Research on Data Processing Technology Based on the Middleware of the IoT

Size: px
Start display at page:

Download "Research on Data Processing Technology Based on the Middleware of the IoT"

Transcription

1 Research on Data Processing Technology Based on the Middleware of the IoT School of Information, Beijing Wuzi University, Beijing, China, Abstract To get effective events based on original data processing is the most basic and most important step of the middleware of Internet of Thing. First this paper put forward a kind of IoT middleware framework model on the basis of application of IoT technology, and then design data processing module through researching on the characteristics of the data of IoT, focusing on data processing for the leakage read, repeated read and dirty read. The core of this paper is to design the filters and puts forward specific filtering algorithm. 1. Introduction Key words: Data Processing, Internet of Thing, Middleware, RFID, Filter The concept of Internet of Thing was originated in 1995 when Bill Gates wrote a book "the road ahead", but it didn t pay attention that under wireless network and other hardware and software development. ITU Internet Report 2005[1]: Internet of Thing, which is released by the International Telecommunication Union in the WSIS, held in Tunis on November 17, 2005, referred to the concept of the Internet of Thing. The report pointed out that the ubiquitous "Internet of Thing" communication era was coming, and all objects in the world, from tires to toothbrushes, from housing to the tissue, can exchange actively via the Internet. Radio frequency identification technology, sensor technology, nanotechnology and intelligent embedded technology will have a more wide range of application. Internet of Thing is "the Internet connects material objects", abbreviated as IoT. And it is a network which according to the agreed agreement makes articles connect with the internet to realize information exchange and communication through radio frequency identification (RFID), infrared sensors, global positioning system, laser scanners and other information sensing device, in order to achieve intelligent identification, location, tracking, monitoring, and management. There are two meanings [2]: first, the core and foundation of the Internet of Thing is still the Internet, and it is the extension and expansion of the Internet network. Second, its client-side is spread and extended to any goods and articles for information exchange and communication. With the published of Internet of Thing, it broke the traditional thinking before. The traditional thought is always make physical infrastructure and IT infrastructure separate: on the one hand is airports, roads and buildings, and on the other hand is data center, personal computer, broadband, etc. In the " Internet of Thing" era, reinforced concrete, cable and chip, broadband will integration for unified infrastructure, in this sense, infrastructure is more like a piece of new earth site, where the world's running in it, including economic management, production operation, social management and personal life[3]. 2. Related research Research on Data Processing Technology Based on the Middleware of the IoT Currently, the Internet of Thing technology includes RFID, sensors, ZigBee, GPS and so on. The system architecture of the Internet of Thing contains the perception layer, middle layer and the application layer [4]. Perception layer collects the relevant data of all physical and virtual "objects". The information, characterized by the large amount and inconsistent format, is the data source of the entire IoT system. Because the mutual interference may occur between underlying perception devices, the data collection may sometimes be incomplete, wrong, or even leakage reading. In addition, these massive data will produce a large amount of redundant information. For example: one sensing device may report the same data repeatedly in a short time or more than one sensing device reported the same data and so on. Due to the above reasons, all the uppers application takes large energy in screening and processing the data before providing corresponding service and function, which makes workload and difficulty increased[5]. So IoT researchers transfer the work that process the data collected by the data acquisition technology from the traditional application layer to the middle layer, which can make upper application focus on the development of service International Journal of Digital Content Technology and its Applications(JDCTA) Volume7,Number8,April 2013 doi: /jdcta.vol7.issue

2 level, and realize low coupled with the underlying hardware. Not only can it reduce the development difficulties greatly, but also enhance the reusability of the upper layer application. As a result, the IoT middleware is generated. According to the above account, IoT middleware must have three functions at least [6][7]: (1) the hardware management: the main function is to realize the software system coupled loosely with hardware, including configuration and management of material IoT perception equipment. Generally, it refers to the RFID reader (mobile and fixed), wireless sensor network equipment, positioning terminal equipment, intelligent mobile phone equipment and other hardware system; (2) the data processing and transmission: the main function is to process a lot of nonsense, random sequence, uncertain IoT event, then produce a senior abstract events which are semantic. At last, it will route to the associated application; (3) services: providing a unified interface for different applications, and realizing the transparent operation for user or application. Through hierarchical collaboration of the three functions, it constitutes the basic frame of IoT middleware. The data processing is the core of the architecture. According to the semantic level, the existing data processing can be divided into two layers: data pre-processing and complex event processing [8]. Aiming to make my research specific, we make data preprocessing become a layer alone. Next we are focusing on the research of data processing. According to the above level classification, this paper proposes IoT middleware structure is shown below: Figure1. IoT Middleware Structure Diagram The following is the brief overview of the main functions of layers: Device-aware layer: It is one of the functional modules in the IoT framework, which is mainly responsible for the perception of devices information in the Internet of Thing, which include RFID reader (mobile and fixed), wireless sensor network devices, positioning terminal devices, smart mobile devices and other hardware systems. Device-aware layer is the basis of IoT middleware framework, which is used to shield the differences among the different manufacturers, and various models of hardware, as well as to provide accurate, real-time raw data to the data processing layer. Device-aware layer leaves unified, extensible interfaces based on the internal communication format of IoT middleware framework so that it can realize the reader connection through a simple configuration when need to access a hardware. Data-processing layer: Data acquisition module will sent the data that read from label to format conversion module. Data format conversion module parsed the original label data into Unified format. Data filtering module use these filter to filter data and exchange data information with data storage module, after that sent the data to the data packet module, finally send to the IoT 528

