The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Taking the development of an oil depot training system for instance, the key technologies and development process of the system are described in this paper. Firstly, we begin with the background and significance in the research subject, and then we expound the overall structure and functions of the system and design processes. Secondly, we lay special stress on analyzing the database design, including...
Boosting is a general method for improving the accuracy of learning algorithms. We use boosting to construct improved privacy-pre serving synopses of an input database. These are data structures that yield, for a given set Q of queries over an input database, reasonably accurate estimates of the responses to every query in Q, even when the number of queries is much larger than the number of rows in...
Student Information Management System realization including establishment and maintenance of the database and front-end application development. This paper describes the system functional and architecture design, and emphasizes the system's functionality, database design and functional modules, etc. Fully functional, flexible and convenient application and friendly interface provide a good guarantee...
In this paper, by analyzing the deficiency and insufficient of subjects-selection in traditional graduate design, put forward to reform the process of subjects-selection in graduate thesis by application of web, propose an constructive programs of bidirectional subjects-selection system for graduation thesis. Bidirectional subjects-selection system for graduation thesis emphasizes the students-centered...
With the development of network technology, computer network is characterized as an uncontrollable, variable and unpredictable infrastructure, this brings great difficulty of verify, defining, debugging and comparing the new schemes. Network simulation technology is proposed to test, appraise, and verify means available. This paper designs and implements an intelligent analyzing tool for NS2 traces,...
This paper has discussed the data to accommodate the disaster backup the concept as well as the DataGuard outline. From DataGuard key technologies, principle of work and so on, it analyzed the Oracle DataGuard disaster recovery technology with high reliability and high security.
Environment condition monitoring is important to human life. A variety of monitoring technologies have long been used to monitor environment condition. In this paper, we describe the design method of a remote monitoring system based on the Internet and CDMA (code division multiple access) network, and discuss how to program in Java to implement the system in detail, especially the methods of communication...
We introduce the concept of database proxies capable of mitigating the gap between two disjoint productivity-enhancing techniques: Component Based Software Engineering (CBSE) and Real-Time Database Management Systems (RTDBMS). The coexistence of the two techniques is neither obvious nor intuitive since CBSE and RTDBMS promotes opposing design goals, CBSE promotes encapsulation and decoupling of component...
This article regarded the popularization of GIS as a starting point. It researched the feasibility of the transformations based on special GIS to popular GIS. It proved the popular spatial information service platform structure mainly from data base, technical feasibility, system framework, function frame and user perspective. And it also gave a future construction idea about popular spatial information...
In this paper, we present the technique to manage user profiles and authentication using LDAP (lightweight directory access protocol). The user profiles maintained in the LDAP directory information tree (DIT) which contains various information about users. This information can be retrieved by the users depending upon the level of access provided to them on the network. Various services use this authentication...
The encryption mechanism is an effective way to protect the sensitive data in database from various attacks. When the data is encrypted, the query performance degrades greatly. How to query encrypted data efficiently becomes a challenge. In this paper, a scheme to support query over encrypted data is proposed. Firstly, we extend two-phase framework to complete query, constructing different indexes...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.