The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Grid and peer-to-peer technology are widely applied to file sharing system. P2P overlay network topology and search algorithm have always got much attention of researchers. A mismatch between overlay and the Internet infrastructure has critical performance implications in search efficiency. We design a file sharing system named RP(k)C-Grid. It is a hybrid topology overlay network composed of two parts:...
A global frame of secure instant messaging system based on Microsoft MSN is proposed to solve the security problems that exist in instant messaging. A secure add-in is designed and integrated seamlessly into the MSN client utilizing interfaces of the MSN client. The identity based cryptography is introduced into the secure instant messaging field and thus a secure instant messaging key management...
At present, storing XML document in a relational database is a hot topic because relational databases are mature and scale well. In this paper, a novel relational database storage structure that can store XML document is proposed. An algorithm that translates XML document to relational database is given according to the proposed storing structure and algorithms that translate XPath Query to SQL Query...
With extensions to current EAP key hierarchy, the EAP re-authentication protocol provides a consistent, method-independent and low-latency re-authentication mechanism to support intra-domain handoff authentication. This paper analyzed the efficiency of the EAP re-authentication protocol, and compared it with that of the EAP-TLS protocol. The result shows that the authentication delay of EAP re-authentication...
The server cluster technology become more and more prevalent in the enterprise level applications, failure detection is one of the key technologies which can ensure the server cluster continue providing services. This paper introduced several types of the server cluster failure, and its design objects; we then analyzed the existed detection mechanisms, and get rid of the traditional detection enhancement...
In order to enhance the utilization rate of the existing magnetic resonance imaging (MRI) experiment instruments and to allocate the existing experimental resources fully and reasonably, we constructed the experiment framework with remote experiment ability for MRI imaging technology by means of the desktop magnetic resonance imaging apparatus which are developed by Shanghai Niumag Cooperation. This...
With the continuous deepening of the reform of higher education and deepening the continuous development of the educational system, the Chinese University teaching management is also faced with new challenges. The merger of a number of colleges and universities, schools, the multi-facet management and all sectors database used by the data structure are different. In light of this situation, completely...
This article introduces a design project to implement supply chain management in an ERP (enterprise resource planning) system which is using customer relationship resource management subsystem and supply and demand resource management subsystem. This project is applied to medium and small-sized enterprises. Using network technology based on Web,the integrated management of ERP??s SCM is realized,the...
How to management local area network (LAN) scientifically and effectively is an important question in remote control area. Remote Control to the computers in LAN could relieve the network administrators of some of trivial works and improve the efficiency. An intelligent, real-time controlling management system was designed and implemented. The key control functions of network communication, remote...
The issue of page??s form submission has been a troubled big problem for the software developers, and this paper through the analysis of the form submitted by several commonly used methods solves that: using the technology of Ajax for submitting form to prevent repeat submission is a good choice. The technology of Ajax achieves not only implementation the need of the problem, but also greatly improving...
In order to quickly generate secret key in low-power held-hand devices, Modadugu et al. propose two server-aided RSA key generation protocol, along with Chen et al. sequentially propose four improved protocol. However, one drawback of these protocols is they can??t resist collusion attack. In this paper, we implement a new server-aided RSA key generation protocol, which can resist collusion attack...
In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer...
In the paper, we propose phase type (PH) distribution service time working vacation scheme cyclic polling system for WDM. This system consists of multi-queues (terminals). Using the decomposition approach, each queue is analyzed as a single server queue with PH distribution service time working vacation scheme which works at a different rate rather than completely stops during the vacation polling...
The paper discussed significance of assuring pork security with traceability information system, the actual study state of traceability information system in the advancing countries of the world and the contents of pork traceability information system. In accordance with business flow of pork production in China, the paper analyzed animal identification technologies, function model of pork production,...
In this paper we present a uniform negotiation and delivery framework for TCP-based data collaboration applications over IP network. With this framework rich innovative collaboration services can be developed conveniently and provide users with novel communication experience. The framework adopts the offer/answer model with extended Session Description Protocol as session description and negotiation...
By using DTrace tools in Solaris operating system. The behavior of doors IPC which is developed by Sun Microsystems is traced. Discussing with various kinds of Solaris IPCs, this paper mainly tests the Solaris doors in IPC programming. The test results illustrates that the door IPC in OS is thread safety by using core mutual exclusive in system.
An implementation of data preprocessing system for Web usage mining and the details of algorithm for path completion are presented. After user session identification, the missing pages in user access paths are appended by using the referer-based method which is an effective solution to the problems introduced by using proxy servers and local caching. The reference length of pages in complete path...
P2P together with media streaming technology brings a new method for video service. This paper proposes a design to deploy video service on commercial systems with authentication servers. The design combines C/S charging model, and provides video contents in a P2P way. According to the address information registered on authentication servers, a media management server helps new peers to find their...
The terminal design of a data acquisition system based on GPRS is designed in this paper. It works out the hardware design of GPRS terminal equipment, including the minimum system design based on the Samsung ARM7-core microcontroller S3C44B0X, and the hardware design adding the GPRS engine MC35i produced by Siemens and RS485 interface to the minimum system. According to dial-up procedure, describes...
This article puts forward a method to access the data and analyzed results from the monitoring system of environment based on WSN with the B/S mode. It resolves the problem of low speed of page refresh with Ajax. The experiment shows that the partial refresh feature of Ajax can make it possible for the users to get access to the data and analyzed results easily through the browser, and experience...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.