The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The value of image retrieval has become more and more prominent in the era of big data. However, large numbers of images are missed from current method since the image retrieval precision largely depends on the high quality of images. By common methodology, when the quality of images decreases a little, the accuracy of retrieval would decrease significantly. In particular, it is difficult to retrieve...
As GPS datasets are becoming more available with spatial and temporal information, the needs of high quality, predictive information about spatio-temporal are turning out to be a feasible goal. However, many GPS devices are prone to failure, which results in missing GPS data. Moreover, the missing data may affect the accuracy of the result. To make the matter complicate, the missing data is always...
The missing trajectory problem is a difficulty in various transportation applications, e.g. the road which the truck usually travels and the driver's behavior. Most of previously developed missing data are not concerned about the spatial and continues space. Therefore, in this article, an algorithm is proposed to complete the missing trajectory in a vehicle's trace. The possible traces are found out...
With the rising number of vehicles equipped with GPS system, a lot of vehicle trajectories are produced every day. At present researchers begin to study the vehicles' trajectory data. But the current trajectory compression technology cannot be very simple and will lose much information. Therefore, this paper puts forward a data warehousing design of vehicle trajectory. It can store compressed vehicle...
It is important to match vehicle GPS points onto a map. Many map-matching algorithms, which use heading, speed and position to complete the map-matching process, are not suitable for the low frequency GPS data. The distance between two adjacent GPS points in the low frequency GPS data can range from 500m to 1000m, and the vehicle can cross several streets. This paper puts forward a modified weight-based...
In this paper, the importance of RFID technology is introduced, and several issues are displayed. Then related works are introduced, and methods of authentication protocols between the reader and the tag are analyzed, and every protocol has its own issue. Based on this analysis, the protocol that ECC is embedded into the authentication protocol is proposed, and this protocol can solve the previous...
In this paper, the importance of information security and the difference between symmetric cryptography unsymmetric cryptography are introduced. Then the principles of Elliptic Curve Cryptography and the advantages of the prime fields in FIPS 186-2 are discussed. Based on these, the flexible architecture of Elliptic Curve Cryptosystem is proposed and the implementation is described. In the end, a...
In this paper, the originality of the Internet of Things (IoT) is introduced. Then the different visions are discussed. After this, the technologies and applications are analyzed. Based on these, the issues are displayed. In the end, the conclusions are drawn; we should utilize IoT while we must try hard to find the solutions to the issues.
GUI library of Linux has not unified standards and this is not the same as that of Windows. So there are a variety of Linux desktop operating systems, and it is a difficult problem for the development of the testing tools in Linux. For solving the problems presently, this paper proposed a general record/playback technique based on X11 in Linux. By this technology, you can record the user's operations,...
A new kind of retrieval software architecture about structured data and Non-structured data was proposed in this paper. In the past, because of the great differences between them, we have to use different ways to deal with their data retrieval. We have been using SQL statements in the structured database search, and using index search in the non-structured data retrieval. But regardless of which search...
This paper deals with studying input-output efficiency of scientific research in colleges and universities by using the method of principal component analysis. A mathematical model including multiple scientific research input-output indicators of colleges in 31 provinces, autonomous regions and municipalities directly under the central government are built to make further quantitative analysis and...
In this paper, the importance of information security is introduced, and several methods of information security are discussed. Then RSA and Elliptic Curve Crytosystem are compared, and ECC is safer than RSA, and that ECC replaces RSA is the trend in future. As kP is often computed in ECC, the efficiency of Computing kP is the key point. Several methods of computing kP are analyzed and compared, a...
In this paper, the importance of IOT and its history is introduced, and many countries and enterprises put their focus on IOT. After this, several technologies in IOT are discussed. Then the applications of IOT in Electronic Commerce are analyzed. In the end, the conclusion is drawn that IOT will greatly change the methods and styles of Electronic Commerce, and it will improve the service of EC and...
In this paper, the necessity and importance of information security are introduced. After this, measures of information security often used are analyzed, and their advantages and disadvantages are discussed. On this base, the viewpoint that operating system is standardized and soft ware is interpreted by it, and this measure is sure to hide operating system's details from software, protect operating...
This paper introduces the current development situation of China's e-commerce firstly, and then points out that the era of reverse logistics in e-commerce development situation, and after that elaborates on the key reverse logistics system function modules. In the end a conclusion about how to use XML/EDI for data exchange is drawn.
The development of "global information society" is transforming nearly all business processes including information system education, and one implication of this transformation is that a new curriculum of management information system (MIS) should include new components of internationalization and should be accessible to other cultures. This paper first introduce the history of MIS major...
In this paper, the security of electronic commerce and the security methods are introduced firstly. Then, the history of Java security architecture and its design principles are described. After that, partial implementation of elliptic curve cryptosystem developed with Java is discussed. In the end, the advantages of electronic commerce systems developed with Java language and Java security architecture...
With the fast development of cryptography research and computer technology, the cryptosystems of RSA and Diffe-HelIman are getting more and more unsafe, and Elliptic Curve Cryptosystem is becoming the trend of public cryptography in the future. This paper mainly uses object-oriented technology as tools, and divides Elliptic Curve Cryptosystem into several layers, every of which corresponds a class...
With the fast development of cryptography research and computer technology, the cryptosystems of RSA and Diffe-Hellman are getting more and more unsafe, and elliptic curve cryptosystem is becoming the trend of public cryptography in the future. This paper mainly uses object-oriented technology as tools, and divides elliptic curve cryptosystem into several layers, every of which corresponds a class...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.