3 middleware of upper structure until the application is received. As the diagram shows, data filtering is one of the most important links of the data processing module. Event-processing layer: Setting correspond rules through the rules interface, and matching the effective events after data processing, if matching success, then generate events related to application, and trigger the corresponding operation. Afterwards it will be form a certain relationship that use the event operator and pattern matching, according to business logic rules. The relationship can be express form for (what, where, when, why) four elements of the semantic, it can also synthesis semantics complex events, according to the sensor information. Finally form business process events, according to the upper application specific needs, Information sharing service layer: Information sharing service layer provides a unified interface for different applications in the supply chain system, the users in the system can invoke service by publish / subscribe model. Publish / subscribe model is a loosely coupled communication paradigm which is oriented distributed computing environment. In pub / sub system, because of the associated theme, the publishers and subscribers do not have to know where the other or online at the same time. It realizes the multidimensional coupling on time, space and data communications between both sides. 3. Research on data processing of IoT middleware Compared with common data, the IoT data has the following features: (1) Complexity. IoT data acquisition system is composed of multiple subsystems, including radio frequency identification (RFID) system, global positioning system (GPS), intelligent sensor system (WSN), it is that different tool collection of data acquisition will product different information. For example, RFID read is the product of EPC code information; GPS read is the product of the position information, etc. Therefore, to deal with data is very complicated. (2) Semantic richness [9]. Be observations are carrying with the context state and background knowledge related information, the information is hidden, and have close relationship among the upper application logic. Using the related information can be derived derivative information further. For example, from product ID can find out its type, price, place of origin, etc., from the position of the reader can see goods store shelves position, etc. The data uploaded from Hardware equipment is a kind of low foundation data, which must rise to senior business logic data, and integrated existing application. (3) Not accuracy. Because reader equipment and external environment factors, the data will still exist the certain error. Take RFID For example. The existing of RFID reader still leave error problems, such as leakage data, repeat data and dirty data etc. On the other hand, a reader can identify a variety of different object, so RFID data may contain a variety of different kinds of observations. For example, in a security entrance, it can not only identify pass in and out of the staff, but also identify pass in and out items. They are with different kinds of object, also the corresponding event semantics is not the same [10]. (4) Flow characteristics, batch sex and mass sex. The data uploaded from hardware equipment is the form of flow quickly and automatically generated, which need to accumulate up to support the tracking and monitoring application. And, it is with batch of characteristics sometimes that multiple objects will be intensively observation, for example, it will read a large number of data when a container registration. The scale of the RFID equipment deployment will produce unprecedented mass data. At present, the reader can capture per 120 to 400 tag data. For a deployment has 100 reader medium storage per second, it can produce 1.2 ~ a data, if each data of 20 bytes, then it will produce 1.6 GB ~ 60 GB every day. Therefore, the data quantity need to deal with is very large. (5) Tense, dynamic and relevance [11]. Data acquisition obtains related data of product, such as RFID in the acquisition of goods inbound, outbound information, GPS obtain product position and status information dynamically in real-time and so on. Data is not exist independently but related, the tense and dynamic can derived relevance; temporal correlation expressed the timing relationships among events, the space correlation expressed the track of event development, the temporal and space correlation together expressed the change process of events which related to objects. The above-described characteristics of IoT producing information show that there are many issues on the data of IoT producing to be resolved. Due to the inaccuracy and heterogeneity of the Internet of Thing sensing technology such as RFID and ZIGBEE, the data needs to be preprocessed before testing and processing. The current pretreatment is expanded based on the inaccuracies of the Internet of Thing data. Usually can be summed up in three points below: 529

4 Repeated read When a label is outside of reading scope, the reader is still read the label. It is mainly because of electromagnetic interference when more readers exist at the same time, with great randomness. This kind of mistake is also called the pseudo [12]. Dirty read When a label is in a reading scope, the reader also induction to the existence of the label tag, but the EPC value which the reader read is not correct. Leakage read When a label is in a reading scope, the reader is not read the label. This kind of situation could happen in the time when a reader read many labels at the same time and then some tags are missing. The survey showed that, reader can only be read the tag data which is in its induction range within 60% ~ 70%, it is that at least 30% of tag data was missing. It can be seen that the data read leakage phenomenon is more serious in the RFID applications. This kind of mistake is also called refused to true [13]. Conclusion with former discusses and the structure of IoT middleware, we set up data processing layer frame diagram is shown below: Figure2. Data Processing Layer Frame Diagram In the figure above, the data acquisition module will sent the data that read from label to format conversion module. Data format conversion module parsed the original label data into data triads, namely {TagID, ReaderID, ReadTime}. Data filtering module use these filter to filter data and exchange data information with data storage module, after that sent the data to the data packet module, finally send to the IoT middleware of upper structure until the application is received. As the diagram shows, data filtering is one of the most important links of the data processing module. 4. Research on data filtering modules Not accuracy data is mainly caused by the repeated read, dirty read, leakage read three, so we next research data processing on the three data respectively [13]. After format conversion the data can be expressed as: Struct TagData{ String TagID; // the name of tag String ReaderID; // the name of reader Date ReadTime; //the time of data read} 4.1. Repeated read processing- redundancy filter In the practical application, the RFID reader read speed, so will produce a large amount of redundancy data. For example, the CSL461 UHF reader which speeds can reach 1000 times per second, obviously, a large proportion of these data become redundant data because of repeated reading [14]. So the data must be processing in order to reduce the burden of the upper application system. Here we use hash table as intermediate table to filter data. Set TagID hash table for the key word, t for time interval. After filtering the data output to a new storage list. Now take out data from the cache database and compare with hash table data, the redundancy filter algorithm is as follows: 530

