Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Aiming at the problem that oVirt cluster host security detection tools is not easy to integrate and the evaluation indicator data is difficult to collect and quantify, the paper designs a oVirt virtualization cluster security risk detection and assessment framework. The system uses the distributed architecture and REST-based technology for communication between the various modules. Risk detection...
A handwritten Tibetan database, MRG-OHTC, is presented to facilitate the research of online handwritten Tibetan character recognition. The database contains 910 Tibetan character classes written by 130 persons from Tibetan ethnic minority. These characters are selected from basic set and extension set A of Tibetan coded character set. The current version of this database is collected using electronic...
This Paper embarks from the actual demand of the Intelligent Computer-Assisted Instruction(ICAI) system, has analyzed system model, then creates a Web-based ICAI system and proposes the method to implement the teaching inference engine using prolog.
Simulation studies are realized based on fingerprint identification system hardware device. On the study of the device functions, the high-level programming language VC + + is used to simulate. The fingerprint identification system is divided into five modules, namely, display module, password input module, fingerprint input module, error display module and database connectivity module. After hardware...
On the basis of the analysis of the security demands of the database, this paper proposes a novel method that simultaneously assures the confidentiality and the integrity of data items. The basic concept of this method is adding a verification table to existing database tables to the existing database tables, and the verification items for each original data item are stored in the verification table...
The paper is directed by constructivism theory, combined by the practical characteristic of programmer courses, brings forward an “incomplete” assistant teaching system, and expatiates on the ideology, model and overall design of this system. The practice proves that the “incomplete” assistant teaching system based on the constructivism is a new approach to improve teaching quality.
The paper proposed the importance of document filtration system for scientific and technological personnel, and then gave a solution of filtering system at the perspective of software architecture. Finally, this paper provided a complete implementation of filtering system base on the analysis and the design, proving the feasibility of this architecture and our framework.
The eyes are the most important facial landmarks on human face, for both human computer communication and face normalization. It is crucial to detect and locate the eyes accurately. This paper introduces a novel and simple method for eye localization. Based on the special gray lever distribution in the eye region, the spectral residual model is exploited to extract the rough eye region primarily....
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.