Статті в журналах з теми "Slave-server"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Slave-server.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-36 статей у журналах для дослідження на тему "Slave-server".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Li, Rui, Shu Yong Song, Zhen Guo Ma, and Zi Ming Kou. "Design of Setting Management System of Relay Protection to Anti-Grade Trip in Coal Mine Based on Serial Communication." Applied Mechanics and Materials 415 (September 2013): 109–12. http://dx.doi.org/10.4028/www.scientific.net/amm.415.109.

Повний текст джерела
Анотація:
Because of personnel deployment flow, protection equipment and electric device replacement, and enterprise scale expansion, setting management is more difficult. It is easy to be out of control and become the main reason for the anti-grade trip. To solve the anti-grade trip problem of setting mismanagement, this paper designed one setting management system, which is composed of slave controller and upper server. After analysis, the communication process based on the TCP/IP protocols, the communication scheme is chosen between slave controller and upper server. Software within upper server is designed based on database technology. Slave controller gets the setting from relay protection device, by using IEC 60870-5-103 protocols based on serial communication, and sends to the software within the upper server, which can monitor, display and record. Setting management problem was solved, which is caused by the personnel deployment flow, protection equipment replacement, and enterprise scale expansion. This method can be widely used.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Kristian, Dolly Simon, Adian Fatchur Rochim, and Eko Didik Widianto. "Pengembangan Sistem Replikasi dan Redundansi untuk Meningkatkan Kehandalan Basisdata MySQL." Jurnal Teknologi dan Sistem Komputer 3, no. 4 (October 20, 2015): 523. http://dx.doi.org/10.14710/jtsiskom.3.4.2015.523-529.

Повний текст джерела
Анотація:
With the development of information technology, humans make it easy to complete every duty. Any information about the work carried out to be very valuable, therefore the information should be stored properly, by organizing a reliable database system when performing data storage on the server information. Build a design application virtualization master slave database servers that are connected with the management node using the virtual application to get the test results replication system performance and redundancy in the design of the cluster system. Methodology of this research include the study of literature, collecting data by interview, observation, literature studies, system design, and testing of the system. In a literature study on the use of research methods to study the literature books, records that can be used as a support in the research. The design of this thesis using MySQL Cluster system with Ndbcluster engine. Last is testing this system on its performance on the server failure or failures occur and reliability in performance. The results obtained are when there is a failure on the primary server, it will be immediately replaced by another server is a slave. And the replication of data between the main server and slave.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Song, Xin. "A Design of Boot over SRIO." Applied Mechanics and Materials 401-403 (September 2013): 1734–37. http://dx.doi.org/10.4028/www.scientific.net/amm.401-403.1734.

Повний текст джерела
Анотація:
A server architecture composed of multiple embedded boards connected by serial RapidIO bus is proposed, and a solution of boot over serial RapidIO is provided. This solution can allow the master board to dynamically discover configure boot and release the slave boards according to service demands and provides all images to the slave boards. This architecture is reliable scalable and low power consumption.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Xilong, Qu, Liu Shengzong, Fu Sha, He Hong, Hu Ying, and Xiao Leyi. "Design and Implementation of Wireless Environment Monitoring System Based on STM32." Scientific Programming 2021 (October 28, 2021): 1–15. http://dx.doi.org/10.1155/2021/6070664.

Повний текст джерела
Анотація:
This paper first designed the overall scheme of a wireless-based intelligent environment monitoring system; this system is comprised of the following four parts: server part, client part, slave computer part, and master computer part. The master computer is equipped with a wireless transmission module and an LCD module. Slave computers are equipped with temperature-humidity sensing modules and wireless transmission modules. The server side has two major interfaces: data display and server establishment. An Android phone as the client can realize the communication between the mobile APP and server through network communication to obtain environmental data in real time. The hardware part of the system consists of wireless transmission module, temperature and humidity module, smoke module, lighting module, flame module, and LCD module. The software implementation part mainly includes the design and implementation of serial communication, the design and implementation of wireless communication, the design and implementation of collection of data acquisition in each sensor module, and the design and implementation of network communication as well as the design and implementation of display unit. With the cooperation of these four parts, we can automatically sense and control the state of the environment to realize human-computer interaction.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Mufadhol, M. "CLONING HARDDISK MELALUI JARINGAN KOMPUTER DENGAN MENGGUNAKAN SOFTWARE GHOST." Jurnal Transformatika 7, no. 1 (July 8, 2009): 23. http://dx.doi.org/10.26623/transformatika.v7i1.39.

Повний текст джерела
Анотація:
<span>Kloning adalah proses duplikat isi harddisk ke harddisk yang lain. Jadi isi kedua harddisk adalah sama persis. Kloning harddisk dilakukan untuk mempercepat proses instalasi perangkat lunak dengan spesifikasi hardware yang sama. Kloning harddisk melalui jaringan komputer dapat dilakukan dari harddisk master ke harddisk slave atau harddisk tujuan. Pada proses kloning harddisk melalui jaringan komputer hardis induk berada di komputer server saja sedangkan slave harddisk berada di komputer klien saja. Harddisk setiap komputer tidak perlu digandeng (diparalel). Dalam melakukan kloning harddisk melalui jaringan komputer diperlukan beberapa program aplikasi antara lain: Ghost Cast Server, Boot Wizard, LAN Boot Floppy Klien, Ghost Explore. Aplikasi yang sering digunakan untuk kloning adalah software Ghost yang dirilis oleh </span><em>Symantect Coorporation.</em>
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Yang, Jui-Pin. "A Novel Storage Virtualization Scheme for Network Storage Systems." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1 (January 31, 2022): 08–13. http://dx.doi.org/10.17762/ijritcc.v10i1.5514.

Повний текст джерела
Анотація:
The network storage systems are generally composed of clients, storage servers and metadata servers. In this paper, we proposed a novel storage virtualization (NSV) scheme which is capable of alleviating the heavy load of metadata server, guaranteeing the storage quality of service and dynamically adapting storage resources. The metadata server automatically constructs a dedicated storage cluster according to various requirements of storage quality of service. The storage cluster may consist of one to many storage servers which includes one master storage server and zero to many slave storage servers. In other words, a network storage system consists of at least one storage cluster. The requests of each client are forwarded to corresponding master storage server within a specific storage cluster. In addition, the master storage server determines the best storage server which handles the requests based on the conditions of storage servers. Next, the requests will be redirected to the selected storage server. Finally, the responses are directly transmitted to the client.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Lukito, Rudy Santoso, Deddy Susilo, and F. Dalu Setiaji. "Sistem Monitoring Energi Lampu Penerangan Jalan Umum Berbasis Wireless Sensor Network dengan Topologi Mesh." Techné : Jurnal Ilmiah Elektroteknika 15, no. 01 (April 1, 2016): 39–46. http://dx.doi.org/10.31358/techne.v15i01.139.

Повний текст джерела
Анотація:
Pada makalah ini dibuat suatu sistem untuk memantau energi listrik yang terpakai pada lampu penerangan jalan umum dan mengirimkan datanya, berbasis wireless sensor network dengan topologi mesh. Terdapat modul slave yang dipasang pada tiang lampu jalan yang terdiri dari sensor tegangan jala-jala PLN, sensor arus yang terpakai oleh lampu, dan sensor intensitas cahaya yang dihasilkan lampu. Mikrokontroler Arduino pro mini 3,3V 8MHz digunakan untuk mengolah data dari sensor sehingga dapat diketahui besarnya daya yang digunakan oleh lampu. Wireless sensor network dengan topologi mesh dirancang untuk untuk mengatasi gagalnya pengiriman data dari modul slave ke modul master di komputer server. Wireless sensor network dirancang menggunakan RF transceiver. Hasil pengujian menunjukkan sensor tegangan, arus dan intensitas cahaya memiliki ralat di bawah 3%. Perancangan wireless sensor network dengan topologi mesh berhasil direalisasikan, di mana ketika salah satu modul slave yang tidak berfungsi, semua data dari modul slave yang berfungsi tetap dapat diterima oleh modul master.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Short, Michael. "Eligible earliest deadline first: Server-based scheduling for master-slave industrial wireless networks." Computers & Electrical Engineering 64 (November 2017): 305–21. http://dx.doi.org/10.1016/j.compeleceng.2017.08.007.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Xiong, Qi, Hong Bo Zhang, Zheng Bei Zhu, and Zu Ju Li. "Design of Streaming Media Cluster Server Based on MPI." Applied Mechanics and Materials 63-64 (June 2011): 643–46. http://dx.doi.org/10.4028/www.scientific.net/amm.63-64.643.

