The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aimed at abnormal score from evaluation experts, real data from Shanghai double-blind sampling system of graduate dissertation and thesis between 2013 and 2014 have been in depth analysis and mining. Some basic judgment rules of abnormal score are summed up, and monitoring model for abnormal score is proposed. By the least squares method and the multiple regression models, the equation of monitoring...
The health degree of large distributed information system reflected from the business perspective is the core index to measure the stability of information system. It has significant meaning for the fault diagnosis of any information system. To solve the above problems, a knowledge representation method based on weighted fault diagnosis is proposed in this paper. Based on the knowledge representation...
Wireless communications and mobile web in the domain of mobile commerce (mcommerce) are growing and gaining significant momentum throughout the internet. Researchers all over the world are actively studying the standardization to understand the factors that affects the acceptance of upcoming innovations and development in mcommerce. The digitalization and its advancements have ensured that, until...
The paper considers the issue of countermeasures selection for ongoing computer network attacks. The suggested technique is based on the countermeasure model that was defined on the base of the open standards, the family of interrelated security metrics and the security analysis technique based on attack graphs and service dependencies. The technique was implemented in a security assessment and countermeasure...
The paper considers the issue of countermeasures selection for ongoing computer network attacks. The suggested technique is based on the countermeasure model that was defined on the base of the open standards, the family of interrelated security metrics and the security analysis technique based on attack graphs and service dependencies. The technique was implemented in a security assessment and countermeasure...
For meeting quality of services, it is proposed the Analytic Hierarchy Process evaluation model with the new generation power information and communication technology (ICT) network in this paper. Firstly, based on the characteristic of the network, the quality evaluation indicators are established and the parameters of the indicators are extracted. Finally the proposed method implements evaluation...
Country risk - the likelihood that a state will weaken or fail - and the methods of assessing it continue to be of serious concern to the international community. Country risk has traditionally been assessed by monitoring economic and financial indicators. However, social media (such as forums, blogs, and websites) are now important transporters of citizens' daily conversations and opinions, and as...
Between the year 2005 and 2007, the authors monitored the habitat of golden monkey (Rhinopithecus roxellana) with the geography information system, remote sensing and global position system. We record the transect, altitude, forest canopy cover, the height of the tree, slope. Vanderloeg and Scavia selective index was used to evaluate the golden monkey's selection for varied habitat parameter. Through...
Shandong province which is located in a warm temperate monsoon climate zone is rich in agricultural resource. However, Drought is the most serious natural disasters of it. There is an important period for the wheat harvest before the Mound Closure which could ensure the enough number of the wheat tillering. Within the wheat growing stages, Density of vegetation cover is a gradually changing from bare...
With the characteristics of open source, excellent index structure and system architecture, Lucene promotes the application of full-text retrieval technology in various industries and fields greatly. In this paper, the system architecture and operational mechanism of Lucene were discussed. Further, according to the requirement of external network information leakage monitoring and querying system,...
As processes to obtain the accreditation are almost similar in most universities and higher educational institutions around world, this study tries to design a general business processes reference model to these processes that can be used as a reference for any education institutions to model its own accreditation process. In addition to this, the proposed reference model covers all processes that...
It is difficult to search a right image on Internet. In this paper, we present a web image retrieval method using multi-agent. We described the types of agents used in image retrieval. The software architecture of a web image retrieval system is presented in this paper. We described the implementation of an image retrieval system with multi-agent, which is efficient, flexible and practical.
Development of banking business leads to system maintenance amount of work increase greatly. In order to discover and resolve the abnormal circumstance in time, and avoid producing greater adverse effects, it is important to apply one method of automatic monitoring, and get alarms and reports directly. This paper introduces an application on AIX platform which is programmed by SHELL code. It can monitor...
In order to improve the speed of the GFPB site selection and make it more reasonable, this paper, by taking Beijing as the study and application area, introduces how to establish an efficient IT service system for the data acquisition, processing, transmission, storage, analysis and application of the GFPB site selection through the GPS and RS which are as tools to obtain data, by using network-based...
The monitoring data for water quality of Beijing Beihai between May and October in 2007 have been analyzed with gray correlation. In order to overcome the defects of the traditional method, this way consider the interzone form of the water quality evaluation standard, use centralization dimensionless functions, and combine the integrated nutritional status index with const weight. The thread system...
The context: Results of performance evaluations of IT services are frequently based on technical metrics collected using tools. Subjective and uncertainty aspects, however, are disregarded or infrequently used. The problem: How to estimate the quality percent of an IT service, in order to provide a continual activity in the service life cycle, linked to a business-driven service improvement strategy...
The current research on real estate data is insufficient, resulting in the false judgment from the government to the real estate industry, and thus the negative impact on the social economy development. Analyzing the real estate market data, this paper used the data mining technology for the real estate data, and proposed the monitoring index system based on digestion cycle. The detailed calculation...
Most of the service providers today have become increasingly dependent on their technology, being organized in terms of strong linkage between IT and business units in order to maximize units' business value. Many companies are performing re-engineering using IT Infrastructure Library (ITIL) framework. In this paper incident management process is analyzed in one telecom service provider company. For...
Many developing countries are investing resources in e-strategy but the impact of these resources at the country level is not obvious. This paper is a try to introduce an analytical framework to analysis and evaluate of each stages of strategy process for achieving an effective national e-strategy. All stages of e-strategy such as environment scanning, strategy formulation, implementation, monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.