5 (1)Judging whether the same of TagID: if the same is turn to (2), Otherwise turn to (3); (2)Judging whether the Time less than t: if it is true, then should filter it because the data is redundant data, and update the ReadTime of the hash table; if it is false, then we should renew and output the ReadTime of the hash table, because the data is a new data. Turn back to (1) the next data processing; (3)Inserting the hash table and output the label data to storage list. Turn back to (1) the next data processing. Figure3. The Redundancy Filter Algorithm Flow Chart 4.2. Dirty read processing - smooth filter After the data finishing the redundant processing and is stored in the storage list, dirty read processing can be started. The filters mainly smooth the tag data read by the reader, and masked those occasional tags, and set the time threshold value t and the counter threshold value n. Only a tag label appears n times during time t can be considered a stable state one. The choice of these two values directly determines the smoothing effect of the smoothing filter. In this filter module, three lists have been designed: the input list, the output list and the storage list. The storage list save all of the label data read by the reader, whether or not they meet two threshold requirements of the smoothing filter. Get label node from the input list, and compare to the storage list, if the nodes in the storage list, then this node appearnumber plus 1; if not, it is stored in the storage list. In order to avoid duplicate detection the compared data, after the completion of the comparison, the input list is emptied. The filtering algorithms of the event filter are the following steps. (1) Input the label data to the input list, and then sign the label node structure appearnumber based on the original input data label structure, which is used to count the number of occurrences of the tag. First it is initialized by 0, and that means the first occurrence. (2)Get all the items in the input list, and compare to the storage list, if the nodes are in the storage list, then this node appearnumber plus 1; if not, it is stored in the storage list. (3)Get a label node from the storage list, if this node's appearnumber value is equal to n during t, and the items haven t been joined in the output list, then add it to the output list, at the same time mark that it has been joined into output list; if this node has exceeding t while appearnumber less than n, then delete the entry; if the residence time is greater than the count threshold, then delete the entry. (4)Examine whether the judgment of the items stored in the list is completed, if not completed, proceed to step (3), if the judgment is completed, perform step (5). (5)Send the data in the output list to next module, and empty the output list. The filtering algorithm flow chart of the smoothing filter is shown in Figure

6 Figure4. The Smoothing Filter Algorithm Flow Chart 4.3. Leakage read processing- window filter The first algorithm for the data processing of leakage data is fixed window smoothing algorithm, it fills leakage data by setting a fixed window size, but it can't comprehensive consideration of the reader environment, reader, speaking, reading and writing frequency, label recognition rate, upper applications to set the size of the window because of the window size fixed, and also it is difficult to balance various factors to obtain a satisfactory results. Then adaptive window smoothing algorithm developed, it is improvement of fixed window algorithm, but its calculation accuracy still can't meet the demand of the system. Here we are using adaptive window smoothing algorithm based on probability model [15]. Its model as follows: for label, the number N that labels are read within the smooth window meet Bernoulli binomial distribution B(, ), is reader polling times or repeated test times, and use it to show window size. is the average reading frequency of tag within smooth window, also named occurrence probability. When confidence for δ, guarantee data integrity of the sufficient conditions: ( ) When the window is too small, expand window size appropriately. And condition for label dynamic changing is: > 2 1. The is the number of times that label detect in the smooth window inside. Thus according to the current information of labels, adaptive adjustment window size and then we can ensure that more accurate filling data. 5. Conclusion This article mainly aims at the specific requirements of Internet of Thing application, and proposed a kind of architecture model based on data processing and complex events, for the characteristics of RFID data not accuracy, this paper puts forward a kind of RFID middleware data processing model, and the data processing module can be divided into data acquisition, data format 532

7 conversion, data filtering, data storage and data packet five modules. This paper had a detailed study on the model of the data filtering module, in view of the uncertainty caused by data read, dirty read and leakage read,we designed three main corresponding filters: redundancy filter, smoothing filter and the filter window. The next job is to study the rules and set up module, according to specific application setting rules, and matching to the effective events processed by data processing module, and output complex events for upper application service. 6. Acknowledgement This paper is supported by the Funding Project for Technology Key Project of Municipal Education Commission of Beijing (the grant number KM ). Funding Project for Program of Municipal Education Commission of Beijing (the grant number SZ ). Funding project for the National Key Technology Research and Development Program (2011BAH18B03).The Project of Construction of Innovative Teams and Teacher Career Development for Universities and Colleges Under Beijing Municipality (IDHT ). 7. References [1] ITU Internet Report 2005: Internet of Things [2] Shen Subin. Study on the architecture of the Internet and related technologies[j].journal of Nanjing University of posts and telecommunications, 2009, 6. [3] Zhang Yi, Tong Hong. Summary of the Internet of Things 2010,4, [4] Shen Subing.Internet of Things architecture and related technologies[j].nanjing University of Posts and Telecommunications,2009,(6). [5] Wang Hui, Shi Xiaoying. Middleware services and their integration framework. Computer Engineering and Applications. 1998, 9, [6] LiLi, ZhuQingXin, wang fang. EPC system of middleware study [J]. Computer engineering and design, 2006, (18) : [7] Miao Wu, Ting-Jie Lu, Fei-Yang Ling, Jing Sun, Hui-Ying Du. Research on the architecture of Internet of Things. In: Advanced Computer Theory and Engineering (ICACTE), rd International Conference [8] ShaoHuaGang, ChengJin, WangHui, etc. For things networking system and middleware design [J]. Computer engineering, 2010, 4 (17): [9] S.E.Sarma, S.A.Weis, D.W. Engels. Secure risks and challenges. RSA Laboratories Cryptobytes (1): 2~9. [10] Vibhor Rastogi, Dan Suciu, Evan Welbourne. Access Control over Uncertain Data. In: Auckland, New Zealand: VLDB [11] Miao Wu, Ting-Jie Lu, Fei-Yang Ling, Jing Sun, Hui-Ying Du. Research on the architecture of Internet of Things. In: Advanced Computer Theory and Engineering (ICACTE), rd International Conference [12] Roozbeh Derakhshan, Maria E. Orlowska, Xue Li. RFID Data Management Challenges and Opportunities. In: IEEE First International Conference on RFID, Gaylord Texan Resort, Grapevine,Texas,USA ~182. [13] Bo Feng, JinTa Li, Ping Zhang. Study of RFID Middleware for Distributed Large-scale Systems. In: Information and Communication Technologies. ICTTA, [14] WuYuCai, YangJianJiang. RFID middleware data processing and its application in the information management system [J]. Computer CD software and applications. 2011( 14) : [15] ZhangMingZhe, b: mr.zhang qiang, YuanWei, etc. Embedded RFID middleware data filtering model study [J]. Computer engineering and design, 2010, 31 (17) :

http://www.paper.edu.cn

http://www.paper.edu.cn 5 10 15 20 25 30 35 A platform for massive railway information data storage # SHAN Xu 1, WANG Genying 1, LIU Lin 2** (1. Key Laboratory of Communication and Information Systems, Beijing Municipal Commission

