Zhejiang Gongshang University

Displaying 1-4 of 4 results

  • White Papers // Sep 2011

    An Improved MIP-Based Policy for Deadlock Prevention Based on Petri Nets

    Deadlocks are undesired in highly automated flexible manufacturing systems. The Mixed Integer Programming (MIP)-based deadlock prevention method is considered as one of the most efficient methods at present. However, it suffers from the problem that the weights of the monitor arcs are greater than 1. In this paper, a modified...

    Provided By Zhejiang Gongshang University

  • White Papers // Mar 2011

    Corridor Navigation and Obstacle Distance Estimation for Monocular Vision Mobile Robots

    To achieve autonomous indoor mobile robot navigation, the robot needs to identify the direction, obstacle position and other information. This paper describes a solution for indoor mobile robot navigation and obstacle distance detection which based on monocular vision. The authors use Hough transform to find the straight lines in the...

    Provided By Zhejiang Gongshang University

  • White Papers // Oct 2010

    An Energy-Efficient Scheme for Reliable Web Access in Wireless Mobile Environment Based on Mobile Agents

    Web access in mobile wireless environments suffers more challenge because of mobile device's limited storage and the unreliable wireless network environments. It requires some facilities both in the wired network and the terminals so that to overcome the difficulties of unreliable wireless link, mobility and mobile devices capability limitation. This...

    Provided By Zhejiang Gongshang University

  • White Papers // Jan 2009

    Detect SYN Flooding Attack in Edge Routers

    Distributed Denial-of-Service (DDoS) attacks pose a serious threat to Internet security. Traditional detection methods rely on passively detecting an attacking signature and are inaccurate in the early stages of an attack. This paper proposes a novel defense mechanism that makes use of the edge routers that connect end hosts to...

    Provided By Zhejiang Gongshang University

  • White Papers // Jan 2009

    Detect SYN Flooding Attack in Edge Routers

    Distributed Denial-of-Service (DDoS) attacks pose a serious threat to Internet security. Traditional detection methods rely on passively detecting an attacking signature and are inaccurate in the early stages of an attack. This paper proposes a novel defense mechanism that makes use of the edge routers that connect end hosts to...

    Provided By Zhejiang Gongshang University

  • White Papers // Oct 2010

    An Energy-Efficient Scheme for Reliable Web Access in Wireless Mobile Environment Based on Mobile Agents

    Web access in mobile wireless environments suffers more challenge because of mobile device's limited storage and the unreliable wireless network environments. It requires some facilities both in the wired network and the terminals so that to overcome the difficulties of unreliable wireless link, mobility and mobile devices capability limitation. This...

    Provided By Zhejiang Gongshang University

  • White Papers // Mar 2011

    Corridor Navigation and Obstacle Distance Estimation for Monocular Vision Mobile Robots

    To achieve autonomous indoor mobile robot navigation, the robot needs to identify the direction, obstacle position and other information. This paper describes a solution for indoor mobile robot navigation and obstacle distance detection which based on monocular vision. The authors use Hough transform to find the straight lines in the...

    Provided By Zhejiang Gongshang University

  • White Papers // Sep 2011

    An Improved MIP-Based Policy for Deadlock Prevention Based on Petri Nets

    Deadlocks are undesired in highly automated flexible manufacturing systems. The Mixed Integer Programming (MIP)-based deadlock prevention method is considered as one of the most efficient methods at present. However, it suffers from the problem that the weights of the monitor arcs are greater than 1. In this paper, a modified...

    Provided By Zhejiang Gongshang University