Повний текст джерела
Анотація:
In recent years, cluster technology is used more wildly. In this paper, we present a new method to implement a streaming media cluster server. The server is constructed on a high performance cluster which consists of one control node, one storage node and 8 computing nodes. We wrote a parallel program with MPI which run on the cluster. The organization of MPI program is a master-slave scheme. The master interacted with users and scheduled task within slaves. Slaves called streaming media server which sent data directly to user. This can improve the system performance significantly. We can also guarantee the transparence of the service by single access point named IP Tunneling. The system was implemented under Linux platform and tested through simulation testing method. From the testing results, it can be confirmed that the whole system is well designed which achieves high performance, good robustness and high scalability.
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Prasetyo, Angga. "RANCANG BANGUN DATABASE DUA ARAH DENGAN KENDALI RASPBERRY PI PADA INTEGRASI SISTEM INFORMASI GEOGRAFIS PENYAKIT MENULAR." Simetris : Jurnal Teknik Mesin, Elektro dan Ilmu Komputer 7, no. 2 (November 1, 2016): 769. http://dx.doi.org/10.24176/simet.v7i2.793.

Повний текст джерела
Анотація:
Puskesmas sebagai unit kesehatan tingkat pertama memiliki tugas pokok yaitu pengobatan, perawatan kesehatan, kesehatan lingkungan, membina kesehatan ibu dan anak, pencegahan penyakit menular, pencatatan dan pelaporan. Dari keseluruhan tugas tampaknya tidak seluruhnya digarap oleh puskesmas terutama pencatatan dan pelaporan untuk pencegahan penyakit menular serta pola penyebarannya. untuk mengawasi dan mengendalikan perencananan program kesehatan termasuk penekanan penyebaran penyakit menular, puskesmas belum memiliki alat bantu yang terintegrasi satu atap secara real time dengan dinas kesehatan, untuk itu dibutuhkan sistem informasi geografis (SIG) untuk memvisualisasikan data penyakit menular, hal ini juga perlu ditunjang perangkat yang optimal dengan biaya yang murah dengan menggunakan raspberry pi sebagai kendali otomasi server data dalam replikasi. Proses memanfaatkan replikasi database dua arah menggunakan dua server dengan server satu sebagai master sedangkan server lainnya berfungsi sebagai slave. Hasil pengujian replikasi pada transaction rate untuk meminimalkan antrian data node 1 pada nilai 1,99/detik setiap transaksi data, node 2 nilai 2,02/detik, sedangkan balancer dengan nilai 1,91/detik, sedangkan response time atau kecepatan replikasi database dalam menangkap dan mengirimkan data sangat efektif, pada node 1 0,33/s untuk kecepatan proses, node 2 dengan waktu 0,01/s, dan balancer 0,13/s. Kata kunci: puskesmas, replikasi database dua arah, penyakit menular, dinas kesehatan, sistem informasi geografis (SIG).
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Mpitziopoulos, Aristides, Damianos Gavalas, Charalampos Konstantopoulos, and Grammati Pantziou. "CBID: A Scalable Method for Distributed Data Aggregation in WSNs." International Journal of Distributed Sensor Networks 6, no. 1 (January 1, 2010): 206517. http://dx.doi.org/10.1155/2010/206517.

Повний текст джерела
Анотація:
Mobile Agent (MA) technology has been recently proposed in Wireless Sensors Networks (WSNs) literature to answer the scalability problem of client/server model in data fusion applications. Herein we present CBID, a novel algorithm that calculates near-optimal routes for MAs that incrementally fuse the data as they visit the Sensor Nodes (SNs) while also enabling fast updates on the designed itineraries upon changes of network topology. CBID dispatches in parallel a number of MAs that sequentially visit sensor nodes arranged in tree structures and upon visiting an SN with two or more child SNs, the MAs (master MAs) clone of themselves with each clone (slave MA) visiting a tree branch. When all slave MAs return to that SN, they deliver their collected data to the master MA and are then disposed of. This results in a significant reduction of the overall energy expenditure and response time. Simulation results prove the high effectiveness of CBID in data fusion tasks compared to other alternative algorithms.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Qiao, Liang, Xin Chen, Ye Zhang, Jingna Zhang, Yi Wu, Ying Li, Xuemei Mo, Wei Chen, Bing Xie, and Mingguo Qiu. "An HTML5-Based Pure Website Solution for Rapidly Viewing and Processing Large-Scale 3D Medical Volume Reconstruction on Mobile Internet." International Journal of Telemedicine and Applications 2017 (2017): 1–13. http://dx.doi.org/10.1155/2017/4074137.

Повний текст джерела
Анотація:
This study aimed to propose a pure web-based solution to serve users to access large-scale 3D medical volume anywhere with good user experience and complete details. A novel solution of the Master-Slave interaction mode was proposed, which absorbed advantages of remote volume rendering and surface rendering. On server side, we designed a message-responding mechanism to listen to interactive requests from clients (Slave model) and to guide Master volume rendering. On client side, we used HTML5 to normalize user-interactive behaviors on Slave model and enhance the accuracy of behavior request and user-friendly experience. The results showed that more than four independent tasks (each with a data size of 249.4 MB) could be simultaneously carried out with a 100-KBps client bandwidth (extreme test); the first loading time was <12 s, and the response time of each behavior request for final high quality image remained at approximately 1 s, while the peak value of bandwidth was <50-KBps. Meanwhile, the FPS value for each client was ≥40. This solution could serve the users by rapidly accessing the application via one URL hyperlink without special software and hardware requirement in a diversified network environment and could be easily integrated into other telemedical systems seamlessly.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Canilho, Paulo, Ignacio Reguero, and Pablo Saiz. "Concurrent Adaptive Load Balancing at CERN." EPJ Web of Conferences 214 (2019): 08028. http://dx.doi.org/10.1051/epjconf/201921408028.

Повний текст джерела
Анотація:
CERN is using an increasing number of DNS based load balanced aliases (currently over 700). This article explains the Go based concurrent implementation of the Load Balancing Service, both the client (lbclient) and the server (lbd). The article describes how it is being progressively deployed using Puppet and how concurrency greatly improves scalability, ultimately allowing a single master-slave couple of Openstack virtual machines to server all the aliases. It explains the new implementation of the lbclient, which, among other things, allows to incorporate Collectd metrics to determine the status of the node and takes advantage of the Go language concurrency features to reduce the real time needed for checking the status of the node. The article explains that the LBD server acts as an arbiter getting feedback on load and health from the backend nodes using snmp (Simple Network Management Protocol) to decide which IP addresses the LB alias will present. While this architecture has been used since long at CERN for DNS based aliases, the LBD code is generic enough to drive other load balancers. A proof of concept using HAProxy to provide adaptive responses to load and health monitoring has been implemented.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Narwal, Priti, Deepak Kumar, Shailendra Narayan Singh, and Peeyush Tewari. "Stochastic Intrusion Detection Game-Based Arrangement Using Controlled Markov Chain for Prevention of DoS and DDoS Attacks in Cloud." Journal of Information Technology Research 14, no. 4 (October 2021): 45–57. http://dx.doi.org/10.4018/jitr.2021100104.

