- Full text PDF available (2)
- This year (0)
- Last five years (3)
In the field of network defense, very little research is directed toward locating the source of network attacks. This paper models the technical aspects of attack traceback. By analyzing the model of attack traceback, two fundamental technical problems can be identified: determining the immediate source of packets (which may be disguised through IP… (More)
Designing a new sensor board is costly, especially for a production in a small quantity. By modularizing common functionalities, a large portion of the sensor board can be reused. In this work, we propose an Extension Board, a sensor board which is modularized into 3 parts. Power module, and MCU and RF module are shared, and only sensing module is… (More)
Bibliografía  ITU-T Recommendation G.729, .Coding of speech at 8 kbit/s using conjugate-structure algebraic-code-excited linear-prediction. Annex B: A silence compression scheme for g.720 optimized for terminals conforming to recommendation v. A multiplexing scheme for H.323 voice-over-IP applications " ;
PEAKSAVE system is an energy monitoring service based on Wireless Sensor Networks (WSN). A smartphone is an important point of a system. Users can understand the energy consumption of each electric device and lighting in real time. Responsive energy monitoring service can help in reducing the waste of energy, especially in shaving electric load in a peak… (More)
The system is environment monitoring service based on Wireless Sensor Networks (WSN). Users can know temperature, humidity, light, and CO<sub>2</sub> level in real time. Excessive electricity consumption by lighting in the office can be saved and the quality of the office environment can become better by controlling lighting and CO<sub>2</sub> level.