The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A different approach to off-line signature verification is described in the paper. There are inevitable variations in the signature patterns written by the same person. Due to the projection profiles of measuring the positional variations, the modified dynamic time warping (DTW) algorithm is applied to optimal matching. The optimal algorithm penalizes points with higher phase difference between a...
Natural language querying for remote sensing databases means that the users describe the query object directly in natural language when they query remote sensing (RS) databases. This method is not limited by the options on the query interface, and allows non-professional users to access to the databases easily. After making a study on the status of natural language querying for databases, the paper...
Traditional e-commerce transactions limited to producers through a third party and consumers, manufacturers rarely communicate directly with consumers. The system is adapted to this need. Virtual factory communication platform of producers and consumers are proposed. The paper presents the development of online virtual factory based on database and order design. The experiments show virtual operation...
During the last decade, column-store databases have gained successes in OLAP, data mining. For current multi-core architecture, CPU and GPU, designing a set of primitives that exploit the potential parallelism efficiently is very important. In this article, we implement a set of fine-grained primitives for our column-store database gSQL. We gain an order of magnitude faster than My SQL. At the same...
In order to measure the trust for software behavior in trusted computing, a software behavior analysis and verification model based on Aspect Oriented Programming (AOP) is proposed. The model about software behavior description, software behavior monitoring, software behavior analysis and verification are designed and descried. The model is deployed on a system for test. The test resultheindicates...
This paper puts forward the function requirements of the tooth code system, and according to them describes a design that based on VC++ 6.0 and Access database. The system software can generate all the code combinations automatically according to the tooth stage head (the depth of the valleys on the key) and the number of teeth (number of the valleys) [1], and it also can remove the codes that you...
For eÅÊã¸Ñ-time'"N`¬H eNÑ of¬HèÙÅÊ eÅÊN¬HÅÊ site, design and implementation of an embedded remote monitoring system Boa server to ARM9 S3C2440 processor core, expanding peripheral devices, using embedded Linux...
In order to build an efficient basic information service system of job post resources based on Web mining, a rapid and efficient job post resource mining system should be established. The proposed system is based on Django development, My SQL is used as database. The Django is opted to build the proposed system framework which is a Python open source Web framework, it encourage the rapid development,...
In order to build an efficient basic information system of science and technology experts based on Web mining, a novel system architecture for application is proposed in this paper. The proposed system architecture integrates spider module, local distributed storage and Mongo-DB. The basic experts information of science and technology appeared in the Websites are synthesized as two format and using...
The information development process of modern enterprise operation and management has been gradually transformed from the traditional centralized management to distributed, heterogeneous approach. To adapt this sort of requirement, the workflow management system has changed the original goal of creating the paperless office environment to the target of performing business processes automatically....
This paper puts forward the design method of network chat system based on Socket and cloud computing technology. Socket interface is an application programming interface of TCP/IP network, this interface definition of a number of functions or routine, programmers can use them to the development of TCP / IP network applications. Java Socket is tailored for the Java language by SUN which is used to...
Based on the Coordinated Universal Time (NTSC) from National Time Service Center, remote time calibrations center provides local time calibration for remote laboratory using Satellite common-view technique. The local time of long-distance workstations can be compared via this system and the time difference can be got in real-time. In accordance with ex post ephemeris, the time difference also can...
Database as a Service (DaaS) is a common service mode in Cloud Computing. Based on Feldman (t,n) VSS protocol and ElGamal homomorphism property, we proposed a privacy-preserving access control protocol for DaaS. Using Secret Sharing, we can protect the security of data owner's dataset, based on ElGamal homomorphism property, the data requester's query combining with the proxy servers' access control...
Most of the current disaster recovery solutions need to rely on expensive commercial disaster recovery software and hardware. In order to reduce the cost of disaster recovery, a fully featured, affordable disaster recovery solution and an offsite disaster recovery system RDRS (Remote Disaster Recovery System) are putted forward in this paper. Based on existing technologies, such as DFS, database mirroring...
Botnet-based attacking is becoming one of the most serious threats on the Internet. Lots of approaches have been proposed to detect the presence of botnet. However, most of them just focus on offline detection methods by tracking the historical network traffic, which is not suitable for real-time and general detection. In this paper, we propose a new technique that can detect the botnet activities...
Detecting the P2P swarm, analyzing their distribution is a challenging task, which has not received the deserved attention. In this paper, we demonstrate an active measurement methodology to continuously trace the real-world Bit Torrent and eMule/eDonkey swarms over the Internet from a stub network and for a long period of time. Our measurements achieve the ability of real-time scanning the online...
The development of network technology provides people with a convenient means of searching information, but to search agricultural information from the network need rapid and accurate assistance. The information searching tool that is designed theoretically by ontology is proposed, and the establishment and application of distributed data acuisition model in the web is used to collect related topics...
SQL-Injection is an attack for Web applications which are based on database system, and it is one of the most serious security threats for Web application. This paper proposes a new middle-ware-based prevention mechanism: SQLIMW. The SQLIMW avoids SQL-Injection attack from the programmer to the server, and use HASH function to replace encryption. Furthermore, it protects username, password and private...
In this paper, we have designed a high-security two-way real-time authentication system using dynamic password and multi-biometric to solve the shortages of traditional information system. In order to guarantee the security of fingerprint eigen value and facial feature value, we encrypt them with dynamic password. By the method of two-way authentication, it not only can ensure authentication server...
The multipath propagation in the cellular nets can cause large fluctuations of the base stations' (BSs) RSS which detected by the mobile stations (MSs).The movement of mobile stations and the changes of environment will aggravate the fluctuations of RSS. There is a possibility that RSS values appear outliers during the process from its examination by mobile stations to its transfer to the positioning...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.