TITLE

Integration of autonomous systems for remote control of data acquisition and diagnostics in the TJ-II device

AUTHOR(S)
Vega, J.; Mollinedo, A.; Lopez, A.; Pacios, L.; Dormido, S.
PUB. DATE
January 1997
SOURCE
Review of Scientific Instruments;Jan1997, Vol. 68 Issue 1, p963
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Describes the integration of autonomous systems for remote control of data acquisition and diagnostics in the TJ-II plasma device. Local area networks; Structure of networks for TJ-II; Connection protocols with diagnostic control systems.
ACCESSION #
630894

 

Related Articles

  • Reflective memory speeds data transfer. Stroud, George M. // Control Engineering;Mid-Aug98, Vol. 45 Issue 11, p65 

    Deals with the importance of distributed computing approach in building complex systems. Simplest data transfer technique; Several shortcomings of localized area networks (LAN) when real-time communication is required; Information on reflective memory networking; Operational applications of...

  • A better way to batch. Kearns, Dave // Network World;08/11/97, Vol. 14 Issue 32, p18 

    Offers advice on the management of batch files in local area networks (LAN). Move from DOS character-based programs to graphical user interface-based Windows or Windows NT programs; Wilson WindowWare's release of WinBatch 97; Product capabilities. INSET: Tip of the week..

  • Who pays for the corporate LAN? Asbrand, Deborah // InfoWorld;8/16/93, Vol. 15 Issue 33, p53 

    Focuses on the financing needs for corporate local area networks. Cost allocation procedures; Problems in applying mainframe usage-tracking methods; Seminars on computer systems management conducted by the Personal Computer Asset Management Institute (PCAMI).

  • Predictions Of Disaster: Is The Sky Really Falling? Kruse, Stephen // Pipeline & Gas Journal;Nov2006, Vol. 233 Issue 11, p47 

    The article discusses security issues concerning Supervisory Control and Data Acquisition systems. The author evaluates some of the company practices that lack in terms of quality. One example of these, as determined by the author, is the limitation of security assessments to physical security....

  • Drive A Relay Using A 1-Wire Addressable Switch. Romeo, Giovanni // Electronic Design;2/16/2004, Vol. 52 Issue 4, p82 

    Considers the 1-Wire Net or MicroLAN as a simple way of connecting slow devices using simple components. Suggestions in building a very long string of 1-Wire components; Effectiveness of the DS2405 1-Wire flip-flop in controlling the base of the relay driver.

  • Proper planning can assure cost-effective fiber backbones. Connaughton, Michael // Lightwave;Jan2005, Vol. 22 Issue 1, p1 

    Focuses on the continual advancements in network speeds by the users of local area networks data services. Approval of the information technology professionals to upgrade to the speeds expected and demanded by users; Valuation of optical cabling options according to fiber type and the...

  • DDoS Attack Detection and Wavelets. Lan Li; Gyungho Lee // Telecommunication Systems;Mar2005, Vol. 28 Issue 3/4, p435 

    Abstract This paper presents a systematic method for DDoS attack detection. DDoS attack can be considered a system anomaly or misuse from which abnormal behavior is imposed on network traffic. Attack detection can be performed via abnormal behavior identification. Network traffic...

  • Healthcare Standards Reveal The Usual Suspects.  // Microwaves & RF;May2010, Vol. 49 Issue 5, p144 

    The article reports on the effort of Continua Health Alliance in driving standards development for the healthcare segment. Continua aims to set a system of interoperable personal telehealth solutions that nurture independence and empower people to better manage health. ZigBee Health Care has...

  • Network Intrusion Detection Design Using Feature Selection of Soft Computing Paradigms. Chou, T. S.; Yen, K. K.; Luo, J. // International Journal of Computational Intelligence;2008, Vol. 4 Issue 3, p196 

    The network traffic data provided for the design of intrusion detection always are large with ineffective information and enclose limited and ambiguous information about users' activities. We study the problems and propose a two phases approach in our intrusion detection design. In the first...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics