The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For addressing the problem the society has higher and higher demands of government constitution and management of mid-and-long term macro-planning. The five-year planning MIS research on medium-small city based on GIS are established based on Visual Basic6.0 and components of GIS software-MapX, making the management of general planning realize digitization, data indicator become standardization, results...
In This paper, It is suggested to construct a WLAN security protocol model using Petri net. The Petri net is used to model generation process of WEP KEY of WLAN standard 802.11 series, by which the protocol is tested. Leaks are found in this wireless communication protocol, which facilitates the improvement of this protocol.
This paper designs a Hyperlipemia Information Analysis System, which can realize hyperlipemia document classification and information analysis. In document indexing, we propose an improved approach, called Term Frequency, Inverted Document Frequency and Inverted Entropy (TFIDFIE), to compute term weights in document indexing. In addition, an improved immune algorithm proposed by us is used in this...
Based on the qualitative analysis and research of implementing Reduce Vertical Separation Minimum (RVSM) to enhance the flight capacity in RVSM airspace all over the world, using systemic approaches that combine the qualitative analysis with ration analysis, this paper introduced mathematic description and neural network model of the air traffic issue in RVSM airspace. The mathematic description is...
With frequently network attacks, network security products are practically impossible to guard against the intrusion methods. A model of online attack detection for computer forensics is proposed to collect crime evidence of attack. In this model, an algorithm of association rules mining is used to mine the association rules of attack event and build the attack signature database. After gaining network...
The function of the new bearings with RFID card is introduced in this paper, five models of the new bearings with different size of RFID cards are set up by use of Pro/ENGINEER with good visualization, the finite element analysis of the new bearings are studied by use of Pro/MECHANICA, by comparision with five plans, the best plan is chosen. This practical project is helpful to study the virtue modeling...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.