The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aims and objectives
To evaluate the effect of an Internet‐based home orthopaedic care platform on patients’ functional joint recovery, quality of life and activities of daily living after hip replacement.
Background
Most of the functional exercises after arthroplasty are performed outside the hospital. At present, the WeChat platform is used mainly in the inland of China for continuous nursing...
Terrible network environment is damaging the critical infrastructure and the interests of internet users. In order to ensure the protection and resilience of attack, it is important to better analyze and observe network traffic for discovering anomaly. This paper presents a clustering algorithm by using network-layer and transport-layer statistical feature to classify anomaly traffic. Experiments...
DDoS attacks are one of the top security problems affecting networks and disrupting services to legitimate users. The first vital step in dealing with this problem is the network's ability to detect such attacks. To that end, it is important that an intrusion detection mechanism be able to differentiate between real DDoS traffic and Flash Crowds traffic, the latter of which constitutes sudden bursts...
In order to explore the dynamic process of the trust mechanism of the Internetware entities, this paper proposes a self-organizing trust model of the Internetware by means of the replicated dynamic equation based on the Wright-Fisher process, and analyzes the evolutionary direction and the stability of the Internetware system by establishing the incentive and punitive mechanism. This kind of self-organizing...
Web-based inquiry learning refers to a learning activity,it constructs an interactive learning environment for student by utilizing the Internet and multimedia technologies, where student can choose and identify projects from school and social life, use a method similar with scientific research, acquire knowledge initiatively, applicate knowledge to solve problems, this activity is a strong supplement...
The SQL injection attacks (SQLIAs) vulnerability is extremely widespread and poses a serious security threat to web applications with built-in access to databases. The SQLIA adversary intelligently exploits the SQL statement parsing operation by web servers via specially constructed SQL statements that subtly lead to non-explicit executions or modifications of corresponding database tables. In this...
Online social networks have become popular platforms for people to make connections, share information, and interact with each other. In an online social network, user publishing activities such as sending messages and posting photos represent online interactions between friends that involve the use of network and system resources. As more and more businesses use online social networks as a means...
Network attacks occur in high proportion on the internet, thus aside from security as a means of defense there is a need for being able to detect attacks as they occur so that measures can be put in place to tackle them. For this, an intrusion detection system (IDS) is required that has good quality of detection capability. We propose Quality of Detectability (QoD) as a kind of Quality of Service...
Now all kinds of 3D virtual worlds have been popular on Internet, but due to gigantic data of virtual scenes and limit network bandwidth, traditional Client/Server based downloading scheme has been bottleneck for a user to construct local virtual worlds swiftly. This paper proposes a parallel delivery scheme for large scale virtual scenes in a two-layer hybrid based P2P(Peer-to-Peer) overlay, in which...
The development of witkey model has become increasingly popular within both the academic and business arena. And witkey mode continues to grow and evolve as a vital basis with which electronic wisdom can upgrade its capabilities and grow its businesses. With the segmentation of electronic wisdom market, tourism electronic wisdom has also made the progress. In this paper the author analysis the profit...
The field of e-government still lacks a coherent identity at present. In this paper, we seek answers to this question by relying on a large-scale survey of e-government field articles. A consensual conception of the field held by its members is derived. Then, it is discussed that the definition and its six sub-elements. Findings suggest that e-governmentpsilas success as a field emerges from a widely...
A teleprogramming method is presented in this paper for the Internet-based teleoperation. Since the Internet introduces random communication delays, limit of bandwidth and data loss, several challenges, such as instability and loss of transparency, may arise. The proposed teleprogramming method is used to settle the problems caused by Internet. Based on the remote robot local autonomy, by transmitting...
Based on the stress reaction model, this paper analyzes the start mechanism. The methods include: 1) taking the inhibition chain in the model as the flexible resource. When intruded, it can be used to scan for the reply plan; 2) when finding the programming solution, and starting a reply plan, it can be used to inhibit the system's excessive reaction. Therefore, it extremely utilizes the limited resource,...
Multimedia transmissions are delay sensitive Internet applications. Because mobile stations move all of the time, handoff processes are necessary and unavoidable in wireless network environments. Since handoff processes tend to break the communication link, some researches have been done to reduce the break time and arrival delay during Internet multimedia applications. In this paper, we propose an...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.