The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Both Principal Component Analysis (PCA) and Two-dimensional Principal Component Analysis (2DPCA) are successful face recognition algorithm. High recognition accuracy can be achieved using these two methods on the normal facial database, such as ORL, FERET, Yale, AR, etc. In order to construct an enormous Face Database of Science and Technology Experts (FDSTE) for e-government, face recognition algorithm...
In order to improve the management efficiency and normative for technology projects management, an application online system of technology projects management which the C# language and B/S framework based on the Visual Studio .NET 2008 are used to developed and introduced detailed in this paper. The proposed system achieved the cooperator with projects applications' personals, application employer,...
A novel method to detect botnet based on network coordination is proposed. This paper constructs a coordinative detection model of botnet, by utilizing hybrid network structure and analyzing information of a large number of detection nodes. First, detect abnormal attack behavior of nodes. Then define the set of nodes with similar behavior and build a coordinative task. At last, detect botnet nodes...
3G communication technology has three main wireless interface standards which are WCDMA, CDMA2000 and TD-SCDMA. The 3G devices and software of devices are different between different manufacturers and standards. In order to manage the different devices and many users in the training process of vocational education in communication profession, we designed and developed the software, “comprehensive...
This article describes the theory about Ajax characterized by asynchrony, and Ajax technology used in intelligent inspection system of substation equipment, in order to achieve the system during operation without having to refresh the entire page to submit a request and data. AJAX asynchronous interaction technology make the transmission efficiency and improve the speed of response between the server...
The development and expansion of Internet of Things need to solve a series of geographical questions such as space organization and industrial spatial distribution. Based on the integration of massive data between realistic space and virtual space, Internet of Things will affect the scale and means of Geographical research. Thus, this paper attempts to explore such new phenomenon of Human Geography,...
In this paper, the author subdivides the evaluation factors of subscriber's behavior loyalty under the guidance of the precise marketing, puts forward subscriber's behavior of 3G loyalty model, and according to the correlation analysis about all of data of 3G subscriber from a regional operator in 2010 August with SAS software, features of behavior loyalty in deep subscriber . It is a foundation to...
This paper firstly analyzes the theory of information visualization, and then based on the interface of Google Map proposing a way to convert text news to graphic news. Focusing on the location of each pieces of news, this web service may give a brief way for the audience to acquire today's or this hour's news (decided by the editor) separately with a virtual world map and provide the news media a...
With the Internet spread and deepening of the application. Internet and e-commerce business development has become an inevitable trend. Network security is more and more attention by people. Therefore, the use of an effective network security information filtering systems, real-time monitoring of network information is very necessary. We discuss Network Information Filtering System mainly, filtering...
High-quality video transmission over wireless local area networks is one of the most challenging issues nowadays. The Data Distribution Service (DDS) is a promising middleware that can be used for video distribution over WLANs. DDS has a rapid implementation in high-performance and mission-critical networks. This paper evaluates the performance parameters such as throughput and jitter when video transmission...
The multi-application smart card has a crucial problem that how to keep the management safety of some applications in the multi-application card, preventing one of application illegal visit to the other applications. In connection with this problem, the articles analyze the shortcomings of the partition management. Through combined the segment table of application and registry table, it bring forth...
As the rapid development and wide application of Radio Frequency Identification (RFID) technology, the increasing data rates have imposed a heavy burden on interaction of the middleware system and network bandwidth. Furthermore, the lack of uniform standard for corresponding interfaces between the components of RFID system has seriously restricted performance of data interaction and processing in...
This paper analyzes the Quality of Service (QoS) requirements of Internet of Things (IOT). Combined with the QoS technology of the composite service, the author provides a decomposition and optimization method for the quality of the Internet of Things, and puts forward four basic QoS calculation methods. Also, the issue of QoS strategy management is discussed.
In view of the imperfection of the Android operating system multimedia function and the complexity of streaming media system. At the same time, the development cycle is long, and efficiency is low. In order to solve those problems, the thesis designed the streaming engine layer between Linux kernel layer and application framework layer of Android platform, and constructed fast and convenient streaming...
Data warehouse fragmentation is one of the main problems in distributed data warehouse (DDW) design. The first step in DDW design, which in fact affects overall solution, is the definition of fragments. In this work we present our approach to improve fragment allocation by their ordering before allocation process.
Based on the overall introduction of the Voice Quality System in 3G core network, this paper proposes the detailed design scheme of media information processing, including the decoding analysis of RTP protocol and the generation of CDR files. The principle and algorithm of CDR synthesis are introduced and a hash dynamic synthesis method is adopted to improve the efficiency of getting CDR. After the...
Based on the research on embedded camera user's attention level, a novel blind image quality ranking and poor appearance detection algorithm for low lighting environment are proposed for the first time. Different from the traditional algorithms, the proposed one mixed model composed of detecting lowlight, grading blur degree and noise level, and figuring out the under- or over-exposure. It reaches...
The analysis and research of power system necessitates the current computing. However, the bottleneck of current computing lies in the limited computing capacity in power system. Cloud computing's service-oriented characteristics advance a new way of service provisioning called utility based computing, which could provide powerful computing capability for current computing. However, toward the deployment...
This paper proposes a modeling framework on how to specify security preferences and importance of software services, and compute a quantifiable value. Our approach advocates for an automatic calculation of the results of compliances between user's security preferences and the provider's capabilities in terms of security properties.
This paper proposes a jQuery-based Ajax general interactive architecture under the research and summary of lots of Ajax application examples. This architecture designs and implements a general Ajax standard interactive model which comparing to traditional process, can effectively conceal the complex Ajax handling mechanism, swiftly realize the Ajax process and reduce the work of exploration.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.