The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The construction project of coal mine is characterized by onetime, high cost, long duration, difficult construction, technical complexity and multitudinous project participants, whose risk events occur frequently in its construction. Therefore, the risk monitoring of construction project of coal mine is of theoretical significance and practical value. The risk control problems of coal mine construction...
This thesis carrys out thorough investigation and discussion to the optimum savings ratio of our country economy making use of qualitative analysis. We put forward that the really savings ratio have exceeded the optimum savings ratio needed by balanced growth of our country economy owing to a series of unbalance in economy reality.Then,we built the economic model through demonstration analysis to...
The paper presents an new authentication method on WiMAX, which is a new and hot research point for telecommunication and computer scientist. In the IEEE 802.11 technology, security was added later while IEEE 802.16 considered the security issues during the design of the protocol. However, security mechanism of the IEEE 802.16 still remains a question. WiMAX is relatively a new technology and does...
This paper presents a new teaching method by introducing Xen into a computer security course. To provide students with hands-on exercises in computer security course, we have designed a laboratory environment for computer security education. It is based on Xen and Linux, all of which are free. Xen provides a secure environment within which students may install, configure, and experiment with the design...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.