The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Large enterprises tend to have heterogeneous systems, namely the formation of "islands of information", that makes information interaction and interoperability very difficult. Application of integrated development based on service-oriented architecture, which does not change the underlying architecture of enterprise applications, is a good solution to the aforementioned problems. This paper...
With the rapid development of the Internet, BBS, instant messaging, twitter, micro-blog has become an important channel for people to express their will and exchange information. With the help of the free, open and efficient network platform, opinion information can more directly, more truly reflect public opinion in all aspect of life, also become real-time mapping barometer of the social public...
Based on the complexity in military information systems architecture design, we proposed the concepts of architecture optimization design. After analyzed application of logical data meta-model (DM2) in building architecture data and products, we built a framework of architecture optimization design. Combined with the building sequence and designing guidelines of architecture data and products, we...
Software projects face a common problem is the requirement uncertainty and frequent requirement changes. The risk of requirement changes is considerable risk in software project management. Information entropy can effectively measure subsystem's degree of uniformity. This paper proposes a quantitative risk measurement model that could be used to measure risk posed by requirement changes. The more...
Cognitive radio is now emerging as a popular technology to end the resource scarcity. Cognitive radio has four fundamental technologies that is spectrum sensing, resource allocation, disturbance avoidance and opportunistic spectrum access. Among them, spectrum sensing technology is the foremost. Blind sensing method attracts much attention for its easiness to implement and the few requirements for...
By taking railway industry in China for example, SUPER-SBM DEA model of existing uncontrollable factors are adopted to analyze and evaluate the operation performance in 30 provinces in China. Based on detailed analysis of railway industry operation features, optimization of related slack variables is analyzed. Suggestions are put forward as follows: current railway transportation capacity should be...
Rumors are unavoidable in social networks and spreading through social networks. In this paper, we introduce three roles, which are rumor maker, accomplice and innocent, into social networks. Rumor makers are people who distribute rumors in social networks. In order to propagate rumor as more people as possible, rumor maker cannot achieve this goal without others' help. So that accomplices are people...
We propose a random search algorithm to resolve the problem of packing circles into a rectangular container. With our method, all the circles are put into a large space randomly, and then by introducing the bow shift area, the searching space can be reduced and the local optimal solution can be list. By moving, turning and other disturbance methods, it will achieve the global optimization in the whole...
In order to solve the problem of isolated order information among production processes, which leads to the information cannot be transferred timely and shared effectively, a system of information tracking is presented in this paper. The BPMN (Business Process Model and Notation) specification is adopted to establish order process model. The model can be used to describe the company's core business...
Location-based services (LBS) bring so much convenience to our daily life. However they have incurred serious location privacy problems. K-anonymity is the one of most popular privacy-preserving methods. The method relying on a trusted third party (TTP) might cause the TTP to become a performance bottleneck. So TTP-free protocols are proposed. But existing TTP-free protocols cannot resist attacks...
In this paper, an anti-phishing technique based on e-mail extraction and analysis is proposed. The technique approached with phishing email, the channel phishing attack transmits, distinguish phishing emails and extract the suspicious URL from the e-mail for further analysis. Upon arrival, a protected list is built according to those third parties which are the most vulnerable to phishers in order...
Computing the shortest path between two vertices in a given graph finds out vast applications. Currently most state-of-the-art research studies the shortest path computation problem in single-weight graphs, i.e., each edge in the graph has only one weight. In some applications, there are multiple weights on an edge, and those weights need to be considered when computing the shortest path. However,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.