The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, the rapid development of geographic information system technology and the popularity of geo-location-based mobile information services have made people pay more attention to geography-related information. Thus, the information retrieval and related services based on geographic has a broad application prospects. However, the traditional search engine for the processing of geographic...
With the development of satellite communication technologies and user requirements for pervasive network access, there is a trend to integrate satellites into the terrestrial network infrastructure. Such kind of satellite-terrestrial network is often used for content delivery services as satellites are with wide-area coverage. In terrestrial networks such as Internet, in-network caching has been proved...
In this paper, a watermark scheme for detecting and recovering the tampering of speech signal is proposed. We embed an approximate version of the origin information into the less significant bits (LSBs). When the watermarked signal is tampered, we can localize the tampered area and exclude from the area, recovery the original one from the approximate version. Based the embedded information, we estimate...
The spread of pirate movies has caused great impact on the film industry as well as social morality. This study bases on a model combining the Theory of Planned Behavior with Ethical Theory, and it also considers the special surrounding factors of pirate movies in China, since the phenomenon of piracy is common here. After omit some social factors in our model in this paper, we find that the psychological...
As the current Internet architecture is suffering from scalability issues, the network research community has proposed alternative designs for the Internet architecture. Among those solutions, the Locator/Identifier Separation Protocol (LISP) has been considered as the most promising solution due to its incrementally deployable feature. Despite of various advantages provided by LISP, many ISPs are...
Recently, the number of Internet applications available for use on both desktop computers and smartphones has rapidly increased. The Internet traffic generated by these applications has increased significantly as well. Network operators are required to be aware of the status of managed networks in terms of application usage. However, the application traffic observed in a network is dependent on users...
Telemetry miniature transmitter is the sensing device, a major part, of the Internet of things. The design of the telemetry miniature transmitter according to FPGA not only has the characters of high integration, strong calculation and low power consumption, but also features high agility and strong actual effect. According to the overall system requirements, the design method and process for FPGA...
The eXplicit Control Protocol (XCP) is a promising congestion control protocol that outperforms TCP in terms of efficiency, fairness, persistent queue length, and packet loss rate. XCP quantitatively informs senders how to adjust their sending rate, and assumes that all senders will respond. However, short-lived flows are often on the order of a few segments, they may be unresponsive to XCP feedback,...
This article begins with the brief introduction on the Internet of Things and Business Process Reengineering, by indicating that it is a general trend for reengineering the logistics business processes to improve the efficiency of logistics operations and obtain more the third profit source. A suggestion of introducing ‘The internet of things’ technology to achieve the business process reengineering...
This paper is about the schemes for a remote control hydraulic servo test bed. The servo valve controlled hydraulic cylinder and its server are closed over the internet by using TCP/IP protocol suite to multiplex data from remote plant to the controller. Users monitor control process by web browser. As plant, server and user interface are clock-driven, single-sampling, empty-sampling and multiple-sampling...
A new methodology of mobile police spatial information service grid model is studied based on spatial grid computing environment. Key technologies are presented in the model, including spatial grid computing, mobile agent (MA) distributed computing, mobile geographic information system (GIS), global positioning system (GPS), video monitoring, transfer control protocol/internet protocol (TCP/IP), and...
Internet has become a new approach for tourists to search information about attractions and tourism destination before making a purchase decision. However, it is difficult for tourists to collect every piece of information available online. The purpose of this study is to discuss how backpackers search for information by the Internet. After Analysis on 479 valid samples with 17 items about the risk...
Customers are the most important assets of enterprise. In the era of customer economy, customers are becoming the core of competitive focus, and the value of enterprise is decided by customers. The enterprise should turn their operating object from product to customer, and apply customer operation mode. Customer operation mode can be defined as an operating innovation that enterprise take customers...
With the development of the Internet, insurance selling on the Internet becomes a good chance for most companies. We have seen that property insurance have realized selling on the Internet, but for the life insurance, there isn't any improvement in these years. One factor can explain this phenomenon: life insurance is too profession for customer to comprehension. So selling life insurance on the Internet...
The deployment of the IPv6 network becomes to be realized as the necessity of the IPv6 network is enlarged due to the limit of the IPv4 network. However, the security policy about the IPv6 network is not mature and it becomes an obstacle in the IPv6 network deployment. Attackers can detour the access control of packet filtering system, unless packet filtering system can decrypt IPSec packet. This...
The urgent issues for automobile, aircraft and trains companies today are how to reduce the time and cost required for developing a new car. CAE(computer aided engineering) has been regarded as an efficient way to solve these issues. Currently, the courseware for CAE is not enough, which limits education and training for this domain. The paper basing on "Web-based e-learning courseware for CAE"...
In view of the increasing number of waste resources and the actuality that information channels and system of reuse is not perfect. The need for integrative information management system and the construction of venous industry information management system is analyzed. The main features of venous industry information management system are summed up. On this basis, a design project about venous and...
Nowadays many P2P applications over the Internet utilize sophisticated protocols and employ various techniques to avoid detection and recognition with standard measurement tools. The communication analysis of P2P network is significant for recognizing P2P traffic and managing P2P applications effectively. In this paper, Skype is studied as a case to identify P2P traffic and measure an overlay network...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.