The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An anti-PROXY detecting scheme based on characters is proposed. According the characters of data flow, viz. flow rate character, application character, content character, process character and behavior character, it is identified whether the user is an PROXY object or not. The next step anti-proxy action will be made in terms of practical policies. The scheme includes character collection, modes matching,...
The utilization of information and communication technology (ICT) to enhance teaching and learning is the emphasis of the education reform in China. The purpose of this study was to construct an effective online learning model for the online learning. Through the analysis of the web learning problem, the article brings forward the important function of the online tutor in web learning and defines...
Network coding has recently drawn tremendous attention. Applying network coding to Peer-to-Peer (P2P) file sharing is still a relatively new area of study. Adopting network coding in a P2P file sharing network can make data distribution more effective and relieve the burden of the original seeder. In this paper, we first provide the mathematical analysis modeled from contemporary P2P file sharing...
Web 2.0 and Internet of Things (IoT) has becoming popular in the last decade. This paper firstly focuses on the survey of required IT technologies in e-Pets. Without concerning the issues on mechanical components and sculpture designs, we examine the evolution path and rough taxonomy of current ePets products. With the explosion of Internet of Thing and Web 2.0 technologies, we propose the brain-new...
With the popularization of Mobile Internet, a number of enterprise applications that require high security have been gradually migrated to Mobile Termination. The problem of Mobile Application Security must be settled for the popularity of Mobile Application. One of the effective solutions is to apply IPSec VPN to Windows Mobile. This paper mainly discusses NDIS Device Driver which is the underlying...
As a subset of e-commerce, m-commerce (mobile commerce) also faces problems of trust building. The limitation of mobile devices, such as screen size, privacy and safety problem, make it important to build trust effectively and efficiently. In e-commerce, culture can exert a significant impact on how trust is built through various web strategies. Similarly, trust-building strategies in m-commerce could...
This paper presents a crawling system, that helps building a shopping search engine. The system's core is a vertical crawler that is specially used in shopping search engines. The crawler is divided into 5 parts and it realized automatic generation of crawling templates by its analysis module which is a regular expressions method set. A manual generation of crawling template is designed to support...
As the attractive field of online instructional design, learning activities design has been caught more and more attention and how to construct the learning activities environment by using ICT has become determinant. Some research projects have constructed the learning activity frame and template for learning activities design, but few research has been found have validity for learning activities...
How to judge the relationship between mobile short messages is the key technology of mobile short message topic detection. The characteristics of the mobile SMS text are discussed in this paper, and the association of different SMS topic feature words is analyzed. Then a computing method of the association degree between different SMS feature words is proposed, which is based on leverage formula....
To build an automatic assistance for learning and provide a self-paced learning mechanism are the objectives in the e-learning environment. The paper improves the previous proposed Semantic Question Answering System which applies Link Grammar and WordNet to form a Semantic Tree to represent the meaning of question and further find the relevant answer based on the selected Data Structure Ontology....
iSCSI implements the SAN technology over the Internet (TCP/IP) that brings economy and convenience whereas it also raises issues such as performance and reliability. While cache can be used to improve the performance of iSCSI system, cache inclusive will negatively influence the system's performance in multiple-level cache hierarchy. Moreover, traditional methods to get rid of this phenomenon are...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.