The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fault-tolerance is an important research topic in the study of distributed systems. To counter the influence of faulty components, it is essential to reach a common agreement in the presence of faults before performing certain tasks. However, the agreement problem is fundamental to fault-tolerant distributed systems. In previous studies, protocols dealing with the agreement problem have focused on...
Using streaming media technology can effectively break the bandwidth bottleneck and make video/audio streaming over Internet smoothly. Based on the campus network facility and multimedia network classroom, this article use streaming media technology to form a network of teaching, analysis of the streaming media architecture, give a description of the system to connected and technical points, and make...
To follow the technology advancement and satisfy the needs on the RTI software in the “Cloud computing” age, a scheme of remodeling the traditional RTI software to be with “Platform as a Service (PaaS)” architecture was proposed. Software construction, sub-component functions and the method of interacting based on the remodeled RTI software on the WAN were studied. The focus was scheduling computing...
Virtual instrument technology and network technology combined, and building networked virtual instrument test System is the important development in today's3 society. In this paper, aiming at remote virtual instrument control by the data socket way using in the Lab view. Users can easily operate the remote virtual instrument by the release capacity of remote panel.
One-Time-Password authentication is a simple, little cost and more efficient technology. Access control is another mechanism by controlling access which is legal or not. These two are separate. To get high safety and reduce the complexity of operating, this paper proposes a new integrated scheme base on them. It has some important merits include:(1)there is no verification table;(2)users can freely...
An efficient and stable cluster system would be proposed in this paper for the load balancing of servers. It bases on the improved load balancing algorithm. The cluster system uses load parameter information including CPU utilization, memory utilization, I/O utilization and network traffic to decide the load of each child node. And it adds a redundant node to collect the load balancing parameters...
To improve the intelligent reconstruction ability of manufacturing system, and quicken the development and manufacture of the products, a networked manufacturing oriented integrated control model is proposed based on the deeply analysis of networked integrated control for enterprise. The inside and outside integrated control of the enterprise is implemented by Common Object Request Broker Architecture...
This paper shows a new DNS attack that hijacks DNS requests by frequently injecting fake DNS server, and then network systems communicate with wrong destinations. This type of attack is detectable by neither the IDS nor any anti spoofing software.
Due to technological advances of handheld computing and communication devices, Mobile commerce (M-commerce) has emerged and attracted a growing number of research efforts. M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. In this paper, we discuss some...
Cloud Computing is a paradigm in which data, applications or software are accessed over a network. This network of servers is called as “Cloud”. Using a client such as desktops, entertainment centers, tablet computers, notebooks, wall computers, handhelds etc, users can reach into the cloud for resources as they need them. Cloud computing is on-demand access to virtualized IT resources that are housed...
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance of an IT risk management framework is one of the critical and challenging tasks of modern corporate enterprise risk management. The existence of a risk assessment tool allows for effective...
The development of cloud storage services makes companies who outsourced their data to cloud storage server can't control their data by themselves as before. Then comes the security issues, especially the privacy preserving has become an more important security problem. The users always search their documents through keyword in plaintext, which may leak privacy of users in cloud storage environment...
The existing access control environment relies on the server to solve security problems. The current environment has spawned the need for light-weight access control by clients, which have a resource limited environment. In this paper, an adaptable light-weight access control scheme is proposed for an evolutionary computing environment. Existing studies using role-based prime number labeling are limited...
To run any application we need to first download the setup file/s and then install it on the system License costs, download and installation time costs are very high. Economically, this limits the number of applications that can be accessed on a system. In an organization, the challenges include installing the same application on multiple computers, accommodating multiple versions of the same application...
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server...
Based on the analysis of the basic principles and performance requirements of embedded monitoring system, combining with embedded technology, image compression technology and network technology, this paper designs and implements an ARM-based embedded network video monitoring system to achieve video image acquisition, compression and transmission. This system is a small, low cost, digital monitoring...
This paper describes the Web data mining technology, Web data mining process, data sources and uses, designs a personalized recommendation system based on Web use mining for e-commerce, and discusses in detail the function of each module of the system and implementation techniques. Through the mining of the historical log data of Web server, the system can access to the user browsing patterns to provide...
Last few decades has brought many fundamental changes to data communications and the Internet. Internet has its roots in a networking project started by ARPA which consisted of four computers. Now the Internet spans the However transition to the new version has been remarkably slow. Thus in the interim, various transition mechanisms can be employed. In this paper two such mechanisms, namely configured...
Part of the role of universities is, today as from their earlier times, to prepare students for a productive role in the society. In this context, the role of curriculum development is to ensure that students are able-if so they wish-to acquire skills that are in demand in the work market. This is of uttermost importance in areas as IT where weak choices by students and/or universities might have...
Cloud computing, a new thing which is only three years old, becomes the most fashionable technology and developing trend in IT industry now. People say “X as a service” in the cloud computing, which means that everything including software and hardware can be taken as a service for consumers in the cloud. Meanwhile, a high quality multimedia conferencing has been an urgent requirement these years...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.