Повний текст джерела
Анотація:
DoS (denial of service) assault is the most prevalent assault these days. It imposes a major risk to cybersecurity. At the point when this assault is propelled by numerous conveyed machines on a solitary server machine, it is called as a DDoS (distributed denial of service) assault. Additionally, DoS bypass on DHCP (dynamic host configuration protocol) server assault is a rising and famous assault in a system. The authors have proposed a stochastic intrusion detection game-based arrangement utilizing controlled Markov chain that figures the transition probabilities starting with one state then onto the next in a state transition diagram. At first, the authors have conjectured these assaults, and after that, they proposed a methodology that uses the idea of master and slave IPS (intrusion prevention system). This approach works well when mapped to these estimated assaults and accordingly helps in the recognition and counteractive action of these assaults in a cloud domain.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Nogueira, Lucas Alvarez, Caison Rodrigues Ramos, Leonardo Carillo Bahia, and Celso Becker Tischer. "Desenvolvimento de um sistema de monitoramento em tempo real baseado em Arduino e Raspberry." Ciência e Natura 40 (March 12, 2019): 218. http://dx.doi.org/10.5902/2179460x35523.

Повний текст джерела
Анотація:
Actually, investors from several industrial sectors are looking for process improvements that aim at profitability and greater competitiveness in the market, however, characteristics such as cost, information and production agility are determining points for this. Open source input and output control platforms that integrate microcontrollers have been gaining ground in several sectors, where programmers have the ability to control processes and manage data. In this way, this article presents the development of a real time monitoring system of physical quantities based on Arduino and Raspberry. The complete system will consist of two modules, "Slave" and "Master", in which the data transfer of the measurements of temperature, humidity, luminosity, pressure and others will be carried out. The slave, formed by inexpensive sensors connected to an Arduino MEGA 2560, will be allocated at a remote location to acquire the desired physical quantities. The Master, will receive the information through an ethernet shield, connected in both modules, and will manage the database. The information stored on the web server can be accessed via internet browser, either in desktops or mobile systems through a friendly platform in real time.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Santoso, Panji Wiratama, I. Nyoman Piarsa, and Ni Made Ika Marini Mandenni. "Sistem Keamanan Helm Berbasis Internet of Things dengan Fitur Pelacakan Menggunakan Android." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 5 (October 29, 2021): 967–76. http://dx.doi.org/10.29207/resti.v5i5.3507.

Повний текст джерела
Анотація:
Helmet theft is a problem that is of concern to the public. Information Technology provides may resolve any problems, like Internet of Things-based system that can detect helmet theft and track the location of the helmet if it's stolen. This system is designed using a microcontroller device, namely Arduino which is attached to the helmet and motorbike with the help of the SIM800L v2, GPS Neo-6m, buzzer, and Bluetooth HC-05 which is connected to the master slave as an indicator of the safety of the helmet. The hardware on the helmet is connected to Firebase Realtime Database server so it can be connected with the user's Android application to monitor the state and location of the helmet. Android application displays maps to determine the position of the helmet, and can display notifications when the helmet is being stolen. The conclusion is this system can detect helmet theft with a maximum distance from the master and slave bluetooth connections of 10 meters, and the average data transmission from hardware to Firebase is 1,1 seconds, and can monitor status of the helmet and track the position of the helmet through the Android application with Android Jelly Bean (v4.3) operating system.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

Teguh Sutanto, Norma Ningsih, and Harianto. "Sumon: Pemantauan Kualitas dan Volume Susu Segar Pada Cold Storage berbasis IoT." JoTI 2, no. 1 (April 17, 2020): 31–35. http://dx.doi.org/10.37802/joti.v2i1.52.

Повний текст джерела
Анотація:
Penyimpanan susu segar membutuhkan pengaturan dan pemantauan suhu yang optimal agar kualitas susu segar dapat dipertahankan. Kondisi saat ini cold storage hanya bisa menampilkan temperature susu saat ini, tetapi data histori temperature dan keasaman susu tidak terekam dengan baik. Informasi distribusi susu segar dari petani susu ke KUD penyimpanan susu kemudian ke Industri Pengolah Susu (IPS) butuh yang lama. Penelitian ini mengusulkan Perangkat IoT Master dan Slave yang dapat digunakan untuk menyelesaikan permasalahan penyimpanan, pemantauan dan pengendalian persedian susu segar. IoT Node terdiri dari sensor suhu ruang, suhu susu, Ph meter, dan ultrasonic. Data dari sensor akan diproseses oleh IoT Node untuk kemudian dikirim ke IoT Master Controller. IoT Master Controller akan mengirimkan data ke server cloud. Berdasarkan data tersebut maka kondisi susu dalam cold storage dapat dipantau kualitas dan ketersediaannya.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Nugraha, Andre Rizki Dewo, Ridha Muldina Negara, and Danu Dwi Sanjoyo. "High Availability Performance on OpenDayLight SDN Controller Platform (OSCP) Clustering and OpenDayLight with Heartbeat-Distributed Replicated Block Device (DRBD)." JURNAL INFOTEL 10, no. 3 (August 28, 2018): 149. http://dx.doi.org/10.20895/infotel.v10i3.389.

Повний текст джерела
Анотація:
In this day people are asking for a reliable network when technology at its limit. Software-Defined Network (SDN) is an answer to that problem of network development where all the control over the network becomes centralized. However, all services controlled by a centralized controller have a big disadvantage if the controller dies. The High Availability (HA) is the solution. HA controller is divided into master and slave, when master controller is down then slave controller will respond to replace the function of master controller. In this research the system will be made by using two methods namely OpenDayLight SDN Controller Platform (OSCP) clustering and Heartbeat-DRBD (Distributed Replicated Block Device). OSCP clustering is a feature on OpenDayLight controller that is ready to be used and only need to be configured, with OSCP the main and backup controller clustering will be on connected cluster. Heartbeat-DRBD is an application commonly used to create High Availability systems on a server, but in this study will be used for the controller, Heartbeat will monitoring the main controller and if indicated to be down will move the resources to the backup controller with the DRBD application. From the simulation result shows that OSCP Clustering Failover and Failback average Time is 17 seconds while Heartbeat-DRBD is 23-45 seconds depends on how many switch and host are.While QoS parameters on both method have simillar value.it can be concluded that the High Availability system with OSCP Clustering method is more stable and good rather than Heartbeat-DRBD method to apply in a network.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Guo, Bo, Fu-Shin Lee, Chen-I. Lin, and Yun-Qing Lu. "A cloud integrated strategy for reconfigurable manufacturing systems." Concurrent Engineering 28, no. 4 (October 2, 2020): 305–18. http://dx.doi.org/10.1177/1063293x20958937.

