The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this article, we put forward a new method of designment of the automatic tracking system of solar energy based on one-chip computer and self-sufficient power. The method uses silicon photo-cell and store electricity equipments as power; Machinery rotary actuator adjusts the direction of solar panel automatically according to the direction of the sunlight, follows the sun automatically and improves...
In this paper a fast face location method based on gradient distributions is presented. This method can locate face with certain rotation, or light variation or with glasses or beard in the image. It begins with vertical location by use of vertical integral projection on the two-valued image of the original image, and then proceeds with horizontal location according to the distributions of gradient...
With the development of Web services application, some issues of Web services security are increasingly prominent. XML is widely used of its high expansibility as a platform-independent language. After analysis the traditional Web services security technology, this paper formulates the XML signature, as the basis of Web services security technology, and describes how to create and verify signature...
Most security issues of wireless network are focused on preventing attacks from the outsiders or wireless users. However, these authorized wireless users have no right to take part in the drawing up security policy of an organization. Besides, the larger network scales the more difficulty to be maintained. Patching and managing the mass of computer vulnerabilities are a timely but critical issue....
Higher education computer fundamental course reform faced the 21st century has already been started in an all-round way. Innovation of teaching material's design philosophy is one of important contents that can't be ignored.The design and writing philosophy of university computer fundamental teaching material is summarized and reviewed leaded by the theory of self-directory learning, and an example...
On the basis of studying the status of data structure in the courses for computer science and technology specialty and its knowledge structure,teaching method based on knowledge structure is proposed to raise studentspsila motivation, to organize teaching contents reasonably, to select topic scientifically,and so forth. Some statistic data of teaching practice are shown to prove this.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.