The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rapid development of Internet technologies such as cloud computing and big data, the scales of distributed information systems in big companies have grown to enormous sizes. Automatic detection and diagnosis of system faults in the large-scale information systems is complicated and important in both practice and research. In this paper, we propose a Graph-based Fault Diagnosis approach in...
The hybrid architecture of content distribution network (CDN) and peer to peer (P2P) is promising in providing online streaming media services. It's convenient and low in cost to study the design space of hybrid streaming systems via simulation. In this paper, we designed a discrete-event simulator for hybrid CDN-P2P VoD systems. The simulator supports multiple switching strategies, different video...
Although many different community detection algorithms have been proposed to detect community structures in complex networks, how to effectively detect community structures is still a great challenge. Seed-centric methods is one of the most effective solutions for community detection. To more, in this paper, we propose a novel density-based seed expansion algorithm, namely, DenSeC, which can easily...
By analyzing the binary executable files comparing technique, this paper presents a method to detect vulnerabilities in Windows system based on security patch comparison. The technology is mostly used for detecting vulnerabilities which are patched by Microsoft but there is no clear location and detailed information of the vulnerabilities. Finally, the result of detecting MS15-034 vulnerability experiment...
The purpose of this study is to propose an approach to recommend classification algorithms for real-world classification problems. First, the extension rhombus thinking mode is used to construct performance indicators of the classification algorithm. Second, an extension-based recommendation method about classification algorithm is proposed. Third, a recommendation system is designed to implement...
At present, the mental health problems of college students has aroused widespread concern in society. The design and development of Mental health management system for university students has become increasingly important. Based on the characteristics of College Students' psychological health management, this paper explores the practical college mental health management system and through the B/S...
The applications of the mobile devices are increasingly being improved. They include computation-intensive tasks, such as video and audio processing. However, the mobile devices have limited resources, which may make it difficult to finish these tasks in time. Computation offloading can be used to boost the capabilities of these resource-constrained devices, where the computation-intensive tasks are...
Cloud Service is a major project that CHT currently initiated to promote. It aims to provide services to users anytime and anywhere. To achieve that, we need robust cloud technology. This paper takes FMS (Fraud Management System) as an example to depict the system migration process into the cloud service. We propose solutions to problems we encountered, software licensing issues, and other related...
In order to strengthen the comprehensive competitiveness under the global information environment, enterprises should integrate information resources within the companies, supply chain enterprises and other stakeholders. The core is to achieve information sharing and coordination. Through the analysis of new requirements of real time, sharing, interaction and diversity in enterprise information that...
This paper presents a hybrid sensor network with both fixed nodes and mobile nodes for monitoring and protecting Milu Deer, a specific kind of rare animals in China. Our goal is to provide unprecedented fine-grained environmental and individual data for zoologists and explore potential problems in hybrid sensor networks. Total 116 nodes have been deployed up to now, which consists of 30 mobile nodes...
Nowadays, people tend to photograph with mobile phones more and more, in which way photo sharing in online SNS are much more convenient. But there remain challenges such as automatic sharing, album management and social sensing. This paper presents a participatory sensing based social photo sharing system-SoPhoNet. With the involved model "People, Photos and Photo Events", the participators...
In order to meet the requirements of the system running environments simulation for virtual machines' performance optimization and anomaly detection, an extensible tool named Characteristic Scenarios Simulator for Virtual Machine was developed base on the summarization and analysis of characteristic scenarios of virtual machines' running. The simulator takes an Analyser-Manager-Worker core architecture...
The existence of urban black-odor rivers is a common phenomenon in Chinese cities. With the pursuing of residents for a high quality life, the improvement of the black-odor phenomenon of rivers becomes a serious problem. Currently, although there are various types of treatment technologies for urban black-odor rivers, we are still lack of an orderly and comprehensive technology inquiry service platform...
Cloud computing is a development and integration result of distributed processing, parallel processing and grid computing technologies. It helps the enterprise switch the resources according to the applications, accesses computer and storage systems according to the demand. And it provides a new computing model for enterprise informatization. This paper introduces items realted to cloud computing:...
Consistent labeling is a fundamental problem in multiple-camera-multiple-human tracking. We present a new consistent labeling method called CPSPL that is used in our P2P human tracking system with multiple calibrated cameras, media servers, human trackers and trajectory mergers. The proposed method differs from most existent ones in that it only uses projective lines for establishing the correspondence...
Quite recently, Li et al's suggested an efficient verifier-based password-authentication key exchange protocol via elliptic curves. In this paper, we shows that their protocol is still vulnerable to off-line dictionary attack and unknown key-share attack. Through our work, we hope the similar mistakes can be avoided in future designs.
This paper introduces techniques of OPC and multibus and gives an application of them which is based on Wincc(windows control centre) platform. The application has been using to integrate different kind of control systems together. The paper gives an example system, which is based on two layers, the Ethernet layer and Modbus layer. Based on the platform of Ethernet consisting of PC and PLC and C/S...
The first aid and immediately help are very important in an accident. The earlier detection and treatment we do, the better prognosis and health patients have. In the senior populations, it is more important. Once seniors have an accident, not only physically injure in their body, but also mental and social ability, and may have severe sequela. Concerning about these populations, this research design...
As the next generation network gains increasing attention, IPTV has been recognized as an efficient way to provide key IP multimedia services. Compared to conventional TV services, IPTV is sensitive to the IP network characteristics such as packet loss, delay and jittering. In addition, the potential long delay in channel switching is another significant challenge for IPTV systems. In this paper,...
As a new generation of Internet communication technologies, Web Services are becoming an increasingly popular middleware technology used to integrate heterogeneous building automation system (BAS) on the Internet. Ajax technology, with which web applications can retrieve data from the server asynchronously in the background without interfering with the display and behavior of the existing page, has...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.