The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article focuses on research in the physical value chain and virtual value chain co-existence of economic environment, how to use third-party e-commerce service platform for the promotion of inter-firm cooperation, third-party e-commerce platform to solve the bottleneck problem, relying on the Internet for the first time to build a complete connection entities in the value chain and virtual value...
Based on the researches of E-education GRID and Cooperative Intelligent Grid, a new cooperative intelligent grid based E-education platform was designed.
The system of WebMail content and attachments recovery can monitor the network without affecting the performance of the network, check the network for confidential information leakage phenomenon. if found it will store the leak records into the hard disk automatically which will be used as evidence for security sectors. This paper introduces in detail the design and implementation of the WebMail content...
Since the late 1980s, the simple network management protocol (SNMP) as the Internet management standard has been developed. The management of IP networks has exclusively relied on the SNMP. But the SNMP management framework has some weaknesses especially related to extensibility configuration management and efficient application development processes. Today, researchers and developers in the network...
A reputation service is an essential part of a reputation system, which collects, distributes, and aggregates feedback about service providers' past behaviour. The feedback, as a score, is given interactively or by a user or is derived from a monitoring process automatically. The reputation service accommodates for each service provider an accumulated score as its reputation, which is produced by...
This paper discussed the, meaning and related techniques of constructing the high-performance WEB sites for the self-help service system, for the sake of advance usability and dependability of the self-help service system, design the project that carrying out gather-group technique of servers and load-balanced technique in system, it is mostly considered the complexion of the difference construct...
Recent Developments in sensor networking for industrial application emphasized need for reliable integration of sensor networks with the internet. For sensor network deployed to record the industrial process parameter in various place of industry, it is important that collected information be delivered as fast as possible with minimum delays. In this paper, an integration module is proposed. The objective...
With the development of database technology and the popularity of Internet, the database applications have been increasingly widespread; we must face on some serious database security. The database system is the aggregates of the message, and it is the core components of the computer message system. The security of database is very important; it is related to the success of enterprise and national...
IP-based Wireless Sensor Networks (IP-based WSNs) combine IPv6 technology with WSNs to create a global sensor network infrastructure. However, wireless radio access and Internet connectivity make end-to-end security urgently needed by security critical WSN applications. Transport Layer Security (TLS) is considered as a suitable solution to ensure such security. However, the certificate-based mechanism...
This paper describes a new botnet that we have discovered at the beginning of December 2009. Our Net Flow-based network monitoring system reported an increasing amount of Telnet scanning probes. Tracing back to a source we have identified world wide infected DSL modems and home routers. Nowadays, various vendors use Linux in this kind of devices. A further investigation has shown that most of deployed...
Monitoring large chunks of unused IP address space yields interesting observations and useful results. However, the volume and diversity of the collected data makes the extraction of information a challenging task. Additionally, the maintenance of the monitoring infrastructure is another demanding and time-consuming effort. To overcome these problems, we present several visualization techniques that...
A Bayesian network representing an actual prosecuted case of illegal file sharing over a peer-to-peer network has been subjected to a systematic and rigorous sensitivity analysis. Our results demonstrate that such networks are usefully insensitive both to the occurrence of missing evidential traces and to the choice of conditional evidential probabilities. The importance of this finding for the investigation...
This paper aims to develop the system of powerful computer laboratory class by simulation the ideal learning procedure, teachers and their students can keep in touch with each other in 2-way and immediately communication on Internet. This system can enhance the learning of computer laboratory class powerfully in 3 aspects: controlling, teaching, and evaluating on computer network technology with client/server...
Fault-tolerance is an important research topic in the study of distributed systems. To counter the influence of faulty components, it is essential to reach a common agreement in the presence of faults before performing certain tasks. However, the agreement problem is fundamental to fault-tolerant distributed systems. In previous studies, protocols dealing with the agreement problem have focused on...
Due to technological advances of handheld computing and communication devices, Mobile commerce (M-commerce) has emerged and attracted a growing number of research efforts. M-commerce not only extends Internet-based Electronic commerce (E-commerce), but also offers a unique business opportunity with its own features, such as ubiquity, accessibility, portability, etc. In this paper, we discuss some...
Virtual instrument is help to distance fault diagnosis and exclusion of large scale equipments as engines. In order to achieve distance automate control on engine fault diagnosis, a kind of virtual instrument fault diagnosis method based on Expert System supported Knowledge Database (ESKD) of double database cooperating mechanism was presented. The internet technology was also used for distance interactive...
A solution is urgently expected to meet the higher-quality web service requirements of various applications on the limited bandwidth of internet. This paper presents a new scheme of load balance of web cluster servers, making possible the service of the two-class priority station polling system under the mixed policy of exhaustive and gated services, optimizing the services of the system in time of...
The development of cloud storage services makes companies who outsourced their data to cloud storage server can't control their data by themselves as before. Then comes the security issues, especially the privacy preserving has become an more important security problem. The users always search their documents through keyword in plaintext, which may leak privacy of users in cloud storage environment...
We have presented the idea of enabling the cloud storage to support traditional applications. In this way, the applications running in local host can be deployed and running on the cloud storage without any modification. An acceptable solution is to enhance current cloud storage with standard POSIX file system interface. So that it can benefit from the scalable capacity of existing cloud storage and...
Using streaming media technology can effectively break the bandwidth bottleneck and make video/audio streaming over Internet smoothly. Based on the campus network facility and multimedia network classroom, this article use streaming media technology to form a network of teaching, analysis of the streaming media architecture, give a description of the system to connected and technical points, and make...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.