More information

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers

A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers , pp.155-164 http://dx.doi.org/10.14257/ijunesst.2015.8.1.14 A RFID Data-Cleaning Algorithm Based on Communication Information among RFID Readers Yunhua Gu, Bao Gao, Jin Wang, Mingshu Yin and Junyong Zhang

More information

Research on Anomaly Detection of RFID Supply Chain Data Based on EPC

Research on Anomaly Detection of RFID Supply Chain Data Based on EPC , pp.62-66 http://dx.doi.org/10.14257/astl.2014.50.10 Research on Anomaly Detection of RFID Supply Chain Data Based on EPC Chunfeng Wang 1 Shuiming Zhong 2 Jin Wang 2 1 Modern Education Technology Center,

More information

Design for Management Information System Based on Internet of Things

Design for Management Information System Based on Internet of Things Design for Management Information System Based on Internet of Things * School of Computer Science, Sichuan University of Science & Engineering, Zigong Sichuan 643000, PR China, 413789256@qq.com Abstract

More information

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang

Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang International Conference on Computational Science and Engineering (ICCSE 2015) Research on Architecture and Key Technologies of the Internet of things Qing Mi, Zhen-tao Ni and Xiao-duan Wang Informatization

More information

Study of Logistics Warehouse Management System Based on RFID

Study of Logistics Warehouse Management System Based on RFID Advanced Materials Research Vol. 748 (2013) pp 1281-1284 Online available since 2013/Aug/30 at www.scientific.net (2013) Trans Tech Publications, Switzerland doi:10.4028/www.scientific.net/amr.748.1281

More information

A Storage Architecture for High Speed Signal Processing: Embedding RAID 0 on FPGA

A Storage Architecture for High Speed Signal Processing: Embedding RAID 0 on FPGA Journal of Signal and Information Processing, 12, 3, 382-386 http://dx.doi.org/1.4236/jsip.12.335 Published Online August 12 (http://www.scirp.org/journal/jsip) A Storage Architecture for High Speed Signal

More information

Figure 1: Architecture of a cloud services model for a digital education resource management system.

Figure 1: Architecture of a cloud services model for a digital education resource management system. World Transactions on Engineering and Technology Education Vol.13, No.3, 2015 2015 WIETE Cloud service model for the management and sharing of massive amounts of digital education resources Binwen Huang

More information

Enabling the secure use of RFID

Enabling the secure use of RFID Enabling the secure use of RFID BLACK ME/FOTOLIA.com Enhancing security of radio frequency identification to connect safely to the Internet of Things UHF radio frequency identification (RFID) promises

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(3):723-728 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Research on heterogeneous network architecture between

More information

Big Data Storage Architecture Design in Cloud Computing

Big Data Storage Architecture Design in Cloud Computing Big Data Storage Architecture Design in Cloud Computing Xuebin Chen 1, Shi Wang 1( ), Yanyan Dong 1, and Xu Wang 2 1 College of Science, North China University of Science and Technology, Tangshan, Hebei,

More information

INTERNET OF THINGS 1

INTERNET OF THINGS 1 INTERNET OF THINGS 1 OUTLINE Introduction to IoT Technologies Ubiquitous Network Network Management Technologies RFID WSN Embedded Nanotechnology IPv6 UPnP SNMP Challenging Problems Conclusions and Future

More information

Remote Monitoring and Controlling System Based on ZigBee Networks

Remote Monitoring and Controlling System Based on ZigBee Networks Remote Monitoring and Controlling System Based on ZigBee Networks Soyoung Hwang and Donghui Yu* Department of Multimedia Engineering, Catholic University of Pusan, South Korea {soyoung, dhyu}@cup.ac.kr

More information

The Technology System Framework of the Internet of Things and its Application Research in Agriculture

The Technology System Framework of the Internet of Things and its Application Research in Agriculture The Technology System Framework of the Internet of Things and its Application Research in Agriculture Hong ZHOU 1, BingWu LIU, PingPing DONG School of Information Science & Technology, Beijing Wuzi University,Beijing,

More information

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1

Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 , pp. 331-342 http://dx.doi.org/10.14257/ijfgcn.2015.8.2.27 Study on Architecture and Implementation of Port Logistics Information Service Platform Based on Cloud Computing 1 Changming Li, Jie Shen and

More information

CDMA-based network video surveillance System Solutions

CDMA-based network video surveillance System Solutions 1 Contact:Peter Zhang Email: sales10@caimore.com CDMA-based network video surveillance System Solutions Introduction In recent years, mobile communication, video surveillance for its intuitive, easy to

More information

The ebbits project: from the Internet of Things to Food Traceability

The ebbits project: from the Internet of Things to Food Traceability The ebbits project: from the Internet of Things to Food Traceability Smart AgriMatics2014 Contribution to session 5.2 Meat Information Provenance 18-19 June 2014 Paolo Brizzi Istituto Superiore Mario Boella

More information

Mobile Storage and Search Engine of Information Oriented to Food Cloud

Mobile Storage and Search Engine of Information Oriented to Food Cloud Advance Journal of Food Science and Technology 5(10): 1331-1336, 2013 ISSN: 2042-4868; e-issn: 2042-4876 Maxwell Scientific Organization, 2013 Submitted: May 29, 2013 Accepted: July 04, 2013 Published:

More information

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang

The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) The Key Technology Research of Virtual Laboratory based On Cloud Computing Ling Zhang Nanjing Communications

More information

Design of Data Archive in Virtual Test Architecture

Design of Data Archive in Virtual Test Architecture Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 1, January 2014 Design of Data Archive in Virtual Test Architecture Lian-Lei

More information

Data Cleansing for Remote Battery System Monitoring

Data Cleansing for Remote Battery System Monitoring Data Cleansing for Remote Battery System Monitoring Gregory W. Ratcliff Randall Wald Taghi M. Khoshgoftaar Director, Life Cycle Management Senior Research Associate Director, Data Mining and Emerson Network

More information

The WAMS Power Data Processing based on Hadoop

The WAMS Power Data Processing based on Hadoop Proceedings of 2012 4th International Conference on Machine Learning and Computing IPCSIT vol. 25 (2012) (2012) IACSIT Press, Singapore The WAMS Power Data Processing based on Hadoop Zhaoyang Qu 1, Shilin

