The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Java Code Hierarchical Visualization Tool (JCHVT) is a software visualization system oriented to Java source code, which has been designed on the concept of service and with reference to Class diagram and Polymetric view. JCHVT is able to automatically create a hierarchical view of the software system, which can reflect the relationships among classes, structure of the system and even the roles of...
A long-running Web software system may lead to the exhaustion of resources, which cause performance degradation. To solve that problem, needs to predict the crucial resources using situation, and then carry out the proper software rejuvenation strategies. At first, this paper identify the average load chaotic character which can be described by using G-P algorithm to analyze correlation dimension...
Meta search engine which can provide rich information is obviously an ideal source of answers to many types of questions. This paper describes a question answering system based on web, and puts forward to a new method to search information based on Meta search engine and new word discovery. In the information retrieval module, N-gram model and web pages which get from search engine are used to find...
It is well known that virtual private network (VPN) and intrusion prevention system (IPS) are all important network security schemes. Traditionally, both VPN and IPS need a clear network margin. However, now the rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. It is a noteworthy problem how to display wireless IPS (WIPS). Because...
This article clusters analysis the learning features of network education learners, by using a clustering algorithm based on rough set. It falls the learning features of the learners into several categories and establishes learners model library, offering teachers and web-based teaching platform designers to make decision and refer, to make them be able to develop relevant teaching strategies, improve...
In the competitive electricity market, large power customers who consume a large quantity of electricity through the behaviors of malicious arrears of electricity fee and evasion of electricity will seriously affect the normal operation of electricity supply enterprises. Therefore, a trust evaluation model based on the specific characteristics index system of evaluation object' operating environment...
In the open environment of the Internet, E-commerce developes fast. How to transfer data securely and efficient is the key to the development of E-commerce. This paper analyses the security technology and proposes the security model based on PKI and digital signature.
This article redesigns appraising index and improves its model, since current c2c business credit evaluation index and evaluation model are single standard and easy to calculate. Buyers evaluate sellers on information veracity, production quality, service satisfaction and goods delivery. In order to attract buyers to participate in the evaluation, sellers will set incentive mechanism and evaluation...
Grid partition of geometry model in finite element analysis results in massive redundant geometry points, comprising of point cloud, which is tend to be rendered in various aspects to analyze result in the post-processing. In order to deal with point cloud in real-time application, a novel algorithm is presented to simplify the redundant data and reconstruct the surface of geometry model from point...
It is important to ensure the reliability of Web applications at early design phase. Model checking is a viable method to achieve this goal. In this paper, we analyze the interaction between the Web application and browser and propose a method to formal modeling and verify Web application navigation model with session mechanism. We use UML sequence diagram to express the interaction between user and...
Our goal in this paper is to develop a novel 2d human pose discrimination algorithm. With the speedy development in visual monitoring and internet, many images are needed to be coped with so that we can recognize the human poses that should be filtered or tracked. In this paper, we propose a novel human pose discrimination algorithm, in which three steps are utilized to access this goal, (1) finding...
WLAN facilitates the convenience of the Internet environment to the users, the attendant security issues have also become the focus of attention. This paper review WLAN security situation. Then analysis the existence of WLAN security and the use of security technology. Put forward a third-party certification agencies assisting in the implementation of PKI authentication, realize authentication server...
Netlogo is a simulation tool based on Complex Adapt System, now it is used for lots of areas. This thesis uses the modeling thought from bottom to top, and discusses several key techniques based on Netlogo, then points out the real meaning for the army operation simulation, hopes to research a new idea for Muti-Agent modeling of battlefield.
As the development of the Internet and the increment of the bandwidth, large-scale video transmission on the IP network is getting further development and application. Especially, the application of the broadcasting system based on single sender but multiple receivers are applied widely. Therefore, the multimedia data transmission is becoming one of the most important aspects in the broadcasting system...
In the paper, an epidemic model with nonlinear infectivity on networks is studied. We derive the basic reproduction number R0 dependent on different parameters. The model exhibits the unique endemic equilibrium if R0 > 1. Furthermore, we analyze the stability of the disease-free equilibrium and the endemic equilibrium.
With the widespread of Internet, e-commerce has become a major mode for business. And the key problem that restricts the development of e-commerce's development is the security problem. In terms of this problem, this paper makes an analysis on the security problems faced by the e-commerce and puts forward the security requirements on e-commerce. Finally, the paper also deals with the construction...
Based on the technology of Linux Virtual Server, the load balancing system could solve server bottleneck problems which were brought by the development and application of Internet, network of geometric growth of subscribers and network flow. WLC scheduling algorithm is often adopted, and is a good effect. This paper puts forward a kind of optimization methods based on server performance calculating...
This paper reviews the Internet of Things and its integral part of the structure based on RFID technology and discusses the status of their application. For the quality control problem in the coal transportation, an idea of using the RFID technology in coal quality monitoring and tracking system has been put forward. The paper also discusses the application framework.
The e-commerce training for new generation of migrant workers, not only can improve the employability of the new generation of migrant workers, but also promote the development of rural e-commerce. This paper attempts to make programs on the implementation of e-business training, and propose solutions on training obstacles.
Teaching management information system is a very important tool and basis of the teaching management work and has been widely used in the educational institutions. According to the practice and the requirement of the management reform, an efficient and standard teaching management information system is needed which can be used by multi-users safely through the network, and the data must be complete...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.