GigE cameras, interfaces, and software debut

Wilson, Andrew
July 2004
Vision Systems Design;Jul2004, Vol. 9 Issue 7, p10
Features several Gigabit Ethernet (GigE) protocol-based products. iPORT IP computer software from Pleora Technologies; GigE-compatible cameras Tattile; Camera Link-to-Gigabit Ethernet converter from GigaLinx.


Related Articles

  • Design Approach Based on EtherCAT Protocol for a Networked Motion Control System. Lei Wang; Muguo Li; Junyan Qi; Qun Zhang // International Journal of Distributed Sensor Networks;2014, p1 

    This paper presents a new design approach based on EtherCAT protocol aiming at a special networked motion control system. To evaluate this system, the testing platform of the networked motion control system for ocean wave maker is designed. The paper gives the detailed design for the testing...

  • Computer networks in radiology: An introduction. Pant, Rochan // Indian Journal of Radiology & Imaging;Nov2009, Vol. 19 Issue 4, p318 

    The article focuses on the basics about computer networks in radiology practice. The components of a computer network are physical connection between computers, a unique address for each computer on the network and common rules for communicating. Basic hardware and software requirements include...

  • Design and implementation of Multi-protocol self-adaptation gateway. Kai-lin ZHANG; Da-hua Li; Shu-chen SHI; Xue-song YANG; Zhen XIAO; Qiang GAO // Applied Mechanics & Materials;2014, Vol. 687-691, p2108 

    For the four kinds of network protocols which are common in industry :PROFIBUS-DP, DeviceNet, EtherNet/IP and Modbus-RTU, a gateway has been designed which could integrate the four protocols, and have developed hardware and software program of the Multi-protocol self-adaptation gateway. It uses...

  • Services at Your Service. McKean, Kevin // InfoWorld;4/25/2005, Vol. 27 Issue 17, p8 

    This article discusses how a service layer makes service-oriented architectures (SOA) easier to manage and update. Most companies looking seriously at SOA do so in hopes of making a mishmash of existing hardware and software play together more smoothly. Such companies have much to gain from SOA....

  • Enabling Remote Access. Neal, Michael // Scientific Computing;Sep/Oct2010, Vol. 27 Issue 5, p14 

    The article discusses the positive implication of web services in enabling remote monitoring and connecting distributed hardware over existing physical networks. It mentions that web services are defined as modular software components that are conjured through hypertext transfer protocol (HTTP)...

  • Optimization of Latency of Temporal Key Integrity Protocol (TKIP) Using Graph Theory and Hardware Software Co-Design. Deotare, Vilas V.; Padole, Dinesh V.; Shelke, Swati // International Journal of Computer Science, Engineering & Informa;Jun2013, Vol. 3 Issue 3, p33 

    Temporal Key Integrity Protocol (TKIP) [1] encapsulation consists of multiple-hardware and software block which can be implemented either software or hardware block or combination of both. This papers aims to design the TKIP technique using graph theory and hardware software co-design for...

  • The CableMoem Registration Process: Through the Eyes of a DOCSIS Protocol Analyzer. Volpe, Brady // Communications Technology;Jun2005, Vol. 22 Issue 6, p64 

    This article focuses on the cable modem registration process. The article also examines the registration process as seen from the RF plant using a Data Over Cable Service Interface Specification protocol analyzer (DPA). The cable modem scans the downstream looking for 64 or 256-quadrature...

  • Shore Group plans to begin local sales push. Tampone, Kevin // Business Journal (Central New York);2/10/2006, Vol. 20 Issue 6, p8B 

    The article presents a corporate profile of ShoreGroup Inc., a company that provides clients with hardware and software for converged, Internet-protocol (IP) environments. The firm has developed a patented product that helps companies manage their IP networks. Its product CaseSentry is a...

  • Improving performance of software transactional memory through contention locality. Atoofian, Ehsan // Journal of Supercomputing;May2013, Vol. 64 Issue 2, p527 

    In this paper, we introduce contention locality in Transactional Memory (TM) which describes the likelihood that a previously aborted transaction conflicts again in the future. We find that conflicts are highly predictable in TMs and we propose two optimization techniques based on contention...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics