The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many authentication schemes are being strategized which at least involves minimum two authentication procedures. For instance many multi Factor Based authentication implies that simply authentication mechanism is not sufficient, either serial or parallel implementation of few or best of them is necessary. However many authentication schemes become a success in one case may terribly fail in another...
With the combination of information technology and the theory of design pattern, this article focuses on the analysis and comparison of the principles and methods in the business layer design of an information system. The principles of three design patterns, namely business delegate, factory pattern and dependency injection were introduced with in-depth and a new solution to business layer design...
The developed model for analysis of MEMS structures based on inhibited Petri Nets is presented. Results of analysis are presented. Approaches to development of software for information technology of MEMS analysis and synthesis are offered.
Lately in the industry of an information technology the question on integration of heterogeneous sources of the data is even more often brought up. In difference to homogeneous systems, heterogeneous data source systems can be described by various data models. Integration of heterogeneous data source means creation of the general scheme of the description of the given all subsystems for the unified...
With the rapid development of IT, the software is infiltrating service industry gradually, innovating the way of service production and delivery. However, such software-included services have no ideal method for their analysis and design, resulting in a big gap between the demand and the actual design. Thus, this paper firstly analysis the software-included services, and propose a novel software-included...
Soldiers possessing of network attack-defense ability are the key factor for future information war. Aiming at the problem of lacking daily training and drilling environment, a method of building network attack-defense simulation training system (NADSTS) based on HLA is put forward. With the method, attack and defense training are designed as different federation member. The system is divided to presentation,...
We present features of an education system entirely based on a 7-months project, performed by a 6-students team within a virtual company and tutored by an experimented software engineer. We describe some aspects of a past project: functions of the system, technology, deliverables, and assessment. Students' outcomes are drafted in term of roles.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.