The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research developed the MySQL Sandbox, a secured environment for processing SQL queries. It was implemented as a RESTful web service having three services - sandbox database creation, SQL statement processing and sandbox database resetting. It supports the simultaneous processing of multiple SQL statements from multiple users in multiple databases. It uses question identification (ID) and student...
A public cloud platform offers economy of scale, ease of management, and elasticity to solutions. In addition, regulatory compliance and security must be assured for solutions handling sensitive data, such as student and healthcare data. With the steep rise in data breaches at large enterprises, it is a requirement to emphasize the security, privacy, and compliance of cloud-delivered solutions that...
The rapid growth of computer technologies has resulted in a corresponding increase in the creation of new loopholes in systems which eventually might result in data leak. Data leakage is an incident in which sensitive information is released to any unauthorized party intentionally or unintentionally. There is a large set of software available which can be used to prevent data leak, however they fail...
University laboratory is very important place for teaching and scientific research. Our approach is to build the system on the campus network, and use the C/S-B/S model. Now the Opening Laboratory Reservation System (OLRS) has been adopted in practice and the results show that it can not only improve work efficiency and the utilization of equipment, save resources easy and visual to operate, but also...
Peer review has long been used in education to provide students more timely feedback and allow them to learn from each other's work. In large courses and MOOCs, there is also interest in having students determine, or help determine, their classmates' grades. This requires a way to tell which peer reviewers' scores are credible. This can be done by comparing scores assigned by different reviewers with...
The amount of information and the need for information is fast increasing today, and it will further multiply in the coming years. The critical infrastructure ensures the welfare of the state and its citizens. Everyday decision-making requires a large amount of information of various types. The present publication will show the relationship between the critical infrastructure and Big Data. The emergence...
Computer crime is a kind of high-tech crime, it is intelligent and hidden and the traditional internet security technologies cannot be survived with. Therefore, relevant laws and regulations need to be establishing and people's security awareness should be enhance as soon as possible. This is how computer forensics comes is born. Computer forensics is a combination of technologies including obtaining,...
Research on the Web Service technology is carried out according to the practical system acquirement, the priority and advantage of the Web Service technology is explained. Based on the deep analysis of the architecture and the implementing theory of the Web Service technology, the network teaching platform based on multi-tier architecture is designed, in which Web Service is used to the design of...
An anti-PROXY detecting scheme based on characters is proposed. According the characters of data flow, viz. flow rate character, application character, content character, process character and behavior character, it is identified whether the user is an PROXY object or not. The next step anti-proxy action will be made in terms of practical policies. The scheme includes character collection, modes matching,...
Examination is currently a main and also a direct-viewing means for testing students. The development in intelligent system configuring test questions in date-base appears especially important. The theory in the construction of date-base and its realization principles are analyzed in this paper, combined with the situation of separation from teaching and examination in Henan Polytechnic University...
Intelligent tutoring system is becoming more popular in the recent times since its beneficiaries include a wide range of people of all categories. In this paper, we propose architecture for an Intelligent Tutoring System (ITS) using agents. Self adaption mechanism is promoted through control loop. The key concept of this paper revolves around the integration of Multi-agent framework with facial feedback...
The online exam system which integrates with Struts2, Spring and Hibernate has been researched here. Based on completion of essential function of online exam system, the thought of S2SH (Struts2+Spring+Hibernate) framework has been adopted in our system which separates view tier, control tier, business logic tier and data accessing tier into different components, as well as utilizes MVC pattern (Model...
XML Retrieval is becoming the focus study of the field of Information Retrieval and Database. Summarization of the results which come from the XML search engines will alleviate the read burden of user's. However, as the basis of this study, the construction of the query-oriented XML text summarization corpus has not yet received enough attention. In this paper, we introduce our works on constructing...
To construct the frame of the Electronic Government administration system according to submitting and demanding. The main security demanding of the system is analyzed, and digital signature and encryption techniques are used to construct a model to solve these security problems.
The background of the laboratory information management system and the advantages are introduced at first. Combined with the conditions and requirements in Laboratory Information Management system, a laboratory information management system based on B/S structure was developed by Web Server technique. Subsequently, especially introduces the analysis, design, and development of the network experiment...
On-line practice and examination is a new trend of interactive remote teaching and learning. By providing practice and examination content, OPES realizes another distributed and asynchronous learning atmosphere for students. OPES is carried out under the B/S design model with student, teacher, system administrator three functional roles. During the practice procedure, the practice content is focused...
In this paper, through the research of the existing computer assisted instruction system, based on the detailed analysis of its functional requirements, object-oriented software engineering approach is used for full-scale system design, which makes the analysis process and development process more closely combined. A general framework which is clearer, easy to develop and practical is also proposed...
University library teaching reference information system is important for new knowledge service, how to utilize network technology to realize the teaching reference information resource sharing has become an urgent need of university library. This paper developed a web-based university library teaching reference information system using ASP. NET techniques, and introduced its architecture and main...
This paper discusses the principle of designing a application system of teaching resources management by using program concept, it presents the system development platform in the process of designing , the basic methods used in information resources management are also mentioned., then several open-source portals were introduced and evaluated. Finally, the example of developing a platform of teaching...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.