TITLE

MONITORING OBJECTS OVER NETWORK

AUTHOR(S)
KOWALCZUK, ZDZISŁAW; WSZOŁEK, JAKUB
PUB. DATE
September 2009
SOURCE
Systems Science;2009, Vol. 35 Issue 3, p49
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
The paper presents a universal concept of monitoring industrial, enterprise and private objects, including the so-called intelligent buildings and other facilities. Different management, control and diagnostic tasks can be easily incorporated into the design. Contemporary IT technology can be readily utilized for creating a complete effective and powerful system for fulfilling such purposes with respect to various facilities. This general idea has been developed and implemented in the form of a computer system, referred to as the Network Object Monitor (NOM), with the use of high technologies and specialised software. In the paper, principal information about the design and its critical problems are discussed.
ACCESSION #
53457590

 

Related Articles

  • Management software is the key element in helping `downed' network servers. Talley, Brooks; Mitchell, Lori // InfoWorld;02/14/2000, Vol. 22 Issue 7, p96 

    Presents information on software that can help monitor the downtime of computers. Features of the OpenView software from Hewlett-Packard Co.; Price of WhatsUp Gold from IpSwitch company; Capabilities of eMonitor from MediaHouse company.

  • Proactive Detection of DDoS Attacks Utilizing k-NN Classifier in an Anti-DDos Framework. Hoai-Vu Nguyen; Yongsun Choi // International Journal of Computer Systems Science & Engineering;2008, Vol. 4 Issue 4, p247 

    Distributed denial-of-service (DDoS) attacks pose a serious threat to network security. There have been a lot of methodologies and tools devised to detect DDoS attacks and reduce the damage they cause. Still, most of the methods cannot simultaneously achieve (1) efficient detection with a small...

  • Research and Implementation of the Smart Home System Based on Internet of Things Environment. Heng WANG; Bi-Geng. ZHENG // Applied Mechanics & Materials;2014, Issue 513-517, p1915 

    As one of the freshest technologies nowadays, the development of Internet of Things is attracting more and more concerns. Internet of Things is able to connect all the items to Internet via information technology such as RFID and Wireless Sensor Network, in order to realize intelligent...

  • When you wish upon a cloudÂ…. Chessell, Dave // Mortgage Strategy (Online Edition);1/28/2013, p43 

    The article comments on the readiness of British finance firms to address the demands of customers in 2013. It suggests that companies use information technology (IT) solution to reach out to consumers. According to the author, IT platforms can also help them secure remote location and access...

  • Design of ARP Intrusion Detection System. Guo Xie-chao // Applied Mechanics & Materials;2014, Issue 539, p326 

    According to the rapid development of information technology and network flow, ARP intrusion attack from internet is more and more popular, which damages a lot to normal working, especially in some high security demand fields. Therefore, this paper analyzes the principle of ARP intrusion attack,...

  • Study on the Influence of Energy Saving Control System for Intelligent Building based on Internet of Things Technology. Xiaofeng Hu // Applied Mechanics & Materials;2014, Issue 607-609, p1066 

    This article has conducted the research and analysis to the monitoring and management platform technology for existing building energy consumption equipment, and combined with the key technologies of the Internet of things technology-designed a set of intelligent system for building energy...

  • Experiences from Implementation and Evaluation of Event Processing and Distribution of Notifications in an Object Monitoring Service. Laurentowski, Aleksander; Zieliński, Krzysztof // Computer Journal;2004, Vol. 47 Issue 2, p205 

    Organization of events processing and distribution of notifications is a key issue for performance of software monitoring and management systems, particularly for reducing the execution-time overheads they incur. This paper provides practical guidelines for design and implementation of event...

  • SCM: SCalable Middleware System for Heterogeneous Distributed Databases. Shimpi, Darshana; Chaudhri, Sangita // International Journal of Computer Science & Information Technolo;2014, Vol. 5 Issue 1, p427 

    Middleware is an essential component for any type of distributed environment and network application. There are different middleware systems (like SQMD, DisCo, MOCHA, Open-Gate, OGSA-DAI, OGSA-DQP) which gives good performance, but most of them lack integrity constraints and scalability. Data...

  • Internet architecture: Not logical, captain! Johnson, Johna Till // Network World;12/15/2008, Vol. 25 Issue 48, p16 

    The author reflects on the Internet performance and the scalability of such protocol-layer features as addressing, routing and mobility. She argues that Internet scalability is reaching its limit quickly due to architectural issues underlying in the design of the Net and IPv6. She cites the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics