The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Program slicing provides a new way to software maintenance, program understanding. It can give the programmer the statements only relevant to the computation of a given function. It can transform a large program into a smaller one. A program slicing respected with a point of interest is not only relevant on the variables which are defined or used by the interesting point, but also relevant on the...
This paper analyzes the inflexibility of video data collection for current 3G video phones. A solution for adaptive video data collection is proposed. The solution proposed in this work mainly consists of software components, according to which hardware needs to be selected. It also gives the video phone terminal structure, block diagram for H.324M video phone terminal, the main software functional...
This paper, from the LAN Monitor concept, presents LAN Monitor of traditional non-switched networks monitoring as well as the effective solution for switched networks monitoring in terms of ARP spoofing and propose several effective approaches for these two kinds of cases at the same time.
Software maintainability is one important aspect in the evaluation of software evolution of a software product. Due to the complexity of tracking maintenance behaviors, it is difficult to accurately predict the cost and risk of maintenance after delivery of software products. In an attempt to address this issue quantitatively, software maintainability is viewed as an inevitable evolution process driven...
The purpose of this design is to design and produce an amplitude-frequency balanced power amplifier. It is controlled by attenuation-frequency characteristics of the cosine type equalizer, making it compensate for unbalanced system attenuation-frequency characteristics amplitude-frequency characteristic. Finally, a flat curve is obtained.
In this paper, it had predominantly discussed swing-type feeding mechanism for design of the model by MathCAD software, and takes it as the example typically; it also focused on contemporary international research on the swing-type feeding mechanism, contributing original views on the scope of its analytical procedure. By the kinetics standpoint it had built up a position expression type of the link...
In order to change the non-intelligent hospital transfusion system, a design of intelligent high performance infusion devices based on AT89C52 Microcontroller is introduced. AT89C52 controlled stepper motors, and input and display capabilities of interface were achieved by 8279, two LED used as alarm display (bottle / blocking and over speed / leakage alarm) when an error occurs in the system. Besides,...
In recent decades, the buffer overflow has been a source of many serious security issues. In recent years, by the CERT/CC (Computer Emergency Response Term/Coordination Center) issued advice on the buffer overflow vulnerability for more than accounted for 56.76%. Attack based on the buffer overflow loophole has brought serious harm to computer network. How to effectively eliminate attack based on...
Within the software industry software piracy is a great concern. In this article, this issue is addressed through a prevention technique called software watermarking. The watermarking schema can be used for protecting the software written in jME API. A program is marked by hiding the copyright in a scene graph. According to a secret initial order of scene graph traversal, a secret message is embedded...
With the popularization of information technology, enterprise information construction is the only way for the development of enterprises in modern times. Based on the following five aspects: the shortage of funds, low management level, the shortage of talent, the divorced between information technology products and business needs, imperfect laws and regulations and so on, this paper pointed out the...
This research using the technologies of the network communication, data encryption and H.264 video coding and decoding, studies and develops a real-time video conference system with self-adaptive network bandwidth. The advantages of it contain three aspects: designing a method of balancing each node's network bandwidth, in the environment of the Wide Area Network; improving the concrete realization...
Various network security technologies have emerged to effectively defend electronic commerce websites from the increasing threats of hackers. They include the IDS-based honey-pot technology for active defense against intrusion, software and hardware firewall technologies and several other technological applications. In comparison with the firewall technology which has been widely applied, honey-pot...
This paper analyzes the causes leading to call drop for 3G video phones. A solution for reducing the call drop is proposed. The solution proposed in this work mainly consists of software components, according to which hardware needs to be selected. It also gives the video phone terminal structure, block diagram for H.324M video phone terminal, the main software functional blocks and the algorithm...
The relay based on embedded microprocessor is very suitable to controlling requirement for a lot of low voltage electromotors in 380V distribution system because it is low consumption, small size, high integration and low cost. Combining with the requirement of low voltage electromotor protection in the field, the paper proposes the designed and implemented scheme of protective relay based on embedded...
CodeTEST could be connected to target system with bus or 16-Channel Pod. As common connection of 16-Channel Pod, it is agility, but complexity also. This paper provides about how to use 16-Channel Pod on system of ARM. The interface is designed to be easy to implement, minimize required signals and minimize board space. The hardware assistant instrumentation tags are inserted into source code during...
Aimed at the large amount of test cases in handset's software testing and tremendous manual work, this paper adopted orthogonal experiment to generate test cases after comparing three algorithms which are genetic algorithm, formal specification and orthogonal experiment. By constructing the experiment and analysing their difficulties, maneuverability, coverage rate and rigour, etc, it is concluded...
A new energy-saving type of air supply system named multi-fan air supply system for textile workshop is proposed in authors' preliminary work. There are four factors which effect greatest and are concerned by most designer and operators. These factors are: width of the main air duct, distance between two exports, entrance velocity, relative pressure of export 2. Combined with engineering practice,...
A new energy-saving type of air-conditioning named large and small zone ventilation for loom workshop is proposed and researched by four factors and three levels method in authors' preliminary work. There are four factors which effect greatest large and small zone ventilation and are concerned by most designer and operators. Combined with engineering practice, each factor of this new energy-saving...
Currently, many educators lack the understanding about virtual reality (VR) network platform, and the application of virtual reality network platform in education is not mature enough. In view of the foregoing, this article first introduces the current research situation of web3d-based VR network platform, next introduces two currently quite popular web3d virtual reality network platforms, and then...
The airplane fire alarm system is a piece of the most important equipment influencing the flight security. Due to the factors of design and working condition, the reliability of the system is poor, especially the high rate of false alarm. So the test equipment of airplane fire alarm system, an intelligent synthesis test system allowing multiple parameters and digital data acquisition, is developed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.