The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many colleges have accumulated a large amount of information, such as achievement data and consumption records. According to the above information, we attempt to identify the student group from various aspects. Given this, we can acquire the characteristics of students in different groups. In this way, the college can have a better understanding of students to accomplish the reasonable management...
CAPTCHA (also known as verification code) is mainly used to guarantee the login security of the interactive websites. At present, the most popular verification code is image CAPTCHA which can distinguish the human user from the computer by identifying characters in the image. Although the image CAPTCHA is safe at beginning, great deals of CAPTCHAs have been cracked by the computers along with the...
The paper presents a novel Three-tier Parallel Genetic Algorithm (TPGA) based on multi-core computer with Threading Building Blocks (TBB). The purpose of a new parallel function is to improve the running efficiency. TPGA is decomposed into three-tier: data coding parallelism, task processing parallelism and data decoding parallelism and it can improve the convergence rate. TBB offers a rich and complete...
Many network security applications in today's networks are based on deep packet inspection, checking not only the header portion but also the payload portion of a packet. For example, traffic monitoring, layer-7 filtering, and network intrusion detection all require an accurate analysis of packet content in search for predefined patterns to identify specific classes of applications, viruses, attack...
It is a normal method that CAPTCHA is used to distinguish general users from software robots in E-Business website. With the rapid development of reCAPTCHA, traditional simple CAPTCHA is facing the challenge of being cracked, while too complicated CAPTCHA is difficult for users to identify. This paper proposes a novel CAPTCHA based on digital image information hiding, which is easy for users to identify...
In ESS2008, Yang et al. suggested a key-exposure-free chameleon hashing scheme, and it can be used to design signature and some other cryptography mechanism. In this paper, we construct a new timeliness optimistic fair exchange protocol based on this key-exposure-free chameleon hashing scheme. The new scheme does not require the use of interactive zero-knowledge proofs in the exchange phase. In our...
This article bases on education evaluating theory and uses computers and multi-level evaluation method. It creates a set of evaluation index system and evaluation of mathematical models which can reflect the characteristics of the physical education teachers work in the universities. It provides a scientific assessment and what it provides is very useful.
By analyzing and comparing the existing network product collaborative design system, aimed at the characteristics of the distributed network collaborative design environment, different structure and dynamic state, according to distributed compute and collaborative design theory, method and technologies, an collaborative design grid theory and key technologies which based on grid service architecture...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.