The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
E-commerce has obtained fast development as a new commercial model in recent years. There is a big difference between E-commerce and traditional commerce. On the contrary, physical distribution as an essential part of E-commerce, has becomes more important. In this paper we analyze relationship between e-commerce and physical distribution, and the distribution problems of B2C is discussed according...
In 2009 China Enterprise Informatization composite index 40.46, China's overall informatization companies in the lower-middle maturity state. At present, most Chinese enterprises are in the transition period which means from the informatization critical application phase to the expansion of integration and optimization phase. The transition period is the critical period of the improvement of the maturity...
With the high-speed development of C2C Electronic Business, The issue of trust among the transactions is rapidly following up, and Credit Evaluation System needs improvement as soon as possible. This paper makes a further study on the existing credit evaluation methods and submits a new credit evaluation model. The new model optimizes the credit evaluation grade, cracks down speculation on the credit...
With the popularization of information technology, enterprise information construction is the only way for the development of enterprises in modern times. Based on the following five aspects: the shortage of funds, low management level, the shortage of talent, the divorced between information technology products and business needs, imperfect laws and regulations and so on, this paper pointed out the...
To deal with problems such as high transaction costs, long transaction process and irrational resource collocation on textile industry, a "one-stop" E-commerce model on textile industry was put forward. Through integration and consolidation of supply chain resources, it provided services to manufacturers, raw material suppliers, distributors and consumers with a uniform and exoteric manner...
Multi-sensor data fusion theory and methods have been widely applied to many fields. Multi-sensor data fusion and information redundancy technology are adopted to achieve target characters synthetically judgment.. The basic concept of multi-sensor data fusion is given. Identifying characteristics of high-speed moving targets and key technical problems of multi-sensor fusion are discussed. Recognition...
My paper accomplishes the problem of recognizing the license plate number from the license plate image with a simple and fast method in order to resolve the problem that is too complicated and high cost in recognizing license plate number of Intelligent Transportation System. This paper extracts the license plate image from rows and lines with the method of counting color pixels. We use the method...
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper proposed a new secret sharing scheme. In the scheme, the participants themselves select the private keys, which can avoid the distributor's fraud and reduce the distribution's burden...
Based on the shortcomings of WCF scheme, this paper proposed an improved forward-secure proxy signature scheme. The new scheme does not evolve the authorized keys, but the proxy signer's private key, making it have the forward security. Even if the proxy signer's signature key at a certain time segment is given away, the attacker could not get the proxy signer's signature key in the previous time...
The paper aims at the research of network interface, document interface, such as control, mobile phone key event, capturing and processing changes in the state of network in the process of accessing the network based on the BREW platform for mobile phones, as well as the meteorological information system which is developed by Microsoft Visual C++ 6.0. The main function of the system is to read the...
According to the dynamic model of magnetic suspension control systems, H∞ optimizing control algorithm is used in the design of the controller for reducing order in the paper. And then the controller is designed with a DSP as the main core and a MCU as the assistant. Results of experiments show the validity and practicability of the method proposed.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.