Повний текст джерела
Анотація:
Manufacturing industries nowadays need to reconfigure their production lines promptly as to acclimate to rapid changing markets. Meanwhile, exercising system reconfigurations also needs to manage innumerous types of manufacturing apparatus involved. Nevertheless, traditional incompatible manufacturing systems delivered by exclusive vendors usually increase manufacture costs and prolong development time. This paper presents a novel RMS framework, which is intended to implement a Redis master/slave server mechanism to integrate various CNC manufacturing apparatus, hardware control means, and data exchange protocols through developed configurating codes. In the RMS framework each manufacturing apparatus or accessory stands for an object, and information of recognized CNC control panel image features, associated apparatus tuned parameters, communication formats, operation procedures, and control APIs, are stored into the Redis master cloud server database. Through implementation of machine vision techniques to acquire CNC controller panel images, the system effectively identifies instantaneous CNC machining states and response messages once the embedded image features are recognized. Upon demanding system reconfigurations for the manufacturing resources, the system issues commands from Redis local client servers to retrieve the stored information in the Redis master cloud servers, in which the resources for registered CNC machines, robots, and built-in accessories are maintained securely. The system then exploits the collected information locally to reconfigure involved manufacturing resources and starts manufacturing immediately, and thus is capable to promptly response to fast revised orders in a comitative market. In a prototyped RMS architecture, the proposed approach takes advantage of recognized feedback visual information, which is obtained using an invariant image feature extraction algorithm, and effectively commands an industrial robot to accomplish demanded actions on a CNC control panel, as a regular operator does daily in front of the CNC machine for manufacturing.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Kurnianto, Danny, Panca Mudjirahardjo, and M. Julius St Julius St. "Sistem Layanan Informasi dan Pemesanan Nomor Antrian Menggunakan Media SMS Berbasis Komunikasi Serial Asinkron Multipoint Standar RS-485." JURNAL INFOTEL - Informatika Telekomunikasi Elektronika 6, no. 2 (November 10, 2014): 73. http://dx.doi.org/10.20895/infotel.v6i2.19.

Повний текст джерела
Анотація:
Sistem layanan informasi dan pemesanan nomor antrian terpusat melalui media handphone dapat dijadikan sebagai salah satu solusi untuk mempermudah masyarakat dalam melakukan antrian sehingga aktivitas mereka bisa berjalan dengan baik dan waktu mereka tidak terbuang terlalu lama. Dengan menggunakan sistem ini, nasabah dapat dengan mudah melihat kondisi antrian saat ini dan memesan nomor antrian, yaitu dengan mengirimkan SMS berupa kata “daftar” untuk memesan nomor antrian dan kata “info” untuk mengetahui kondisi antrian ke handphone server. Personal komputer digunakan sebagai pusat pengendalian yang berfungsi untuk mengirim dan menerima data dari hanphone dan dari mikrokontroler pada unit slave. Komunikasi data antara komputer sentral dengan mikrokontroler berjalan dengan menggunakan komunikasi serial asinkron multipoint dengan baudrate 57600 bps. Komunikasi serial antara komputer sentral dengan handphone berjalan dengan baudrate 19200 bps. Dari hasil pengujian menunjukkan bahwa sistem layanan informasi dan pemesanan nomor antrian dapat bekerja dengan baik. Informasi yang diberikan saat nasabah mendaftar nomor antrian melalui handphone berupa nomor antrian dan password. Informasi yang diberikan komputer sentral saat nasabah meminta informasi kondisi antrian berupa berupa jumlah nasabah yang terdaftar pada sistem antrian saat ini, nomor antrian yang sedang dilayani pada masing-masing loket, waktu tutup antrian.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Salam, Abyanuddin, and Prengga Trisnanda. "Sistem Rumah Cerdas berbasis IoT, TCP, dan Bluetooth." Jurnal Teknologi dan Rekayasa Manufaktur 2, no. 1 (May 8, 2020): 1–14. http://dx.doi.org/10.48182/jtrm.v2i1.18.

Повний текст джерела
Анотація:
Saat ini teknologi berkembang dengan sangat pesat, dengan seiring perkembangan teknologi tersebut maka ada dampak yang ditimbulkan. Kontrol peralatan elektronik dapat diterapkan pada aplikasi smart home yang menggunakan pengendali peralatan elektronik rumah tangga berbasis Internet of Things (IoT) dan dapat di kontrol dengan jarak jauh dengan tujuan untuk meningkatkan efisiensi, kenyamanan dan keamanan. Penelitian ini bertujuan untuk merancang dan membuat sistem yang dapat diakses dimana saja berbasis IoT. Metodologi penelitian menggunakan metodologi eksperimental. Dimana implementasinya menggunakan komunikasi WEMOS D1 Mini yang berfungsi sebagai master yang akan menghubungkan antara hardware dan software. Arduino Mega 2650 digunakan sebagai slave yang juga dikontrol oleh WEMOS D1 Mini, berfungsi untuk melakukan kontrol pada sistem penerangan dan gerbang. Sedangkan instalasi di dalam rumah dikontrol oleh WEMOS D1 Mini. RTC digunakan untuk pendataan secara realtime sesuai tanggal dan waktu. Selanjutnya, data diupload ke server firebase, thinkspeak dan ubidots. Pada interface menggunakan MIT APP Inventor 2 untuk melakukan pengendalian dan monitoring. Kesimpulan dari penelitian ini adalah bahwa sistem yang dibuat dapat melakukan akses atau sistem kontrol dalam rumah maupun di luar rumah. Hasil pengujian, sistem kontrol dan monitoring dilakukan dengan menggunakan aplikasi yang sudah diinstall di device pengguna. Solusi ketika tidak ada internet adalah dengan menggunakan Bluetooth atau TCP (Transmission Control Protocol) melalui wifi yang berada dalam rumah.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Saptadi, Arief Hendra, and Aris Kiswanto. "Rancang Bangun Web Server Penampil Data Cuaca Berbasis Arduino Menggunakan Sensor BME280 dan BH1750FVI dengan Tiga Mode Tampilan Data." Jurnal Teknik Elektro dan Komputasi (ELKOM) 2, no. 2 (September 24, 2020): 112–21. http://dx.doi.org/10.32528/elkom.v2i2.3516.

Повний текст джерела
Анотація:
Cuaca merupakan salah satu faktor yang memengaruhi aktivitas manusia. Oleh karenanya informasi mengenai kondisi cuaca yang akurat menjadi hal penting dan umumnya itu dapat diperoleh dari situs-situs di internet. Namun demikian, informasi tersebut lazimnya berkenaan dengan suatu wilayah dengan cakupan yang luas dan tidak memaparkan iklim mikro di lingkup lokal. Tujuan dari penelitian ini adalah melakukan rancang bangun suatu sistem penampil data cuaca berbasis Arduino Uno R3 untuk menayangkan data iklim di cakupan lokal dengan tiga mode tampilan data. Sistem ini menggunakan sensor BME280 untuk mengukur suhu (°C), kelembaban relatif (%), tekanan udara (hPa) dan ketinggian (m) dan sensor BH1750FVI untuk mengukur intensitas cahaya (lx). Waktu dan tanggal terjadinya pengukuran ditandai oleh RTC DS3231. Semua piranti tersebut menggunakan antarmuka I2C bertegangan kerja 3,3 V, yang bertindak sebagai slave dengan alamat perangkat yang berbeda-beda. Dari hasil pengukuran didapatkan bahwa nilai rerata suhu dan kelembaban, masing-masing adalah 28,72°C dan 65% dengan error 7,42% dan 10,95% yang mengindikasikan adanya bias antara hasil ukur di lingkup mikro dengan nilai pembanding dari situs cuaca yang mengacu ke wilayah yang lebih luas. Tekanan udara dan ketinggian menunjukkan nilai konstan dengan rerata masing-masing, 1011,2 hPa dan 240,35 m beserta error yang lebih kecil yaitu 0,2% dan 3,86%. Intensitas cahaya berada pada rentang 58,05 – 100,63 lx dengan nilai rerata 83,85 lx. Data cuaca sudah dapat ditampilkan dengan baik melalui web server, komputer dan LCD alfanumerik. Informasi mengenai waktu dan tanggal pengukuran sudah dapat dimunculkan pada tiap mode tampilan yang mengindikasikan bahwa cip RTC telah bekerja sesuai perencanaan.
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Lee, Chun-Te, Liang-Bi Chen, Huan-Mei Chu, Che-Jen Hsieh, and Wei-Chieh Liang. "An Internet of Things (IoT)-Based Master-Slave Regionalized Intelligent LED-Light-Controlling System." Applied Sciences 12, no. 1 (January 2, 2022): 420. http://dx.doi.org/10.3390/app12010420.

