The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The rapid development of the Internet has brought great convenience to users, but it also brought a lot of troubles to the users' information privacy exposure. This study selects the basic information of 300 users on FACEBOOK social media to cluster analysis. The data sets of users are divided into five groups by experiment, and the clustering results are classified and then discussed. By the analysis...
Nowadays industrial control devices are crucial for infrastructure-critical systems such as factories, power plants, and water treatment facilities. Devices with IP addresses are visible on the Internet and they connect cyber space and physical world. The first step in protecting devices from attackers is a deep understanding of the devices' characteristics in the cyber space. In this paper, we take...
Recent years have seen a rapid growth of location-aware applications such as targeted marketing, restricted content delivery and location-based security check. Although existing delay-based IP geolocation techniques work well in some developed countries, the assumption of a strong delay-distance correlation that they often rely on may fail in many developing countries for poor network connectivity...
Velo is a reusable, domain-independent knowledge-management infrastructure for modeling and simulation. Velo leverages, integrates, and extends Web-based open source collaborative and data-management technologies to create a scalable and flexible core platform tailored to specific scientific domains. As the examples here describe, Velo has been used in both the carbon sequestration and climate modeling...
In order to promote to share resource of Agricultural Information Courses (AIC) for our school master's network education, ensure teaching quality and improve the construction level of the network courses; we have developed a teaching demonstration system. This teaching platform can reform the traditional agricultural informatization instruction, and improve the teaching and research activities of...
With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart Meter, public security, intelligent building and so on. Because of its huge market prospects, Internet of Things has been paid close attention by several governments all over the world, which is regarded as the third wave...
With the development of Internet, the increasing volume of information posted on micro-blogging sites like Twitter necessitates the need for efficient information filtering. In conventional text classification problems, it is assumed that the feature vectors extracted from the available documents are sufficient to learn good classifiers. However, this conventional approach is not likely to work for...
With competition between commercial banks getting fiercer, exploring and expanding retail banking business has inevitably become one important choice for banks to increase competency. But traditional way of providing retail services greatly constraints the expansion of business and is not conducive to the increase of customer satisfaction. Therefore, trying to seek a new way to serve retail customers...
Since the late 1990s, numerous governments have made huge investments in electronic government services. The rise of these services has led to a concurrent need to develop models of customer satisfaction of e-government services. This study aims to establish an e-government customer satisfaction measurement model from the behavioral perspectives of users. Based on the Technology Acceptance Model (TAM)...
Compared to traditional service, the characteristics of the customer behavior in electronic service are personalized demand, convenient consumed circumstance and perceptual consumer behavior. Therefore, customer behavior is an important factor to facilitate online electronic service. The purpose of this study is to explore the key success factors affecting customer purchase intention of electronic...
A large number of illegal and harmful content carried over the Internet could adversely affect the national cultural security, the people's view on living and the teenager's healthy growth, and must be supervised effectively. Researching and developing the Internet content rating implementation system is one of the feasible means to accomplish Internet content rating, monitoring and filtering. Firstly,...
A traditional CRM stores all information about its customers in a database and uses this data to coordinate sales, marketing, and customer service. Obviously, this exclusive data is not enough and has less credibility for today's business transactions. As the internet grows very fast, we can obtain more information from the internet. In this paper, we propose a novel scheme that enables the exclusive...
With Web service technology widely accepted, Web service has become the standard of resources package in the Internet. The approach of exchanging information and transaction is also from a single device to the collaboration in the worldwide network. To face the challenges posed by today??s changing and uncertain business environment, traditional business system integration approaches are not sufficient...
The evolution of the Web 2.0 phenomenon provides a possible adoption of the RESTful services in reengineering web service. REST components concern the current or intended state of that resource with further transferring among components. A resource can have multiple representations. Itpsilas impossible to predetermine all possible representation of a resource during design of a system while it is...
Currently transferring streaming media over Internet has become a hot research topic. But much more attentions are paid on applications of RTSP rather than its security. With the rapid development of RTSP applications, the security issues will become a bottleneck in the future. In this paper, we detailed analyze the attacks against RTSP, such as malicious eavesdropping /modifying /terminating stream...
Publishing and delivering traffic information generally depend on message board and public radio service in China, which usually sends out static information without dynamic interaction between the services and the users. With the development of WebGIS and its successful application, it is possible to introduce the Web-based multiple architecture into the traffic information system. Currently, most...
This paper describes a new version of the DEN-ng context model, and how this model in conjunction with the DEN-ng policy model can be used for more effective and flexible context management for autonomic networking. Both are part of the FOCALE autonomic network architecture. Context selects policies, which select roles that can be used, which in turn define allowed functionality for that particular...
Link analysis has shown great potential in Web structure mining. Most existing link analysis methods treat a Web page as a node, a hyperlink as an edge in the Web graph. However, in reality, a Web page's importance is also affected by its semantic factor, the structure of WWW, and other factors. Therefore, traditional link analysis methods may not be so precise in reality. It is observed that the...
Based on the stress reaction model, this paper analyzes the start mechanism. The methods include: 1) taking the inhibition chain in the model as the flexible resource. When intruded, it can be used to scan for the reply plan; 2) when finding the programming solution, and starting a reply plan, it can be used to inhibit the system's excessive reaction. Therefore, it extremely utilizes the limited resource,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.