More information

The novel analysis model of cloud computing based on RFID internet of things

The novel analysis model of cloud computing based on RFID internet of things Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 014, 6(6):661-668 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The novel analysis model of cloud computing based

More information

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment

2. Research and Development on the Autonomic Operation. Control Infrastructure Technologies in the Cloud Computing Environment R&D supporting future cloud computing infrastructure technologies Research and Development on Autonomic Operation Control Infrastructure Technologies in the Cloud Computing Environment DEMPO Hiroshi, KAMI

More information

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4

Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang Chen 4 5th International Conference on Advanced Materials and Computer Science (ICAMCS 2016) Memory Database Application in the Processing of Huge Amounts of Data Daqiang Xiao 1, Qi Qian 2, Jianhua Yang 3, Guang

More information

Development of cloud computing system based on wireless sensor network protocol and routing

Development of cloud computing system based on wireless sensor network protocol and routing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 204, 6(7):680-684 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Development of cloud computing system based on wireless

More information

Wireless Sensor Networks Database: Data Management and Implementation

Wireless Sensor Networks Database: Data Management and Implementation Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Wireless Sensor Networks Database: Data Management and Implementation Ping Liu Computer and Information Engineering Institute,

More information

An Optimization Model of Load Balancing in P2P SIP Architecture

An Optimization Model of Load Balancing in P2P SIP Architecture An Optimization Model of Load Balancing in P2P SIP Architecture 1 Kai Shuang, 2 Liying Chen *1, First Author, Corresponding Author Beijing University of Posts and Telecommunications, shuangk@bupt.edu.cn

More information

Digital Modernization of Oilfields Digital Oilfield to Intelligent Oilfield. Karamay Hongyou Software Co., Ltd.

Digital Modernization of Oilfields Digital Oilfield to Intelligent Oilfield. Karamay Hongyou Software Co., Ltd. Digital Modernization of Oilfields Digital Oilfield to Intelligent Oilfield Karamay Hongyou Software Co., Ltd. Professional technologies and information technology enhance the development of the oil industry.

More information

Design of Remote data acquisition system based on Internet of Things

Design of Remote data acquisition system based on Internet of Things , pp.32-36 http://dx.doi.org/10.14257/astl.214.79.07 Design of Remote data acquisition system based on Internet of Things NIU Ling Zhou Kou Normal University, Zhoukou 466001,China; Niuling@zknu.edu.cn

More information

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY

CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY CHAPTER - 4 CHANNEL ALLOCATION BASED WIMAX TOPOLOGY 4.1. INTRODUCTION In recent years, the rapid growth of wireless communication technology has improved the transmission data rate and communication distance.

More information

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b 3rd International Conference on Materials Engineering, Manufacturing Technology and Control (ICMEMTC 2016) The Application Research of Ant Colony Algorithm in Search Engine Jian Lan Liu1, a, Li Zhu2,b

More information

Research on Operation Management under the Environment of Cloud Computing Data Center

Research on Operation Management under the Environment of Cloud Computing Data Center , pp.185-192 http://dx.doi.org/10.14257/ijdta.2015.8.2.17 Research on Operation Management under the Environment of Cloud Computing Data Center Wei Bai and Wenli Geng Computer and information engineering

More information

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY

RFID. Radio Frequency IDentification: Concepts, Application Domains and Implementation LOGO SPEAKER S COMPANY RFID Radio Frequency IDentification: Concepts, Application Domains and Implementation Dominique Guinard, Patrik Fuhrer and Olivier Liechti University of Fribourg, Switzerland Submission ID: 863 2 Agenda

More information

A Design of Greenhouse Remote Monitoring System Based on WSN and WEB

A Design of Greenhouse Remote Monitoring System Based on WSN and WEB A Design of Greenhouse emote Monitoring System Based on WSN and WEB Jun Wang 1,2, Gang Liu 1 1 Key Laboratory for Modern Precision Agriculture System Integration esearch, Ministry of Education, China Agricultural

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651. Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5): 647-651 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Comprehensive colliery safety monitoring system

More information

Framework model on enterprise information system based on Internet of things

Framework model on enterprise information system based on Internet of things International Journal of Intelligent Information Systems 2014; 3(6): 55-59 Published online December 22, 2014 (http://www.sciencepublishinggroup.com/j/ijiis) doi: 10.11648/j.ijiis.20140306.11 ISSN: 2328-7675

More information

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics

An Intelligent Middleware Platform and Framework for RFID Reverse Logistics International Journal of Future Generation Communication and Networking 75 An Intelligent Middleware Platform and Framework for RFID Reverse Logistics Jihyun Yoo, and Yongjin Park Department of Electronics

More information

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network

Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Chapter 2 The Research on Fault Diagnosis of Building Electrical System Based on RBF Neural Network Qian Wu, Yahui Wang, Long Zhang and Li Shen Abstract Building electrical system fault diagnosis is the

More information

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool

IPv4 and IPv6: Connecting NAT-PT to Network Address Pool Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(5):547-553 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 Intercommunication Strategy about IPv4/IPv6 coexistence

More information

INTERNET OF THINGS Recent Advances and Applications MengChu Zhou, Tongji University and New Jersey Institute of Technology

INTERNET OF THINGS Recent Advances and Applications MengChu Zhou, Tongji University and New Jersey Institute of Technology INTERNET OF THINGS Recent Advances and Applications MengChu Zhou, Tongji University and New Jersey Institute of Technology What is the next Industrial Revolution? The 1st answer People producing their

More information

Frame of IoT in China

Frame of IoT in China Frame of IoT in China EuropElectro Summary Orgalime - The European Engineering Industries Association, Brussels Orgalime - 欧 洲 工 程 行 业 协 会, 布 鲁 塞 尔 ZVEI - German Electrical and Electronic Manufacturers

More information

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3

Micro-Environment Sensor based Android Application More Ketan Dadasaheb 1 Computer Department SCSCOE Pune, India Jagtap Pravin Vitthal 3 Volume 3, Issue 1, January 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com ISSN:

More information

An efficient Join-Engine to the SQL query based on Hive with Hbase Zhao zhi-cheng & Jiang Yi

An efficient Join-Engine to the SQL query based on Hive with Hbase Zhao zhi-cheng & Jiang Yi International Conference on Applied Science and Engineering Innovation (ASEI 2015) An efficient Join-Engine to the SQL query based on Hive with Hbase Zhao zhi-cheng & Jiang Yi Institute of Computer Forensics,

More information

ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line

ANN Based Fault Classifier and Fault Locator for Double Circuit Transmission Line International Journal of Computer Sciences and Engineering Open Access Research Paper Volume-4, Special Issue-2, April 2016 E-ISSN: 2347-2693 ANN Based Fault Classifier and Fault Locator for Double Circuit

More information

A Study on Internet of Things based Applications

A Study on Internet of Things based Applications A Study on Internet of Things based Applications Deeksha Jain, P. Venkata Krishna and V. Saritha School of Computing Science and Engineering VIT University, Vellore, TN, India Abstract This paper gives

More information

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China

A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China A SaaS-based Logistics Informatization Model for Specialized Farmers Cooperatives in China Zhongqiang Liu 1, Kaiyi Wang 1*, Shufeng Wang 1, Feng Yang 1 and Xiandi Zhang 1, 1 Beijing Research Center for

More information

Construction of DBMS for the Warehouse of Textile Enterprise Based on RFID Technology

Construction of DBMS for the Warehouse of Textile Enterprise Based on RFID Technology Construction of DBMS for the Warehouse of Textile Enterprise Based on RFID Technology Ruru Pan, Jihong Liu, Weidong Gao, Hongbo Wang, Jianli Liu School of Textile and Clothing, Jiangnan Univerisity, Lihu

More information

Name of pattern types 1 Process control patterns 2 Logic architectural patterns 3 Organizational patterns 4 Analytic patterns 5 Design patterns 6

Name of pattern types 1 Process control patterns 2 Logic architectural patterns 3 Organizational patterns 4 Analytic patterns 5 Design patterns 6 The Researches on Unified Pattern of Information System Deng Zhonghua,Guo Liang,Xia Yanping School of Information Management, Wuhan University Wuhan, Hubei, China 430072 Abstract: This paper discusses

More information

WAITER: A Wearable Personal Healthcare and Emergency Aid System

WAITER: A Wearable Personal Healthcare and Emergency Aid System Sixth Annual IEEE International Conference on Pervasive Computing and Communications WAITER: A Wearable Personal Healthcare and Emergency Aid System Wanhong Wu 1, Jiannong Cao 1, Yuan Zheng 1, Yong-Ping

More information

THE Internet is a powerful tool used in all kinds of the

THE Internet is a powerful tool used in all kinds of the Proceedings of the Federated Conference on Computer Science and Information Systems pp. 1343 1348 DOI: 10.15439/2015F161 ACSIS, Vol. 5 Selected methods of artificial intelligence for Internet of Things

More information

Figure 1. The Example of ZigBee AODV Algorithm

Figure 1. The Example of ZigBee AODV Algorithm TELKOMNIKA Indonesian Journal of Electrical Engineering Vol.12, No.2, February 2014, pp. 1528 ~ 1535 DOI: http://dx.doi.org/10.11591/telkomnika.v12i2.3576 1528 Improving ZigBee AODV Mesh Routing Algorithm

More information

Research on the UHF RFID Channel Coding Technology based on Simulink

Research on the UHF RFID Channel Coding Technology based on Simulink Vol. 6, No. 7, 015 Research on the UHF RFID Channel Coding Technology based on Simulink Changzhi Wang Shanghai 0160, China Zhicai Shi* Shanghai 0160, China Dai Jian Shanghai 0160, China Li Meng Shanghai

More information

Towards the Optimization of Data Mining Execution Process in Distributed Environments

Towards the Optimization of Data Mining Execution Process in Distributed Environments Journal of Computational Information Systems 7: 8 (2011) 2931-2939 Available at http://www.jofcis.com Towards the Optimization of Data Mining Execution Process in Distributed Environments Yan ZHANG 1,,

More information

A Network Simulation Experiment of WAN Based on OPNET

A Network Simulation Experiment of WAN Based on OPNET A Network Simulation Experiment of WAN Based on OPNET 1 Yao Lin, 2 Zhang Bo, 3 Liu Puyu 1, Modern Education Technology Center, Liaoning Medical University, Jinzhou, Liaoning, China,yaolin111@sina.com *2

More information

Cloud Storage Solution for WSN in Internet Innovation Union

Cloud Storage Solution for WSN in Internet Innovation Union Cloud Storage Solution for WSN in Internet Innovation Union Tongrang Fan, Xuan Zhang and Feng Gao School of Information Science and Technology, Shijiazhuang Tiedao University, Shijiazhuang, 050043, China

More information

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou

Exploration on Security System Structure of Smart Campus Based on Cloud Computing. Wei Zhou 3rd International Conference on Science and Social Research (ICSSR 2014) Exploration on Security System Structure of Smart Campus Based on Cloud Computing Wei Zhou Information Center, Shanghai University

More information

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing

Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392. Research Article. E-commerce recommendation system on cloud computing Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1388-1392 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 E-commerce recommendation system on cloud computing

More information

HP Brazil RFID CoE Center of Excellence

HP Brazil RFID CoE Center of Excellence HP Brazil RFID CoE Center of Excellence TEST CENTER DESCRIPTION: The RFID Center of Excellence is prepared to aid customers to visualize in their businesses possible RFID applications as well as to observe

More information

Communication Networks. MAP-TELE 2011/12 José Ruela

Communication Networks. MAP-TELE 2011/12 José Ruela Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Network Architectures Protocol Layering Network architecture concept A network architecture is an abstract model used to describe

More information

Modeling Guidelines Manual

Modeling Guidelines Manual Modeling Guidelines Manual [Insert company name here] July 2014 Author: John Doe john.doe@johnydoe.com Page 1 of 22 Table of Contents 1. Introduction... 3 2. Business Process Management (BPM)... 4 2.1.

More information

Application of Data Mining Techniques in Intrusion Detection

Application of Data Mining Techniques in Intrusion Detection Application of Data Mining Techniques in Intrusion Detection LI Min An Yang Institute of Technology leiminxuan@sohu.com Abstract: The article introduced the importance of intrusion detection, as well as

More information

Study on Secure File Transfer Scheme on ARM9-based Security

Study on Secure File Transfer Scheme on ARM9-based Security Study on Secure File Transfer Scheme on ARM9-based Security Authentication Platform * (School of Computer Science and Engineering, Hunan University of Science and Technology, Xiangtan, 411201) * Email:idlink@163.com

More information

THE CAMPUS SECURITY TRACKING SYSTEM BASED ON RFID AND ZIGBEE NETWORK

THE CAMPUS SECURITY TRACKING SYSTEM BASED ON RFID AND ZIGBEE NETWORK THE CAMPUS SECURITY TRACKING SYSTEM BASED ON RFID AND ZIGBEE NETWORK M. SATHISH KUMAR 1 & S. NAGARAJ 2 1,2 Sri Venkateswara College of Engineering, R.V.S Nagar, Chittor E-mail : satish2urs@gmail.com, nagarajsubramanyam@gmail.com

More information

A Systemfor Scanning Traffic Detection in 3G WCDMA Network

A Systemfor Scanning Traffic Detection in 3G WCDMA Network 2012 IACSIT Hong Kong Conferences IPCSIT vol. 30 (2012) (2012) IACSIT Press, Singapore A Systemfor Scanning Traffic Detection in 3G WCDMA Network Sekwon Kim +, Joohyung Oh and Chaetae Im Advanced Technology

More information

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE

UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE UBIQUITOUS NETWORK TECHNICAL ROOM MONITORING SYSTEM MODEL USING WEB SERVICE Ha Quoc Trung 1 1 Department of Data Communication and Computer Network, School of Information and Telecommunication Technology,

More information

Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready

Find the Information That Matters. Visualize Your Data, Your Way. Scalable, Flexible, Global Enterprise Ready Real-Time IoT Platform Solutions for Wireless Sensor Networks Find the Information That Matters ViZix is a scalable, secure, high-capacity platform for Internet of Things (IoT) business solutions that

More information

Location Filtering and Duplication Elimination for RFID Data Streams

Location Filtering and Duplication Elimination for RFID Data Streams International Journal of Principles and Applications of Information Science and Technology December 2007, Vol.1, No.1 Location Filtering and Duplication Elimination for RFID Data Streams Prapassara Pupunwiwat,

More information

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces

Decomposition into Parts. Software Engineering, Lecture 4. Data and Function Cohesion. Allocation of Functions and Data. Component Interfaces Software Engineering, Lecture 4 Decomposition into suitable parts Cross cutting concerns Design patterns I will also give an example scenario that you are supposed to analyse and make synthesis from The

More information

OPNET Network Simulator

OPNET Network Simulator Simulations and Tools for Telecommunications 521365S: OPNET Network Simulator Jarmo Prokkola Research team leader, M. Sc. (Tech.) VTT Technical Research Centre of Finland Kaitoväylä 1, Oulu P.O. Box 1100,

More information

International Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015)

International Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015) International Conference on Advances in Energy, Environment and Chemical Engineering (AEECE-2015) An Optimal Reactive Power Planning Software for Urban Network Qiang Sun 1, a, Xue Wang 1,b, Yingting Ni

More information

How To Develop Software

How To Develop Software Software Engineering Prof. N.L. Sarda Computer Science & Engineering Indian Institute of Technology, Bombay Lecture-4 Overview of Phases (Part - II) We studied the problem definition phase, with which

More information

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD

CPS: Communications. Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD CPS: Communications Dr. Bheemarjuna Reddy Tamma IIT HYDERABAD CONTENTS Background/Motivation Wireless Communication Technologies Machine-to-Machine Communication M2M Architecrures Issues in M2M Communicatuon

More information

Energy Monitoring and Management Technology based on IEEE 802.15. 4g Smart Utility Networks and Mobile Devices

Energy Monitoring and Management Technology based on IEEE 802.15. 4g Smart Utility Networks and Mobile Devices Monitoring and Management Technology based on IEEE 802.15. 4g Smart Utility Networks and Mobile Devices Hyunjeong Lee, Wan-Ki Park, Il-Woo Lee IT Research Section IT Convergence Technology Research Laboratory,

More information

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System

A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System , pp.91-96 http://dx.doi.org/10.14257/ijbsbt.2014.6.3.11 A Study of the Design of Wireless Medical Sensor Network based u- Healthcare System Ronnie D. Caytiles and Sungwon Park 1* 1 Hannam University 133

More information

Industrial Networks & Databases

Industrial Networks & Databases Industrial Networks & Databases LONWORKS KNX 1 HVAC and BEMS HVAC - Heating, Ventilation & Air Conditioning BEMS - Building & Energy Management Systems 2 3 4 LONWORKS (Local Operating Networks) Open solution

More information

The Remote Monitoring System Based on GPRS for the Health State of

The Remote Monitoring System Based on GPRS for the Health State of The Remote Monitoring System Based on GPRS for the Health State of Civil Engineering 1 Gang Li, 2 XiLong Che *1, First Author and Corresponding Author School of Information Engineering,Chang an University,

More information

Analysis on Data Mining Model Objected to Internet of Things

Analysis on Data Mining Model Objected to Internet of Things Analysis on Data Mining Model Objected to Internet of Things School of Computer & Communication Engineering, University of Science & Technology Beijing No.30, Xue Yuan Road, HaiDian District, Beijing,

More information

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards

RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards RF-Enabled Applications and Technology: Comparing and Contrasting RFID and RF-Enabled Smart Cards January 2007 Developed by: Smart Card Alliance Identity Council RF-Enabled Applications and Technology:

More information

The Regional Medical Business Process Optimization Based on Cloud Computing Medical Resources Sharing Environment

