The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Scanning attack threatens the security of network communication severely. Traditional network communication usually uses static IP address configuration, which provides convenience to scanning attackers. In this paper, an IP Hopping (IPH) communication scheme is proposed based on software-defined network to solve this problem, in which IP addresses can be assigned to the hosts in the network dynamically...
This paper presents a research of applying software-based SDN network virtualization technology across data centers in a large enterprise. The development history of SDN was briefly reviewed at the beginning, followed by introductions to two SDN network virtualization solutions based on overlay network. An implement method in an enterprise is elaborated based on SDN solutions. This method is proved...
The drift ice is very seriously that impact the navigation safety and port operation in Yalujiang estuary area. By collecting the datum of hydrometeorology, geomorphology and ice regime in Yalujiang estuary for many years, systematically analyzed the characteristic of drift ice influenced by the ocean current, wind and geomorphology. The destruction mechanism of navigation mark by drift ice are studied,...
In this paper, we focus on the problem of analyzing the operating performance of insurance companies, and this problem is crucial for modern financial industry development. Index system for evaluating operating performance of insurance companies is made up of four parts: 1) Profitability, 2) Solvency, 3) Capital adequacy and 4) Management ability. Main idea of this paper is to introduce DEA model...
Electronic Health Record (EHR) systems have an abundance of convenience for telediagnosis, medical data sharing and management. The main obstacle for wide adoption of EHR systems is due to the privacy concerns of patients. In this work, we propose a role-based access control (RBAC) scheme for EHR systems to secure private EHRs. In our RBAC, there are two main types of roles, namely independent patients...
High-performance parallel storage systems, such as those used by supercomputers and data centers, can suffer from performance degradation when a large number of clients are contending for limited resources, like bandwidth. These contentions lower the efficiency of the system and cause unwanted speed variances. We present the Automatic Storage Contention Alleviation and Reduction system (ASCAR), a...
With the rapid development of the application of mobile Internet and wireless data communications technology, m-commerce has a solid foundation for widely application. However, m-commerce depends on the poor security wireless communication network, and then the key factor in m-commerce is security. In this paper, WAP content provider self-provided WAP gateway solutions and gateway navigation type...
In order to assure the high efficiency and accuracy of dealing with emergency incidents, it's the essential factor of dispatching the materials and human resource in time. Electronic image hotspot map can visually present the status of resources scheduling in different areas. AJAX engine can make a bridge between client side and server side. Furthermore, it makes the separation of web-page and application...
The rapid development in mobile commerce not only offers opportunities for business, but also makes higher security demands in the process of e-commerce transactions. It's true that authentication is the key point to ensure mobile commerce safety. This paper analyzes the existing problems in current mobile commerce authentication and proposes a strategy to a unified mobile commerce authentication...
Mobile Commerce is the new development of e-commerce which takes on strong potential for its convenient, efficient and omnipresent characters. This paper analyses the security hole of traditional application model based on SMS, and designs a novel security model of mobile commerce. This model utilizes SMS-gateway and CMPP proxy module joined with server security to carry out the data communication...
In order to save network bandwidth and system resource and improve video browse efficiency in client, a web video service based flash video technique is proposed. Firstly, the flash video data model is analyzed and a web video service architecture based on flash video is presented. Secondly, a flash video data processing flowchart with different kinds of video resource is designed for the video release...
This paper focuses on study the geographic information service theory under the framework of digital earth, combining with geographic theory to make explanations on application model of geographic information service system, system structure, the establishment and the deployment model, introduces various geographic information services, map service and its function in ArcGIS Server, and then make...
Facing the fast-growing e-commerce market, how to obtain providers resources fast and accurately has become an important issue troubled development of electronic commerce. In this paper, Agent-based intelligent search engine could find a number of effective resources from supplier information and it also could be helpful for the establishment of an intelligent e-commerce environment to improve the...
NETCONF, a new network management protocol, was released in 2006 which has overcome the weaknesses of SNMP. In the NETCONF protocol, it proposed a new mechanism subtree filtering, which allows an application to select particular XML subtrees. With the Subtree Filtering, specifically information of XML can be filtered out as a XML subtree. However, since the Subtree Filtering depends on the parsing...
NETCONF is a new protocol as the network becomes more and more complexity, which has a better capability administering lots of devices. However, the large scale network brings some trouble for implementing access control especially when administers need to deploy or update policies on each devices. In this regard, the architecture of centralized access control proxy server based on NETCONF is focused,...
Minimizing the worst-case playback delay (WPD) in VoD services is both critical and challenging. Given a fixed amount of bandwidth for broadcasting and patching, there is no prior work on determining the minimum WPD, let alone guaranteeing it. In this work, we propose novel schemes that leverage the unique properties of a TDM-based Passive Optical Network (PON) by performing rebroadcasting and patching...
What we are proposing in this paper is the object, architecture, design and implementation of a Web-based simulation meta-synthesis, named WebSMS. The motivation of the WebSMS system is to provide services for distributed and secure sharing and reuse of resource, distributed collaboration, and distributed execution and observation of simulation. In this paper, the foundational idea of meta-synthetic...
There are many challenges of using all kinds of handheld devices as learning tools, that can connect to the Remote Learning System by cable or wireless network and then browser the downloaded course contents. First of all, network connection, especially wireless link, is usually not persistent and wireless coverage is often limited. In this case, the handheld learning devices become useless and the...
This paper focuses on introducing load balancing spatial analysis into XML/GML/SVG-based WebGIS. We discuss the issues of GML-based spatial data representation and analysis, and design a load balancing middleware to dispense a spatial query and analysis to the server side or the browser side based on the cost of that spatial query. Finally, this paper designs some case studies. The results of the...
A page interest estimation model based on analyzing the users' browsing behaviors recorded in web access logs is proposed. This model avoids users' feedback to the browser and doesn't collect the information which may produce privacy issues. To provide the proper data set for the estimation model, a referer-based data preprocessing method is firstly carried out to improve the reliability of the access...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.