The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the management of the online public opinion and Internet intelligent information, people need to obtain the content of the forum threads for further research on the topic emotion and the dissemination of forum topics. This paper presents a method based on templates to extract web forum contents. Proposed method overcomes the problem which caused by the change of the web pages structures and contents,...
Now that Distributed Denial-of-Service (DDoS) attack is one of the most serious network security threats, it becomes particularly important to detect it. In this paper, the author presents a method of mathematical analysis SYN Flooding attack detection. We can use this method to detect SYN Flooding attacks. With it, we can detect these attacks more timely.
New document formats (such as OOXML, XPS, ePub, etc.) commonly use XML documents for descriptions and package in ZIP format, keeping data description being separated with display description. However, facing the developing document applications, the well-known ZIP format shows many deficiencies. Zip does not support incremental edit with revisions, random access while downloading, more efficient XML...
It's the trend that sensor network become more standardized and unified as internet of things develops continuously. Aiming at resolving the problems arising from variety of sensors type and interface, this paper presents a design idea of a standardized sensor network node based on virtual instrument and IEEE 1451 standard, and expounds the realization of this sensor node. A concept of sensor node...
This paper presents a design method of three point temperature acquisition system based on Ethernet. and described the hardware and software design of system in detail. the hardware section mainly describes the principle and use of Ethernet controler DM9000A which is widely used in industry. The software part represents the structure and transplant of the open source TCP / IP protocol stack uIP 1...
Aimed at building a new scheduling system by using internet, public switched telephone network and globle system for mobile communications. The user books schedule in website. The system reminds the user by phone or short message in exact time. The system is introduced in detail, including the steps to realize such as web site, accurate for timing, short message and ip call. It has be applied by any...
Along with acceleration of various countries' digitization and informationization, according to the 12th 5-year development plan, the internet of things (IOT) will become one of Chinese emerging strategic industries. Based on the analysis of IOT's basic concept and key technology, this paper studies IOT's application in "Digital Agriculture" construction. The main contents include: IOT's...
The network brings convenience to the students, it also brings a lot of trouble. The research showed that most students' network life is reasonable, and found their different purposes for internet. But there is still a small part of the students were unable to take charge of their status over the Internet, They addicted to the game and neglect their studies, which bring about an extremely serious...
Although passive queue management is defective, it is simpler than active queue management algorithm, so it is still widely used in Internet. In order to improve the deficiencies, the multi-dropping packets passive queue management algorithm is proposed. When the queue is full, randomly multi-dropping packets. Simulation results show that this algorithm develops the transmission performance of the...
This paper mainly makes a general description of word sense disambiguation from two aspects of resources and methods, and points out problems existing in the word sense disambiguation with and without guidance.
With the development of embedded technology, embedded system in industrial control applications more and more widely, and the embedded Ethernet technology is particularly important, LwIP protocol stack, Ethernet in low-end embedded system applications may be provided, STM32 interconnected ARM processor and its official software for Embedded Ethernet application development offerred convenience condition...
Based on the statistic data of some BBS forum, the general properties of topic diffusion is analyzed from growing and scale-free in internet virtual community. Furthermore, considering the accelerating and attenuating of user joining in growing of topic network, a network growing model of virtual community is given. The simulation results show that the topic network growing from our model has power-law...
This paper introduced an early warning of Tibet's tourism crisis, and combined the internet of things with disaster early warning technology and its demand in Tibet. Furthermore, the paper discussed the importance in the aspect of providing accurate information and the correct hedge instructions, reducing the disaster losses in early warning of Tibet's tourism crisis, in which the technology of Internet...
GIS Crime Analysis System is designed for the purpose of crime analysis, crime investigation and crime tracking with technical support and decision support for the police staff. Since the system's data is sensitive and secret, it's very important to ensure the safety of information and authentication of the user's identification. This paper presents architecture of GIS Crime Analysis System based...
Phishing is a form of online identity theft. Phishers use social engineering to steal victims' personal identity data and financial account credentials. Social engineering schemes use spoofed e-mails to lure unsuspecting victims into counterfeit websites designed to trick recipients into divulging financial data such as credit card numbers, account usernames, passwords and social security numbers...
This paper presents a remote self-learning method based on general packer radio service (GPRS) for driving cycle recognizing to hybrid electric vehicle. The system adopts an in-vehicle device to acquire real-time driving data through CAN bus and communicate wirelessly with central server by GPRS network and INTERNET. A Self-Organized Feature Mapping network is introduced to classify real-time driving...
A study room integrated management system with multi-layer architecture based on the internet of things has been built by internet of things technology, computer and information technology. The system use campus card data center as user data, browser as access mode, mobile phones as access terminal. To achieve the dynamic order management of library study room seats, and address resource constraints...
Mobile Internet is developed very fast. This paper analyzes the definition of mobile Internet and the industry development status, focuses on the consumers' behavior of college mobile phone students in Beijing area. Through the questionnaire survey of college students, their basic status, spending habits and consumer behavior characteristics were investigated and studied. On this basis, the impact...
This paper presents a survey on the Internet of Things. Firstly, the origination and the definition of the IoT are discussed. And then its technology framework and the features are mainly discussed in detail. Finally the application and challenges are introduced.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.