Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The increasing complexity of the new breed of distributed intelligent systems, such as the Internet of Things, which require a diversity of languages and protocols, can only be tamed with design and programming best practices. Interest is also growing for including the human factor, as advocated by the ambient intelligence (AmI) research field, whose focus is on transparently and intelligently supporting...
The flipped classroom reconstructs the learning process of the students. In view of the reflection problems of flipped classroom based on small private online course (SPOC), this paper takes the course “Network Technology and Application” in engineering colleges as an example to explain the implementation process of the flipped classroom, which proposes flipped classroom teaching practice process...
The Web evolved much more rapidly than was probably envisioned when it was invented two decades ago. The authors present their vision for the Web's next two decades by identifying important research directions that can help extend its reach further. The Web extra at https://youtu.be/2Pd6bnxCknk is a video in which author Vishnu S. Pendyala expands on the article "The Web That Extends beyond the...
A mortal finding out proteins logs into a pc and uses a complete network of computers to investigate knowledge. A man of affairs accesses his company's network through a personal organizer so as to forecast the long run of a selected stock. a military official accesses and coordinates pc resources on 3 completely different military networks to formulate a battle strategy. All of those situations have...
The main purpose of related computer networking courses is to develop the practical abilities of students. Currently computer networking courses become more and more practical and the contents are also updated quickly, which make the drawbacks of traditional written examination mode increasingly obvious. Many domestic colleges have adopted online examinations. And examination modes are almost that...
In this paper, we first analyze the current teaching scheme of computer network experiment and study its shortcomings, then propose a new teaching objective and content, which means that the main contents of computer network experiment course for computer specialty undergraduate should be protocol analysis, and the teaching objective should be understanding principle, feeling design idea, mastering...
The paper summarize the teaching experience that accumulated in author's teaching process of Computer Networks, and gives particular expatiate in theory of teaching, experiment teaching and laboratory construction for respective, and then emphasizes the teaching pattern should accord to the principle of application as the goal, theory as the basic, combining theory and practice, this teaching pattern...
This paper starts with the characteristics of computer network course of colleges and universities, combines with the current changes in demand for networking skills as well as the writer's long-term accumulation of practical experience of teaching, the writer provides teaching reform measures and proposals for this course in the aspects of curriculum content, the practical teaching, network teaching...
At present, network engineering is a new specialty and not fully developed. The experimental conditions are faultiness and the teachers' potency is weakness. There are no standard of specialty building, curriculum construction, teaching design and so on. Based on the analysis of the domestic current status and content of network engineering specialty, this paper studies the disadvantages in content...
The subject of this work is the presentation of a new approach to the expansion of classical cryptographic algorithms used for secret sharing and sharing data, with an additional, linguistic stage for the generation of the secret element. Such a part shall be generated in the form of a linguistic description of the shared data, built by defined sequence grammar. The definition of grammar in this scheme...
Along with the rapid development of electronic commerce and the increasing Internet users, the market of electronic auction has expanded. However, online auction centers remain to be an insecure environment and the bidderspsila identities and private information may still be under threat by malicious hackers. To consider account security, among the main rules of online electronic auction is that the...
The 3 most important issues for anomaly detection based intrusion detection systems by using data mining methods are: feature selection, data value normalization, and the choice of data mining algorithms. In this paper, we study primarily the feature selection of network traffic and its impact on the detection rates. We use KDD CUP 1999 dataset as the sample for the study. We group the features of...
Recently, Lee et al. proposed a remote authentication model of information appliances (RAMIA). Unfortunately, RAMIA has a fatal error that opens the entire home network of information appliances to hackers. In this paper, we propose a new secure remote control model for information appliances (SRCMIA) to fix this error. Besides, our model can also achieve both message authentication and one-time secret...
Several vulnerability analysis techniques in web-based applications detect and report on different types of vulnerabilities. However, no single technique provides a generic technology-independent handling of Web-based vulnerabilities. In this paper we present our experience with and experimental exemplification of using the application vulnerability description language (AVDL) to realize a unified...
This paper describes how we can use existing mobile technology to track the vehicle. Here the embedded system along with the mobile is used to prevent the vehicle from being stolen and also if the vehicle is stolen then its location can be tracked. Mobile technology is the fastest growing communication mode. In todaypsilas mobile technology we all are acquainted with short message service (SMS). In...
This paper investigates and simulates a coloured stochastic Petri nets model for depth evaluation intrusion detection. Network attack behaviors are very complexity sometimes, it is difficult to capture all of them. In this paper, we could realize what them happened with analyzing and simulating an intrusion. The experimental results demonstrated that the CSPN model approach was an efficient and helpful...
In this paper, we introduce and evaluate ScaleMesh, a scalable miniaturized dual-radio wireless mesh testbed based on IEEE 802.11b/g technology- ScaleMesh can emulate large-scale mesh networks within a miniaturized experimentation area by adaptively shrinking the transmission range of mesh nodes by means of variable signal attenuators. To this end, we derive a theoretical formula for approximating...
Since the globe is connected tightly by internet, to react the disruption of internet services efficiently and fairly is very important, especially for those real time transactions. However, there is a lack of literature about it. To our best knowledge, this paper is the first try to explore issues under such conditions. A framework, which consists of the traffic rerouting programming, the capacity...
In a real world, it is often in a group setting that sensitive information has to be stored in databases of a server. Although personal information does not need to be stored in a server, the secret information shared by group members is likely to be stored there. The shared sensitive information requires more security and privacy protection. To our best knowledge, there is no paper which deals with...
As digital resources increasingly growing and the economic benefit of digital intellectual property rights being increasingly important, people has been increasingly emphasis on information security issues brought by the data remnants in storage devices. They try their best to prevent the potential risks. In this paper, we survey comprehensively related technologies, standards and trends of erasure,...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.