The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing, a new thing which is only three years old, becomes the most fashionable technology and developing trend in IT industry now. People say “X as a service” in the cloud computing, which means that everything including software and hardware can be taken as a service for consumers in the cloud. Meanwhile, a high quality multimedia conferencing has been an urgent requirement these years...
The existing access control environment relies on the server to solve security problems. The current environment has spawned the need for light-weight access control by clients, which have a resource limited environment. In this paper, an adaptable light-weight access control scheme is proposed for an evolutionary computing environment. Existing studies using role-based prime number labeling are limited...
Part of the role of universities is, today as from their earlier times, to prepare students for a productive role in the society. In this context, the role of curriculum development is to ensure that students are able-if so they wish-to acquire skills that are in demand in the work market. This is of uttermost importance in areas as IT where weak choices by students and/or universities might have...
With the popularity of smart phones, GPS is used more and more in the cell phone. The location information in the GPS is very significant for evidence-gaining. This paper researched and realized the operations under Symbian OS such as GPS-related applications. Firstly I introduced the concept of GPS and GPS-related knowledge in the mobile phone. Secondly I programmed cell phone GPS detection and extracted...
A Bluetooth embedded service model is introduced towards the floating population. The system is composed of smart phones, Bluetooth wireless server and background equipments. The system functions and workflow are elaborated focusing on the analysis of the core system equipments - Bluetooth server. The hardware design based on the 32bits ARM microprocessor XScale and the CSR BlueCore4 module is discussed...
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server...
Through the research of the existing security mechanisms and security technologies, combined with the actual security requirements of Web communications, this paper proposes a Web services security communication model. The model not only can meet the basic requirements for secure communications, and can achieve better results in the Web service application with higher security requirements. Compared...
An efficient and stable cluster system would be proposed in this paper for the load balancing of servers. It bases on the improved load balancing algorithm. The cluster system uses load parameter information including CPU utilization, memory utilization, I/O utilization and network traffic to decide the load of each child node. And it adds a redundant node to collect the load balancing parameters...
Fault-tolerance is an important research topic in the study of distributed systems. To counter the influence of faulty components, it is essential to reach a common agreement in the presence of faults before performing certain tasks. However, the agreement problem is fundamental to fault-tolerant distributed systems. In previous studies, protocols dealing with the agreement problem have focused on...
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance of an IT risk management framework is one of the critical and challenging tasks of modern corporate enterprise risk management. The existence of a risk assessment tool allows for effective...
Computer-based college English test is one of the important ingredients in the reform of college English teaching and learning in China, which is based on communicative testing theories and represents the future trend of college English tests. This paper systematically studies the computer-based college English test, compares it with the traditional paper-and-pencil-based test, finding out its advantages...
Virtual instrument technology and network technology combined, and building networked virtual instrument test System is the important development in today's3 society. In this paper, aiming at remote virtual instrument control by the data socket way using in the Lab view. Users can easily operate the remote virtual instrument by the release capacity of remote panel.
At present, there exists attendance difficulty in universities in our country, which has relied on teachers' supervision of students. It cannot solve the problem completely, and wastes much lesson time of teachers. The subject uses the relatively mature technology to solve this problem, that is, uses RFID and digital image processing technology to track students, collect and compare the data information...
Due to technological advances of handheld computing and communication devices, Mobile commerce (M-commerce) has emerged and attracted a growing number of research efforts. M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. In this paper, we discuss some...
A solution is urgently expected to meet the higher-quality web service requirements of various applications on the limited bandwidth of internet. This paper presents a new scheme of load balance of web cluster servers, making possible the service of the two-class priority station polling system under the mixed policy of exhaustive and gated services, optimizing the services of the system in time of...
In order to transmit the coal mine multi-service in the unified platform, the status and development of the coal mine multi-service system for monitoring are researched. According to the different service requirements in coal mine, the model of the coal mine multi-service based on soft-switch is proposed; the Architecture of the coal mine multi-service based on soft-switch is designed. In the platform,...
To follow the technology advancement and satisfy the needs on the RTI software in the “Cloud computing” age, a scheme of remodeling the traditional RTI software to be with “Platform as a Service (PaaS)” architecture was proposed. Software construction, sub-component functions and the method of interacting based on the remodeled RTI software on the WAN were studied. The focus was scheduling computing...
One-Time-Password authentication is a simple, little cost and more efficient technology. Access control is another mechanism by controlling access which is legal or not. These two are separate. To get high safety and reduce the complexity of operating, this paper proposes a new integrated scheme base on them. It has some important merits include:(1)there is no verification table;(2)users can freely...
The development of cloud storage services makes companies who outsourced their data to cloud storage server can't control their data by themselves as before. Then comes the security issues, especially the privacy preserving has become an more important security problem. The users always search their documents through keyword in plaintext, which may leak privacy of users in cloud storage environment...
This paper designs and implements an automatic network system utilizing UPnP, wireless network and power line carrier technology. We connect home media device and home gateway device via wireless network to build media service subsystem, and connect home applications and home gateway via power line carrier network to make power control subsystem. Then we convert both subsystems into UPnP virtual devices,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.