Повний текст джерела
Анотація:
Reducing residential and industrial electricity consumption has been a goal of governments around the world. Lighting sources account for a large portion of the whole energy/power consumption. Unfortunately, most of the existing installed lighting systems are ancient and have poor energy efficiency. Today, many manufacturers have introduced light-controlling systems into the current market. However, existing light controlling systems may not be successfully applied to buildings, streets, and industrial buildings due to high costs and difficult installation and maintenance. To combat this issue, this article presents an easy-to-install, low-cost, Master-Slave intelligent LED light-controlling system based on Internet of Things (IoT) techniques. The benefit of using the proposed system is that the brightness of the LED lights in the same zone can be changed simultaneously to save in energy consumption. Furthermore, the parameters of the LED lights can be directly set. Moreover, the related data are collected and uploaded to a cloud platform. In this article, we use 15 W T8 LED tubes (non-induction lamps) as a case study. When the proposed system is installed in a zone with few people, the energy-saving rate is as high as 90%. Furthermore, when 12 people pass by a zone within one hour, its energy-saving rate can reach 81%. Therefore, the advantages of using the proposed system include: (1) the original lamp holder can be retained; (2) no wiring is required; and (3) no server is set up. Moreover, the goal of energy saving can also be achieved. As a result, the proposed system changes the full-dark mode of the available sensor lamp to the low power low-light mode for standby. Further, it makes the sensor lamps in the same zone brighten or low-light way simultaneously, which can quickly complete large-scale energy-saving and convenient control functions of intelligent LED lighting controlling system.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Li, Jianhua, Guanlong Liu, Zhiyuan Zhen, Zihao Shen, Shiliang Li, and Honglin Li. "Molecular Docking for Ligand-Receptor Binding Process Based on Heterogeneous Computing." Scientific Programming 2022 (January 10, 2022): 1–13. http://dx.doi.org/10.1155/2022/9197606.

Повний текст джерела
Анотація:
Molecular docking aims to predict possible drug candidates for many diseases, and it is computationally intensive. Particularly, in simulating the ligand-receptor binding process, the binding pocket of the receptor is divided into subcubes, and when the ligand is docked into all cubes, there are many molecular docking tasks, which are extremely time-consuming. In this study, we propose a heterogeneous parallel scheme of molecular docking for the binding process of ligand to receptor to accelerate simulating. The parallel scheme includes two layers of parallelism, a coarse-grained layer of parallelism implemented in the message-passing interface (MPI) and a fine-grained layer of parallelism focused on the graphics processing unit (GPU). At the coarse-grain layer of parallelism, a docking task inside one lattice is assigned to one unique MPI process, and a grouped master-slave mode is used to allocate and schedule the tasks. Meanwhile, at the fine-gained layer of parallelism, GPU accelerators undertake the computationally intensive computing of scoring functions and related conformation spatial transformations in a single docking task. The results of the experiments for the ligand-receptor binding process show that on a multicore server with GPUs the parallel program has achieved a speedup ratio as high as 45 times in flexible docking and as high as 54.5 times in semiflexible docking, and on a distributed memory system, the docking time for flexible docking and that for semiflexible docking gradually decrease as the number of nodes used in the parallel program gradually increases. The scalability of the parallel program is also verified in multiple nodes on a distributed memory system and is approximately linear.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Et. al., Rajae Tamri,. "The MI-SDN System to Manage MQTT Data in an Interoperable IoT Wireless Network." Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12, no. 5 (April 10, 2021): 1031–36. http://dx.doi.org/10.17762/turcomat.v12i5.1747.

Повний текст джерела
Анотація:
The main challenge for the Internet of Things (IoT) is to ensure interoperability between heterogeneous IoT entities. To support the interaction, intercommunication, and interoperability between these devices several solutions are proposed in the literature. The SDN (Software-defined Network) is one of these solutions to resolve the problem of the heterogeneous network used in IoT. To guarantee network interoperability, the SDN uses a centralized controller, which handles the entire network. The role of end devices in IoT is only forwarding data. The MQTT (Message Queuing Telemetry Transport) protocol is another solution for granting interoperability in IoT. Which is a publish/subscribe based messaging protocol that avoids direct connection between devices by relaying data through a central server called the broker. Combination of these two solutions to manage IoT devices makes it easy to add new devices without touching or changing the existing infrastructure. The new devices only need to communicate with the broker. Moreover, the Controller SDN is responsible for handling networks. Consequently, smart devices added don’t need to be compatible with the others. In this paper, we present the design and the implementation of a new IoT architecture, which is a combination of SDN technology and MQTT protocol. That enables heterogeneous IoT devices to be interoperable and interact without any problems. Our system utilizes the lightweight protocol MQTT with a new mechanism using several slave brokers and one master. The slaves manage the group of the end devices in the wireless IoT network, and the master broker installed in the SDN controller supervises the integral network. The SDN controller uses a multicast system to send MQTTdata across the external wireless network. As a result, that reduces transmission delay between wireless IoT network compared with the using of a standard MQTT.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Liu, Jun, Yu Sun, Zhi Zhen Chen, Yan Liu, Lin Su, Dong Ling Huang, Cai Qin Nong, Zhi Ying Liang, and Er Hua Liu. "Design for Distributed Database Server of Tea Traceability System Based on Amoeba." Advanced Materials Research 971-973 (June 2014): 1920–23. http://dx.doi.org/10.4028/www.scientific.net/amr.971-973.1920.

Повний текст джерела
Анотація:
According to the characteristics of the tea product traceability and monitoring system, the master-slavedatabase architecture is adopted. Based on Amoeba frame, the separation technology of reading and writing isachieved. Experimental results show that the design of master-slave distributed database is correct. And the achievement of separation technology of reading and writing effectively implement a distributed data managementto improve data processing efficiency.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

Jankovic, Zeljka. "Les relations éducatives entre la Serbie et la France dans la période 1936-1940." Prilozi za knjizevnost, jezik, istoriju i folklor, no. 82 (2016): 119–37. http://dx.doi.org/10.2298/pkjif1682119j.

