The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Emergency preplans describe domain knowledge for emergency handling, but most of them are formed in static text or electronic document which is difficult for emergency decision-makers to achieve accurately and quickly. For solving the problems above, we put forward an emergency preplan knowledge representation framework. First, we analyzed emergency preplan textual knowledge and achieved three kinds...
E-governance initiatives are common in most countries as they promise a more citizen-centric government and reduce operational cost. Unfortunately most of these initiatives have not been able to achieve the benefits claimed. Often the reason for this failure is a techno-centric focus rather than a governance-centric focus. The aim of this paper is to explore the necessary attributes of a governance-centric...
Co-word analysis is a typical kind of content analysis, and also it is an important content mining method. It has been widely used in medicine, chemistry, artificial intelligence, software engineering, information science and information system. By the use of SPSS software, this paper analyzes co-word of the articles on UML issued in the periodicals from year 2001 to 2008 collected by CNKI database...
To meet the needs of technology innovation for current e-commerce system development, an integration platform for e-commerce system development is studied and designed, into which Spring framework is appropriately combined. A system prototype which is loose-coupled, easily extendable and maintainable is realized. Finally, the platform is applied in an on-line bookstore system.
Security is one of key problems in RFID application. This research is to find a security algorithm for RFID with very low computing requirement. Minimalist cryptography only needs exclusive Or (XOR) and simple logical control, and it can protect privacy and provide mutual authentication. However, the algorithm has hidden security problems while assuming that the attacker couldnpsilat monitor the data...
SMS on demand is a popular form of SMS. This article reports here that the script language designed by ourselves and a novel mobile application which provides GUIs for SMS on demand. Based on the existing mobile applications which provide GUIs to relieve the subscriberspsila burden of memory, the aim of this application is to improve universality of mobile application for SMS on demand. Our application...
VPLS technology combining Ethernet and VPN technology advantage, MPLS by MAN or WAN makes distribution in different regions of the multiple users in a bridge site within the field, thus forming interconnection virtual private network. This paper proposes a MPLS VPN based on VPLS in e-government network model, and the application of VPLS in e-government network construction and management, some suggestions...
Component-based software development is necessity current of software engineering and industrialization and components achieve interaction by interfaces. At present the main interface definition languages are designed initially for closure environment to satisfy the requirement of C/S application, only describe static syntax level information of component interaction which can not meet the need of...
There are two aspects in the growing demand of the converged-innovative products. The first is that the converged products substitute the original market demanding, and the second is of creating the new market demanding. Thus, based on redefining the concept of technological convergence, we analyze market demand of convergent products according to the characteristics of technological convergence in...
The goal of this paper is to analyze the development of producer service industry under the e-commerce platform. Firstly, we analyze the normal situation of e-commerce and its influence on producer service, and find out that e-commerce will influence the producer service industry in mainly three aspects. Then, we study the advantages of e-commerce for producer service industry in China, and find out...
Malware has become the centerpiece of security threats on the e-commercial business. The focus of malware research is shifting from using signature patterns to identifying the malicious behavior patterns. Many researcher extract behavior pattern from system call sequences to identify malware from benign programs with data mining techniques. Most system call tracing tools must run alongside the malware...
Most of current research focuses on students and how technology affects them, but less has been done to describe the role of the teachers, especially in the context of E-education. The paper is to find the way to solve the problem. This study finds that firstly, Students need their teacherspsila help both psychologically and technically in the context of E-education. Secondly, itpsilas the teacherpsilas...
A watermarking-based host correlation detection method is proposed in this paper. The idea is to embed some unique watermark into the flow by slightly adjusting the timing of selected packets in the flow. In the embedding phase, we use network flow grouping strategy to divide the IPDs (i.e., interpacket delay) into two different groups randomly, and then realize the watermark embedding by utilizing...
Information system innovation has become a hot issue because increasing enterprises have to depend on the innovation behaviors to get the better performance from information systems. The objective of this paper is to deeply understand information system innovation behaviors by examining organizational innovation climate factors. The paper proposes two patterns of information system innovation behaviors...
The paper reflects the deeper problem in tourism supply chain which is trust among travel agencies, and between travel agencies and affiliated enterprises according to the phenomenon of the lack of trust between travel agencies and tourists. Firstly, the concept of trust is introduced. The study shows that it is necessary to enhance the cooperative trust in tourism supply chain dominated by a travel...
It is well know that Ekeland variational principle is widely used in optimal theory, in optimal theory, mathematics on economics , management and so on. In this paper, we extend Ekeland variational principle to a random metric space, which makes it be suitable for random optimal theory. Then by using the new result we consider the existence of random approximate minimum point for a class of random...
The development of information technology and electronic commerce (E-commerce) has led to great changes in the tourism industry in many countries around the world including China. Traditional tourism are faced with great opportunities and challenges because of the information revolution,. With E-commerce development, traditional tourism value chain has encountered problems and begun to reconfigurate.
The selection of Chinese rural land requisition path plays a crucial role on whether social benefits occurred by land requisition could be maximized. In this paper the dynamic optimization problem of land requisition is aimed at by the government. A dynamic analysis method is utilized through Optimal Control Theory. The dynamic optimization model is established with no budget-constraining then its...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.