The Regional Medical Business Process Optimization Based on Cloud Computing Medical Resources Sharing Environment BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 13, Special Issue Sofia 2013 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.2478/cait-2013-0034 The Regional Medical

More information

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster

A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster , pp.11-20 http://dx.doi.org/10.14257/ ijgdc.2014.7.2.02 A Load Balancing Algorithm based on the Variation Trend of Entropy in Homogeneous Cluster Kehe Wu 1, Long Chen 2, Shichao Ye 2 and Yi Li 2 1 Beijing

More information

Automatic system for providing security services in. the Internet of Things applications over Wireless Sensor Networks

Automatic system for providing security services in. the Internet of Things applications over Wireless Sensor Networks Automatic system for providing security services in Authors: the Internet of Things applications over Wireless J.A. Sánchez Alcón: Lourdes López: Sensor Networks jose.asanchez-alcon@.upm.es lourdes.lopez@upm.es

More information

Power & Environmental Monitoring

Power & Environmental Monitoring Data Centre Monitoring Made Easy Power & Environmental Monitoring Features & Benefits Packet Power provides the easiest, most cost effective way to capture detailed power and temperature information for

More information

Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System

Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System Application of Wireless Sensor Network and GSM Technology: A Remote Home Security System Atul Arora, Ankit Malik ABSTRACT In this paper, a low-power consumption remote home security alarm system developed

More information

Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2

Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2 Development of Industrial Intrusion Detection and Monitoring Using Internet of Things P. Gokul Sai Sreeram 1, Chandra Mohan Reddy Sivappagari 2 Abstract The need for deployment of security systems rapidly

More information

Big Data with Rough Set Using Map- Reduce

Big Data with Rough Set Using Map- Reduce Big Data with Rough Set Using Map- Reduce Mr.G.Lenin 1, Mr. A. Raj Ganesh 2, Mr. S. Vanarasan 3 Assistant Professor, Department of CSE, Podhigai College of Engineering & Technology, Tirupattur, Tamilnadu,

More information

The design and implementation of intelligent library management system based on RFID/GRPS

The design and implementation of intelligent library management system based on RFID/GRPS Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(4):839-844 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The design and implementation of intelligent library

More information

Build the College Network Teaching System Based on Cloud Computing

Build the College Network Teaching System Based on Cloud Computing Build the College Network Teaching System Based on Cloud Computing College of Mathematics and Computer Science, Shanxi Normal University Linfen, 041004, China E-mail: wjlkt@163.com Abstract Cloud computing

More information

Analysis and Design of ETL in Hospital Performance Appraisal System

Analysis and Design of ETL in Hospital Performance Appraisal System Vol. 2, No. 4 Computer and Information Science Analysis and Design of ETL in Hospital Performance Appraisal System Fengjuan Yang Computer and Information Science, Fujian University of Technology Fuzhou

More information

Proposal for a Vehicle Tracking System (VTS)

Proposal for a Vehicle Tracking System (VTS) Proposal for a Vehicle Tracking System (VTS) 2 Executive Summary Intelligent Instructions is an IT product development and consulting company. At Intelligent Instructions, we focus on the needs of the

More information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information

Computer Network. Interconnected collection of autonomous computers that are able to exchange information Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.

More information

Open Access Design of a Python-based Wireless Network Optimization and Testing System

Open Access Design of a Python-based Wireless Network Optimization and Testing System Send Orders for Reprints to reprints@benthamscience.ae The Open Automation and Control Systems Journal, 2015, 7, 353-357 353 Open Access Design of a Python-based Wireless Network Optimization and Testing

More information

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT

Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chapter 17: M2M-Based Metropolitan Platform for IMS-Enabled Road Traffic Management in IoT Chih-Yuan Lee Department of CSIE National Taipei University 1 Outline Abstract Introduction Background System

More information

Service Monitoring and Alarm Correlations

Service Monitoring and Alarm Correlations Service Monitoring and Alarm Correlations Oliver Jukić Virovitica College Virovitica, Republic of Croatia oliver.jukic@vsmti.hr Ivan Heđi Virovitica College Virovitica, Republic of Croatia ivan.hedi@vsmti.hr

More information

Research of Sales Contract Management System Based on WEB

Research of Sales Contract Management System Based on WEB Computer and Information Science February, 2009 Research of Sales Contract Management System Based on WEB Hualun Lai Business School Tel:86-21-5527-1343 E-mail: laihl@usst.edu.cn Liangwei Zhong CAD center

More information

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation

Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation International Journal of Smart Grid and Clean Energy Design of WSN-Based Remote Monitoring System for Environmental Parameters in Substation Aina Hu a *, Huanhuan Wang b, and Jianchen Wan a a Department

More information

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security

SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS Next Generation Networks Security International Telecommunication Union ITU-T Y.2740 TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU (01/2011) SERIES Y: GLOBAL INFORMATION INFRASTRUCTURE, INTERNET PROTOCOL ASPECTS AND NEXT-GENERATION NETWORKS

More information

Study on IOT based Architecture of Logistics Service Supply Chain

Study on IOT based Architecture of Logistics Service Supply Chain , pp.169-178 http://dx.doi.org/10.14257/ijgdc.2014.7.1.15 Study on IOT based Architecture of Logistics Service Supply Chain Wei Liu and Zhijun Gao College of Transport and Communications, Shanghai Maritime

More information

IBM. IBM Flex System Manager Service and Support Manager (Electronic Service Agent) IBM Systems. Version 1.3.2

IBM. IBM Flex System Manager Service and Support Manager (Electronic Service Agent) IBM Systems. Version 1.3.2 IBM IBM Systems IBM Flex System Manager Service and Support Manager (Electronic Service Agent) Version 1.3.2 IBM IBM Systems IBM Flex System Manager Service and Support Manager (Electronic Service Agent)

More information

Chapter 11 I/O Management and Disk Scheduling

Chapter 11 I/O Management and Disk Scheduling Operating Systems: Internals and Design Principles, 6/E William Stallings Chapter 11 I/O Management and Disk Scheduling Dave Bremer Otago Polytechnic, NZ 2008, Prentice Hall I/O Devices Roadmap Organization

More information