Повний текст джерела
Анотація:
Le premier XIXe si?cle met la Serbie en contact plus intense avec la France, berceau des valeurs d?mocratiques et du patrimoine culturel europ?en aux yeux des Serbes subissant l?occupation turque depuis des si?cles. C?est ? partir de cette p?riode que commencent ? se d?velopper les liens culturels, politiques et ?ducatifs plus ?troits entre deux pays, particuli?rement renforc?s pendant la Grande Guerre, o? la France aide les jeunes serbes en leur ouvrant la porte de ses ?coles et universit?s. La Convention sign?e en 1920 en vue de la mise en place de la coop?ration intellectuelle et ?ducative (surtout universitaire) des deux pays pr?voyait ?galement la position privil?gi?e de la langue fran?aise au sein du syst?me ?ducatif serbe : en effet, dans les ann?es 30 du XXe si?cle, celleci sera la mati?re la plus enseign?e apr?s la langue serbe et les math?matiques, et le Minist?re des affaires ?trang?res fran?aises enverra r?guli?rement des livres fran?ais, ainsi que des dipl?mes et m?dailles pour les meilleurs ?l?ves. En raison de la croissance de l?influence politique italienne et surtout allemande dans les Balkans, un Congr?s des clubs fran?ais de Yougoslavie, tenu en 1935, marque le d?but des d?marches coordonn?es visant ? renforcer la pr?sence fran?aise dans tous les domaines de la vie sociale yougoslave. Les responsables du D?partement d??ducation aupr?s de l?Ambassade yougoslave ? Paris (Aleksandar Arnautovic puis Milan Markovic) informaient r?guli?rement Belgrade des activit?s dans la capitale fran?aise et ailleurs. Les boursiers du Gouvernement fran?ais (qui accordait la moiti? de la somme totale du budget aux ?tudiants yougoslaves, dont le nombre variait entre 60 et 100 par an dans la p?riode 1936-1940), du retour dans leur pays, r?pandront l?esprit de la culture fran?aise, ainsi que les connaissances acquises dans tous les domaines. Parmi les personnalit?s importantes qui excelleront dans leur m?tier se trouvent : Dr Vukan Cupic, professeur ? l?Universit? de Belgrade et directeur de l?Institut belgradois pour la m?re et l?enfant (boursier du fonds d?Alexandre de Yougoslavie de la mairie de Marseille 1938-1940), le chimiste Pavle Savic qui collaborait avec Ir?ne Curie, Dr Borisav Arsic qui a soutenu la th?se La Vie ?conomique de la Serbie du Sud au XIX si?cle (Paris, France-Balkans, 1936), Dr Branislav Vojnovic, directeur du Th??tre national, Dr Milos Savkovic qui ?tudiait l?influence de la litt?rature fran?aise sur le roman serbe etc. Les jeunes yougoslaves choisissent surtout la litt?rature, les arts et les sciences humaines. D?autre c?t?, le gouvernement yougoslave finan?ait chaque ann?e cinq ?tudiants fran?ais faisant la recherche au sein des universit?s yougoslaves. De nombreuses conf?rences sont dispens?es par les professeurs yougoslaves et fran?ais ; les ?coles franco-serbes, l?Institut fran?ais, les clubs et les associations de l?amiti? donnent les cours de fran?ais ; l?Association des ?tudiants en langue et litt?rature fran?aises organise les soir?es fran?aises et va r?guli?rement en excursions en France ; le Minist?re d??ducation finance les formations estivales des professeurs de fran?ais. Du c?t? fran?ais, l?Institut slave, la Chaire de serbo-croate ? l??cole de langues vivantes orientales avec des professeurs ?minents tels Andr? Vaillant et Andr? Mazon, le Lectorat serbe ? Paris, Strasbourg, Lyon etc. contribuaient aux ?tudes yougoslaves. La langue serbo-croate a ?t? inscrite sur la liste des langues vivantes que les ?l?ves pouvaient passer au baccalaur?at en 1936. Pourtant, cet ?panouissement sera de nouveau menac? par une p?n?tration politique et ?conomique des forces de l?Axe de plus en plus forte ? la veille de la Deuxi?me guerre mondiale : c?est ainsi que l?allemand devient la langue ?trang?re obligatoire au detriment du fran?ais en 1940, les entreprises fran?aises ferment leurs portes, tandis que de nombreuses activit?s culturelles et d?marches ?ducatives cherchent ? pr?server l??tat privil?gi? dont la France jouissait en Serbie depuis la Grande Guerre.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Luna-Puente, Rafael, Rosa Janette Peréz-Chimal, Carlos Hernández –Mosqueda, and Jorge Ulises Muñoz-Minjarez. "Control de brazo robótico clasificador mediante HMI y servidor Web." Revista de Computo Aplicado, September 30, 2019, 1–7. http://dx.doi.org/10.35429/jca.2019.11.3.1.7.

Повний текст джерела
Анотація:
The use of automated machines and its manipulation using artificial intelligence is increasingly common to perform routine tasks within the industrial field. The present work aims to show the automation of a robotic arm, its monitoring and control using a web server and a Human Machine Interface (HMI) screen. For this work a robotic arm MITSUBISHI was programmed for the classification of pieces based on their color. Subsequently, this system is monitored and controlled employing the programming of a web page and the design of an HMI created using the TIA-Portal software. As a result of this methodology, a complete system of industry 4.0 will be obtained, which can be implemented to control and monitor a robotic arm using a HMI screen and Web Server in the current industry. The systems used to carry out the control were a PLC S300 (cpu313C 2 DP) with ASI CP 343 2 DP network card, with 5 slaves, Keypad (Slave 1) Module 2DI (Slave 2), Optoreflexive Sensor (Slave 3) Set of valves FESTO (Slave 4) Modules2DI 2DO (Slave 5) 2DO an S1200 PLC (CPU 1214 C DC / DC / DC) an HMI screen (KTP600 Basic Mono DP) as color sort.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Oei, Standy, and Ahmad Ashari. "Rancang Bangun Fault Tolerance pada Sistem Database untuk Aplikasi Point Of Sale." IJCCS (Indonesian Journal of Computing and Cybernetics Systems) 5, no. 2 (July 31, 2011). http://dx.doi.org/10.22146/ijccs.2017.

Повний текст джерела
Анотація:
Abstract— A fault tolerant system is a system that has the ability to be able to continue its jobs properly although there is a fault in hardware or software of the system. A system that has a fault tolerant capability is usually critical or important system. For example is at Point Of Sale application. Point Of Sale Application has evolved from offline-based toward online-based. With an online-based, the existence of a central database server must be guaranteed free from failure.To get a central database server that is free from failure is impossible. Something that can be cultivated is to create a system that can tolerate a failure in the central database server. This is done with the help of a second central database server (slave), which is useful as a replication of the central database server (master). To ensure data from these two central database servers are the same, then used the concept of reading and writing "read one/write all". And to manage all the processes needed in implementing a fault tolerant application, we need the help from a coordinator.The result obtained in this research is a design of fault tolerant architecture that can be applied to various types of information system applications include Point Of Sale application. By using this fault tolerant architecture that has been built, Point Of Sale application can still run the transaction process even if there is a failure in accessing data in one central database server (master/slave). Keywords— fault tolerance, database system, point of sale application
Стилі APA, Harvard, Vancouver, ISO та ін.
30

CHUCHRA, RIMMY. "HUMAN ROBOTICS INTERACTION WITH DATA MINING TECHNIQUES." Graduate Research in Engineering and Technology, July 2013, 1–3. http://dx.doi.org/10.47893/gret.2013.1001.

Повний текст джерела
Анотація:
Human-robotics interactions generally consist of transfer of information from the humans to the robotics by using various algorithms, scientific tools and techniques. In this research paper human queries and tasks can be handled by human robotics and for the communication with the server-systems robotics acts as an interface. Human queries can be easily recognized with the help of data mining techniques. These Queries can be handled into three different parts. (a)Input device-used to collect the data (b) Human Robotics-act as an interface (c) Server System-used to process data. In the absence of interface interactions between the human and server system will not be possible. Here we are uses three types of data mining techniques like Classification, regression analysis and time series analysis. Each technique uses a separate type of data to perform mining task. The special focus of this paper is human and robotics follows master-slave relationship and ultimately humans successfully collaborate to achieve a joint action.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

CHUCHRA, RIMMY. "HUMAN ROBOTICS INTERACTION WITH DATA MINING TECHNIQUES." Graduate Research in Engineering and Technology, July 2013, 1–3. http://dx.doi.org/10.47893/gret.2013.1001.

Повний текст джерела
Анотація:
Human-robotics interactions generally consist of transfer of information from the humans to the robotics by using various algorithms, scientific tools and techniques. In this research paper human queries and tasks can be handled by human robotics and for the communication with the server-systems robotics acts as an interface. Human queries can be easily recognized with the help of data mining techniques. These Queries can be handled into three different parts. (a)Input device-used to collect the data (b) Human Robotics-act as an interface (c) Server System-used to process data. In the absence of interface interactions between the human and server system will not be possible. Here we are uses three types of data mining techniques like Classification, regression analysis and time series analysis. Each technique uses a separate type of data to perform mining task. The special focus of this paper is human and robotics follows master-slave relationship and ultimately humans successfully collaborate to achieve a joint action.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Chen, Chi-Chun, Jian-Hong Wang, Hsing-Wen Wang, and Jie Zhang. "Fault-tolerant content list management for media servers in the smart robot domain." Library Hi Tech ahead-of-print, ahead-of-print (February 1, 2021). http://dx.doi.org/10.1108/lht-07-2020-0179.

