The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article explores A Case study of Instructional Design Based on Blended Learning. Based on the analysis of the state of blended learning research, the instructional design theory based on blended learning, we present a blended learning model and the CAD course blended learning activity organizational strategies; then, we used the model and strategies into instructional practice. The result shown...
As the convergence between telephony systems and data systems at all levels of the stack, provision of hybrid services that span multiple networks have attracted much more attentions from both academic and industry communities. The Internet of Things (IoT) is a novel paradigm that is rapidly gaining ground which needs to pay special attention to. In this paper, we present the Flexible Hybrid Service...
In this paper, we propose the enterprise service bus based hybrid services execution platform for coordinating existing Telecom services and IT services. Especially, we encapsulated the event-driven Telecom service engine as a service engine to be integrated into enterprise service bus seamlessly, and focus on the design and implementation for the messages dispatching, messages mapping, lifecycle...
Network security is becoming an increasingly important issue, since the rapid development of the Internet. Network Intrusion Detection System (IDS), as the main security defending technique, is widely used against such malicious attacks. Data mining and machine learning technology has been extensively applied in network intrusion detection and prevention systems by discovering user behavior patterns...
Chinese self-guided tourism E-commerce platform is on the initial stage now. Not only the scale is small, and the function is also limited which only can publish some travel information, advertising to attract internet users, but also the operation mode is not mature enough. In addition, the function and service provided by self-guided e-commerce platform can never meet the requirement of self-tourists...
In this paper, aimed at the wired network bottlenecks, for example: the unattended field sites such as the mining areas, lakes, pipeline and oil production which are not fit to set up the wired networks, it makes the most of the motion detection alarms of photoelectric, microwave and infrared fields in video as the composite alarm detection sources and on-line monitors the outdoor involving prohibited...
C/S structure and B/S structure are analyzed respectively, with the combination of watershed hydrological model and new technologies such as ASP.NET, WebGIS and database connection, a real-time flood forecasting system in 3-layer B/S mode is developed. Based on B/S mode, the system realizes the functions like query, maintenance and display of remote information, real-time flood forecasting, correction...
To do some work in the blank field of Internetware trustworthiness, this paper designs Trustworthiness Metrics Model (NCTMM) with algorithm. In NCTMM, the trustworthiness metrics of Internetware is firstly decomposed to the trustworthiness metrics of component and the trustworthiness metrics of node, and then the trustworthiness degree of Internetware is figured out by integrating the trustworthiness...
The development and progress of ICT in the recent two decades has brought great changes to the whole world. Nowadays, ICT is being applied abroad, typically applied on Internet. As for consumerpsilas behavior, e-shopping is common. This research does an analysis in the factors on traditional shopping (in-store shopping) and e-shopping by SEM Models. Also, this research analyses the causes of e-shopping...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.