The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper describes a idea of the new E-Commerce network framework and its implementation in virtue of the platform composed of Hot-Standby Two-Node-Cluster, Virtual Server, and related software. This research focuses on how to enhance the security of data storage, processing, transmission and exchange.
In this paper, the necessity and importance of information security are introduced. After this, measures of information security often used are analyzed, and their advantages and disadvantages are discussed. On this base, the viewpoint that operating system is standardized and soft ware is interpreted by it, and this measure is sure to hide operating system's details from software, protect operating...
The current privacy-preserving researches focus on the privacy release control method. However, the current release control methods only consider the protection of privacy without taking the usability of privacy into account. In this paper, a release method based on game theory is proposed to ensure both the protection and the usability of privacy.
If there is no effective data management and analysis, the great growing mass of data in the Web will become "data grave". This paper analyzes the importance of Web log mining in the E-Marketing, expounds the usual algorithms of the Web log mining and its applications in E-marking, and finally gives the method to realize personalized recommendation. It points out the great commercial value...
How to effectively filter out vulgar network cultural products is something we must address the issue with the increasing of all kinds of bad information on the internet. The rise of evolutionary game theory is a theory combining together with the game theory analysis and dynamic analysis of the evolution process. For the effective implementation of incentive policy to prevent bad information, this...
E-commerce taxation is a big issue to be solved since the rapid development of e-commerce in China. To get a good performance of e-commerce taxation transaction, grid computing technology is applied to the architecture of E-commerce taxation system. The architecture of E-commerce taxation system is proposed, and basic workflows of this architecture are discussed in this paper.
The research on secure and efficient implementation method of secret sharing has been a hotspot in the field of information security and cryptography. Based on homogeneous linear recursion, we construct two new verifiable multi-secret sharing schemes. In our schemes, all participants themselves select their shares, so the calculation amount of dealer is reduced and secure channel between the dealer...
Multi-level verification is important means in dam construction monitoring. But there are some flaws in traditional multi-level verification such as omission and delay, which strongly impact real-time feedback control. We develop a multi-level verification system on PDA platform after investigation into its demanding characteristics. It is based on Server/Client mode; contains dispatch workflow; and...
With the rapid development of air industry in China, the cost of air carrier delay is a serious and increasing problem. This article analyzes the reasons for irregular flights and the structure of airline operating costs. Based on the available airlines' financial information, a model has been built to estimate the cost of delay, and the estimated cost of irregular flights for five listed Airlines...
A novel software watermarking algorithm SCC (Selected Color Change) based on register allocation is proposed in this paper. The intermediate code when the program is compiled can be used to construct the interfere graph G (V, E). Each vertex in this interfere graph is corresponding with the binary sequence of watermarking message in turns. Then the watermarking is embedded by changing the colors of...
Intrusion detection system is of most importance to network security. Support Vector Machine (SVM) is algorithm about how to solve machine learning problems under circumstance of small sample. The paper respectively applies SVM based on least square and least-square SVM improved by greedy algorithm to intrusion detection, and does simulation experiment on intrusions detection data. Experiment result...
The following topics are dealt with:software watermarking algorithm; register allocation; fuzzy principal component analysis; gait recognition; intrusion detection; BIBD code; anticollision fingerprint; artificial neural network; information hiding algorithm; color image; logistics distribution simulation; Web mining; support vector machines; pseudo random sequence; DS-CDMA signals; fuzzy set theory;...
Compared to traditional service, the characteristics of the customer behavior in electronic service are personalized demand, convenient consumed circumstance and perceptual consumer behavior. Therefore, customer behavior is an important factor to facilitate online electronic service. The purpose of this study is to explore the key success factors affecting customer purchase intention of electronic...
The relationship between economic growth and energy consumption is one of the hot topics in economic research. Many literatures concern about the energy price effects on economic growth after the oil crisis. Along with the surfacing of problems such as environment pollution and energy shortage in 21 century, the focus of research has turned to the causality between economic growth and energy consumption...
Along with the development of electronic information technology, electronic ecommerce grows rapidly. The evaluation of customer value of B2C electronic commerce companies is a multiple-criteria decision making (MCDM) problem with many quantitative and qualitative attributes. This paper proposes a fuzzy analytical hierarchy process (FAHP) approach to evaluate the customer value of B2C electronic commerce...
Web service composition is a promising solution for building distributed applications on the e-business processes, and with web services providing similar functional characteristics, Quality of Service (QoS) is the main factor to differentiate them. It is imperative to provide service consumers with facilities for selecting the only web services for their requirement according to their non-functional...
Semantic Similarity Calculation (SSC) is main factor to affect accuracy on Web Services Discovery. Based on recent researches and requirements for nearness of user request and effective response of algorithm, the essay introduces Web Services Similarity Calculation Framework (WS-SCF) The framework extracts semantic information of traditional Web Services and integrates SSC algorithm to product semantic...
Take the forward reasoning algorithm as an example, this paper describes how to design a distributed algorithm with WEB service technology. Based on message passing programming model, the partitioning, communication and the task-scheduling of distributed algorithm are discussed. Finally, the distributed algorithm has been implemented with .NET platform, and tested by the parallel performance measures,...
The paper introduces a new model dedicated to blend the information resources inside and outside an enterprise system, and an integration strategy of E-commerce and ERP has been discussed. The authors describe how to integrate them with the SSH framework at three different levels: conceptual integration, business integration and physical integration. The integrated "E-ERP" system could help...
Gait recognition is a relatively new biometric identification technology for human identification, surveillance and other applications. A novel gait recognition algorithm based on fuzzy principal component analysis (FPCA) for gait energy image(GEI) is proposed. Firstly, the original gait sequence is preprocessed and gait energy image is obtained. Secondly, the eigenvalues and eigenvectors are extracted...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.