The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aiming at the problem that oVirt cluster host security detection tools is not easy to integrate and the evaluation indicator data is difficult to collect and quantify, the paper designs a oVirt virtualization cluster security risk detection and assessment framework. The system uses the distributed architecture and REST-based technology for communication between the various modules. Risk detection...
A handwritten Tibetan database, MRG-OHTC, is presented to facilitate the research of online handwritten Tibetan character recognition. The database contains 910 Tibetan character classes written by 130 persons from Tibetan ethnic minority. These characters are selected from basic set and extension set A of Tibetan coded character set. The current version of this database is collected using electronic...
This Paper embarks from the actual demand of the Intelligent Computer-Assisted Instruction(ICAI) system, has analyzed system model, then creates a Web-based ICAI system and proposes the method to implement the teaching inference engine using prolog.
Simulation studies are realized based on fingerprint identification system hardware device. On the study of the device functions, the high-level programming language VC + + is used to simulate. The fingerprint identification system is divided into five modules, namely, display module, password input module, fingerprint input module, error display module and database connectivity module. After hardware...
On the basis of the analysis of the security demands of the database, this paper proposes a novel method that simultaneously assures the confidentiality and the integrity of data items. The basic concept of this method is adding a verification table to existing database tables to the existing database tables, and the verification items for each original data item are stored in the verification table...
The paper is directed by constructivism theory, combined by the practical characteristic of programmer courses, brings forward an “incomplete” assistant teaching system, and expatiates on the ideology, model and overall design of this system. The practice proves that the “incomplete” assistant teaching system based on the constructivism is a new approach to improve teaching quality.
The paper proposed the importance of document filtration system for scientific and technological personnel, and then gave a solution of filtering system at the perspective of software architecture. Finally, this paper provided a complete implementation of filtering system base on the analysis and the design, proving the feasibility of this architecture and our framework.
The eyes are the most important facial landmarks on human face, for both human computer communication and face normalization. It is crucial to detect and locate the eyes accurately. This paper introduces a novel and simple method for eye localization. Based on the special gray lever distribution in the eye region, the spectral residual model is exploited to extract the rough eye region primarily....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.