Повний текст джерела
Анотація:
PurposeThis research proposes an innovative fault-tolerant media content list management technology applied to the smart robot domain.Design/methodology/approachA fault tolerant Content List Management Unit (CLMU) for real-time streaming systems focusing on smart robot claw machines is proposed to synchronize and manage the hyperlink stored on media servers. The fault-tolerant mechanism is realized by the self-healing method. A media server allows exchanging the hyperlink within the network through the CLMU mechanism.FindingsInternet users can access the current multimedia information, and the multimedia information list can be rearranged appropriately. Furthermore, the service of the proposed multimedia system should be uninterrupted even when the master media server fails. Therefore, one of the slave media servers enables the Content List Service (CLS) of the proposed CLMU and replaces the defunct master media server.Originality/valueThe recovery time is less than 1.5 seconds. The multimedia transmission is not interrupted while any one of the media servers keeps functioning. The proposed method can serve to stabilize the system of media servers in a smart robot domain.
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Anbu Malar, M. B. Benjula, and Prabhu J. "Trust based authentication scheme (tbas) for cloud computing environment with Kerberos protocol using distributed controller and prevention attack." International Journal of Pervasive Computing and Communications ahead-of-print, ahead-of-print (September 17, 2020). http://dx.doi.org/10.1108/ijpcc-03-2020-0009.

Повний текст джерела
Анотація:
Purpose This paper aims to discuss the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then the ticket is granted to the validated user. The users are validated using the user privileges. The security levels of the proposed model are compared with the existing models and provide a better performance using the Key Distribution Centre (KDC). The number of authentication and authorization levels present in the existing and proposed model is also evaluated. Design/methodology/approach The methodology designed in this paper is discussed in this section. The existing models are designed in such a way that the client ID first asked to send an authorization request to the Authentication Server. The server looks up the user in its database and then sends back a ticket generated by it to the client to obtain services for the Service center. Numerous models have some additional features to these systems where the theme of KDC was introduced. The Key Distribution Centre (KDC), which is a set of nodes in a network where the data could be distributed and stored, such that any kind of attack on a single KDC will not impact other KDC and the data stored in it. The nodes other than the KDC in the network are termed as the slave nodes. The slave nodes communicate with each other within the network depending on the topology of the entire network. In this paper, the authors have used the Kerberos protocol for adding more security functions in the entire network. The system developed consists of a client, server and a set of nodes connected to each other in a ring fashion. Findings The proposed model provides security to the information being used by making use of the Kerberos protocol. Additional features and algorithms such as the use of the ticket-granting approach have been added at the protocol to make it more secure than the existing models. The ticket generation is done at the server-side that makes the user have proper authentication to make use of the services available from the server-side. The model is designed in such a way that it could remain operational even during the time of denial of service. As future work, use of machine learning and deep learning could be used to predict the attack on the network well before it is being misused. Originality/value The paper discusses the Silver and Golden ticket exploits that usually exists in the existing systems. To overcome these challenges, the data is first encrypted and then the ticket is granted to the validated user. The users are validated using the user privileges. The security levels of the proposed model are compared with the existing models and provide a better performance using the Key Distribution Centre (KDC). The number of authentication and authorization levels present in the existing and proposed model is also evaluated.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Chakraborty, Sudip, and P. S. Aithal. "Demonstration of Modbus Protocol for Robot Communication Using C#." International Journal of Applied Engineering and Management Letters, November 25, 2021, 119–31. http://dx.doi.org/10.47992/ijaeml.2581.7000.0108.

Повний текст джерела
Анотація:
Purpose: The Modbus is the trusted name in the industrial automation communication domain. It is a pretty simple protocol to implement and so very popular to the industrial communication personnel. Nowadays, Some industrial robots are also capable of communicating through Modbus. So our robot researchers frequently face the challenge of communicating with Modbus-enabled devices or robots. They need to know the protocol in detail before integrating it into their project. Its learning curves are a bit higher because of the lack of document which is practical oriented. The protocol selection, packet structure, CRC, or LRC calculation need to maintain precisely as standards; otherwise, the Modbus exception may happen. We experience those scenarios. Through our practical experience, we learned what is required for a new researcher who wants to implement Modbus in their project. In this paper, we demonstrate the Modbus packet structure and implement it with several practical examples. Finally, to test the written code, we provide simple tools which are easy to use and customizable. The researcher can easily integrate into their research project. The complete project source code is available in Github. Design/Methodology/Approach: The Modbus is the standard protocol to communicate between or among the devices. We need a better understanding of it and interface software to test around all aspects. Here we described some practical examples. The GUI is created using C# language inside the Microsoft Visual Studio. The application has several capabilities. In the TCP/IP mode, It can be a server or client. In RTU mode, it can play as a Master or slave device. We can also run two instances in a single system. To communicate between two running apps in RTU mode, we need virtual loopback software, two physical comm port, or two USB to Serial modules. For Modbus TCP mode, we can test within the system using the localhost address (127.0.0.1) or need an IP address for a different. Findings/results: The robot researcher can find helpful information about communicating the robot through the Modbus protocol. The practical example can help them to create packet purser. The functional CRC algorithm code can be used for better understanding and implementation into their project. Originality/Value: This work has some different features than other available utilities. We added features based on our research needs. Our created application is a little bit different from a professional approach. Various display formats are available in our GUI. That makes a difference in the originality of this work. Our GUI can be master, slave, server, or client, which is rarely available. Paper Type: Experimental-based Research.
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Kurnianto, Danny, Panca Mudjirahardjo, and M. Julius. "Sistem Layanan Informasi dan Pemesanan Nomor Antrian Menggunakan Media SMS Berbasis Komunikasi Serial Asinkron Multipoint Standar RS-485." Jurnal Informatika,Telekomunikasi dan Elektronika 6, no. 2 (January 5, 2015). http://dx.doi.org/10.20895/infotel.v6i2.76.

Повний текст джерела
Анотація:
<p class="Abstract"><span>Sistem layanan informasi dan pemesanan nomor antrian terpusat melalui media <em>handphone</em> dapat dijadikan sebagai salah satu solusi untuk mempermudah masyarakat dalam melakukan antrian sehingga aktivitas mereka bisa berjalan dengan baik dan waktu mereka tidak terbuang terlalu lama. Dengan menggunakan sistem ini, nasabah dapat dengan mudah melihat kondisi antrian saat ini dan memesan nomor antrian, yaitu dengan mengirimkan SMS berupa kata “daftar” untuk memesan nomor antrian dan kata “info” untuk mengetahui kondisi antrian ke <em>handphone server.</em> Personal komputer digunakan sebagai pusat pengendalian yang berfungsi untuk mengirim dan menerima data dari <em>hanphone </em>dan dari mikrokontroler pada unit slave. Komunikasi data antara komputer sentral dengan mikrokontroler berjalan dengan menggunakan komunikasi serial <em>asinkron multipoint</em> dengan <em>baudrate</em> 57600 bps. Komunikasi serial antara komputer sentral dengan <em>handphone</em> berjalan dengan <em>baudrate</em> 19200 bps. Dari hasil pengujian menunjukkan bahwa sistem layanan informasi dan pemesanan nomor antrian dapat bekerja dengan baik. Informasi yang diberikan saat nasabah mendaftar nomor antrian melalui <em>handphone</em> berupa nomor antrian dan <em>password</em>. Informasi yang diberikan komputer sentral saat nasabah meminta informasi kondisi antrian berupa berupa jumlah nasabah yang terdaftar pada sistem antrian saat ini, nomor antrian yang sedang dilayani pada masing-masing loket, waktu tutup antrian. </span></p>
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Gemeinboeck, Petra. "Something Third, Other." M/C Journal 6, no. 4 (August 1, 2003). http://dx.doi.org/10.5204/mcj.2241.

