enable a secure monitoring capability, a strict hardware separation is proposed, in combination with a signaling layer for monitoring and control. The paper presents our preliminary work, introducing some of the core ideas and discussing a few...
CTEEP - Transmissao Paulista actually operates 105 substations geographically distributed across Sao Paulo State. These substations are remotely operated by two Operating Centers - Transmission Operating Center (COT Centro de Operacao da Transmissao), Bom Jardim SP, and Back-end Operating Center (COR - Centro de Operacao Retaguarda), Cabreiiva SP. Through the years, CTEEP has been deploying its high...
For the current problems in the security situation of colliery equipment ,and based on non-linear relationship among the parameters of colliery equipment ,this paper presents a method for forecasting the safety of colliery equipment based on BP neural network.By using BP neural network in the colliery safety equipment monitoring and warning issues,we established a multi-index comprehensive monitoring...
An intelligent security system based on ARM microcontroller was developed. The system can realize the monitoring of the intrusion signals automatically by using pyroelectric infrared detectors, alarming through the Ethernet, and displaying the invasion information on the PC screen. In order to monitor alarm signals, the PC server is in the state of listening when there is no information arrived, and...
Summary form only. Electronic devices are starting to become widely available for monitoring and controlling large-scale distributed systems. These devices may include sensing capabilities for online measurement, actuators for controlling certain variables, microprocessors for processing information and making realtime decisions based on designed algorithms, and telecommunication units for exchanging...
In order to make the healthy and stable operation of the next generation Internet, this paper designs a network traffic monitoring system oriented IPv6. The System uses the collected Net Flow data to make statistics and analysis. The key technologies used in the system were introduced and the main framework of the system was given. The system has been tested in the cernet2, and the test results show...
In view of the severe situation in coal mine safety production, using tomcat6.0 as the Web server software, through the dynamic web page struts technology and ibatis framework technology to realize database connectivity, using Myeclipse 5.5.1 as a development tool, we develope the web-based system which is monitoring and managing of the coal mine safety equipment intelligently. For different units,...
This paper discusses different aspects of performing monitoring in the context of software intensive systems. The focus is especially on cases where the observed system is distributed, and the monitoring system needs to be secure, dependable and capable to adapt to a number of dynamic scenarios during the system evolution. Based on analysis of monitoring needs in this type of a domain, a set of core...
Water environment monitor is an important component of environmental monitoring system. In this paper, the authors discuss that the solar energy technology, the wireless GPRS network transmission technology, VPN agent technology, sensor technology and information security technology could be employed in the field of hydrology intelligent on-line monitoring to solve the on-site monitoring of power...
Monitoring system is a dynamic security system to maintain the normal operation of expressway. The modeling of expressway monitoring system based on UML is researched. In order to improve the design efficiency of the monitoring system software, the whole process is divided into four stages which include the global analysis, local analysis, global design and local design. Finally, a distributed expressway...
The system utilizes the object-oriented analysis method and the broad-based B / S / D software architecture. Then researching and developing the coal mining security equipment's intelligent monitoring and management system of being based on the web-environment, the Web server software on this system using the tomcat6.0. Connecting the database by struts and ibatis dynamic web page technology and framework...
The risk of sustaining heavy injuries through accidental falls creates a major medical problem for elderly people. This paper conducts a survey of the various automatic techniques and methods proposed to detect falls and anomalies in movements of the elderly, through monitoring of their daily life activities. These methods can be broadly divided into three main categories: 1) Video Analysis Based;...
Crane and its industry play a very important role in the national economy. At present, the crane industry developed more and more mature, but the development of crane's monitoring device is lagging. These factors affect the further improvement of the level of the whole crane industry. At the same time, these factors also lead to the user's difficult and ineffective management of the crane's monitor...
This article discusses the development of monitoring system about the security situation in coal production and coal mining. In order to solve the problem of coal mine monitoring systems and self-management of coal enterprises, Adopt the Socket communication mechanism based on TCP protocol, design the Real-time monitoring and development of a WEB-based remote coal mine gas monitoring system. The test...
In this paper, the prison monitoring system is designed based on wireless sensor network technology. This system could not only monitor the relevant information about the vital signs of inmates in prison, but also record and check the physical condition of personnel, activities, status and location information at any time, preventing inmates from committing suicide or escaping, and discovering whereabouts...
Service Level Agreements (SLA) are commonly used to define terms and conditions of service provisioning. WS-Agreement is an SLA specification that addresses the need of both producers and consumers of services to specify and negotiate terms and conditions of access to these services. This specification has gained wide acceptance in both the Grid computing and Web Services communities. WS-Agreement...
The system has achieved a set of security-based real-time digital video monitoring system, which is composed by front-end monitoring cameras, server host and client host, has a certain intelligence and high reliability, can provide remote access capabilities and can be developed to upgrade, and its video data management is easy. The system achieved digitization in the whole process from collection,...
This paper designed the rapid field data acquisition and transmission system based on satellite link using in the china three gorges reservoir for geological disaster monitoring and investigation. The paper reviews the wired or wireless communications coverage conditions, the natural geological conditions and the ecological environmental frail in the three gorges reservoir area, as well as the rapid...
Pervasive concept becomes present trends to develop new complicate networked computer systems. On the other side, SOA is one of ideal key technologies to realize pervasive concept. In this paper, we try to glue the gap between the concept and the technology by a case study. In our case study, we present and implement a high reliable monitor and alert system for coal mining. Such system requires high...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.