Повний текст джерела
Анотація:
In a networked virtual world, interconnected participants are able to enter a dialogue and to interact with one another; they cannot actually do so, however, with the remote participants, but rather with the interpretation and representation of the data transferred from the remote site(s). The process of the evolving dialogue in such tele-immersive scenarios is complexly interwoven with another liquid, hybrid and oscillating process, that of ‘becoming a subject’. The actual opacity of the individual sites – in that all sources, such as the participants’ appearance, their input and in fact anything connected to the actual and physical site are only represented on the ‘other site’ – holds something ambiguous, almost uncanny, opening the scope of something third, other, in between. This article addresses the issues of disguise inherent to tele-immersive virtual environments and communication; it examines the issue of presence emerging from the interrelationships between the networked participants, their virtual representation and the underlying computer-controlled system, as well as between the virtual place and the physical location. The issue of presence and embodiment in tele-immersive virtual environments differs from other virtual social spaces, such as chat rooms and current forms of online-games, in the human-scale, three-dimensional representation of the space and the user's manifestation – the so-called avatar. One of the main purposes of networking such virtual environments is the visual and acoustic representation of remote participants as they share the same virtual space with one’s Self, and thus create a virtual meeting place somewhere in between the participants’ remote locations. In such an environment, the tele-dialogue evolves based on an almost absurd scenario of disguise: while, locally, one is limited to communicating with an electronically masked opposite, this form of dialogue also implies that one’s Self only appears to our ‘human’ opposite as its computer graphic incarnation, an avatar – with which one is nevertheless identified. In a typical example of a networked scenario, multiple copies of the environment, as well as the representations of the users (avatars) are displayed at all client sites. Yet the fact that all modes of representations appear as an exact duplicate on the ‘other side’ does not represent a system-inherent condition, but is exclusively based on the intention of the programmer/designer and/or a convention shared by users of the tele-immersive environment. One possible reason for this common convention might be found in the primary impetus behind the development of virtual reality technologies, which is the most indistinguishable and controllable electronic replication of our physical reality and its inhabitants. Assuming, however, that the shared data is based on mathematical descriptions and instructions, their form of interpretation and representation is entirely subject to the modality of the program/system – and thus, in most cases, also to the individual system of each remote recipient (client). How an environment is represented remotely and how users (avatars) appear and behave on each client’s site is thus the expression of a (possibly selected) option, whereby the convention of reproduction is only one possible choice. As the temporary inhabitants are not actually able to enter the ‘other’ remote site, the virtual environment likewise cannot extend to another, remote place, but rather is generated at each local site (a server’s location, respectively). Decisions about the extent to which the data content can be reinterpreted, and in which form it is represented, establish political and hierarchical structures. Centralized network architectures, like the ‘master-slave’ model or the ‘server-client’ model, also shape our virtual architectures of communication. The politicization of the virtual terrain is thereby partly inscribed by the environment’s author and partly emerges from the opaque, disguising nature of each remote system’s signal- and data-processing. The author defines whether the participants are able to choose their own form of representation, how ‘permeable’, in general, the environment is designed to be, to what degree the user can modify its evolution and its outgoing and incoming signals, and the importance attributed to the imagination and identity of the participating co-author. However much the users are accommodated, the implementation of such a representing mediator and translator in between will never result in a ‘neutral’ system. According to the aforementioned mathematical encoding of represented realities, any structure and instruction can be modulated, re-associated or replaced, every single frame. Whether implemented as a time-based, narrative, or independently generative structure, such a potentially nonlinear sequence of dynamic, transformative events is very likely to entangle with the participants’ subjective Self and its formation of identity. For N. Katherine Hayles, Cyberspace opens common construction of body borders for transformative configurations, which always carry the trace of ‘the Other’. The simultaneous estrangement of the self from itself and its cybernetic reconstitution as ‘the Other’ produces a “diffusion of subjectivity” that “constitutes a second mirror stage: the Mirror of the Cyborg." (Hayles 1993, 186) In my tele-immersive installation Maya--Veil of Illusion, the interferences and distortions caused by the system as a third, unknown participant – the allegedly ‘other’ in the system’s own reflection of the participants’ dialogue –gain a strange, ambiguous component. The project translates the Hindu-Buddhist notion of ‘Maya’ (Sanskrit: illusion) into an elastic veil, spanned between two remote, networked sites. The relationship between the Self and the virtual representation of one’s Self and of the other remote participant becomes the cast of something third, other in the virtual layer in between. Although the veil’s distorted mirror image remains the untouchable ‘other’, it spatially materialises the other participant’s presence as it penetrates the electronic filter, occupying one’s private local space. (see figures 1,2 and 3) The combination of immersive, embodying representation, networking technology and a performative, systemic translator in between opens yet another chapter in the concept of ‘suspension of disbelief’ in contemporary media. In a tele-immersive virtual environment, the participants not only deal with a simple feedback loop (between themselves and the environment), but rather with a nesting of loops, in which the other (remote) sides are likewise involved. In other words, the participants pursue their dialogue via the dialogue with the virtual environment and the projection of their Selves. As addressed in Maya--Veil of Illusion, the dialogue between the remote participants becomes entirely mediated – and consequently controlled by the underlying computer system, which might be more or less transparent to the users. Click on image to see figures 1,2 and 3: Maya--Veil of Illusion; local site ingold: EVL, UIC Chicago, remote site in blue: IAO Fraunhofer Stuttgart In their realisation, tele-immersive virtual spaces appear much more introverted than extroverted, in the sense of actually stretching across the multiple remote sites. So it seems that we don’t actually travel to distant places but rather bring them into our local environment – together with the (representations of the) remote users. Both the sensuous experience as well as the process of interacting take place locally, ‘at home'. Thereby, the virtual place doesn’t seem to be able to break away from its physical anchorage and the cybernetic transfer of our Self (still) seems to be somewhat uncanny. The most exciting aspect for remote users is commonly the fact that they are connected to other participants, located in Chicago and Tokyo, physical places they can relate to in their mental world map, rather than the fact that all of them actually – virtually – share the same space. Does this imply that the virtual place and the virtual body, materialised in virtually accessible environments, are coupled with one another in a similar way as we experience the physical and cultural boundaries in our daily life? It seems that space, however, will always rub against the body – in whatever form of reality. Once, during a networking event at the Ars Electronica Center (Linz, Austria) (EVL: Alive on the Grid, Ars Electronica Festival, 2001), connected to Amsterdam, Chicago, and some other remote sites worldwide, I was approached by a participant. “I don’t believe that I am really interacting with all these remote people in Europe and America. How can you prove to me that it is not just a technical fake?” Well, I can’t. Works Cited Hayles, N. Katherine. The Seductions of Cyberspace. Conley, Verena (ed.): Rethinking Technologies. Minneapolis: University of Minnesota, 1993. Alive on the Grid: <http://www.evl.uic.edu/art/art_project.php3?indi=209> Maya--Veil of Illusion: <http://www.evl.uic.edu/art/art_project.php3?indi=240> Links http://www.evl.uic.edu/art/art_project.php3?indi=209 http://www.evl.uic.edu/art/art_project.php3?indi=240 Citation reference for this article Substitute your date of access for Dn Month Year etc... MLA Style Gemeinboeck, Petra. "Something Third, Other " M/C: A Journal of Media and Culture< http://www.media-culture.org.au/0308/09-something3rd.php>. APA Style Gemeinboeck, P. (2003, Aug 26). Something Third, Other . M/C: A Journal of Media and Culture, 6,< http://www.media-culture.org.au/0308/09-something3rd.php>
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії