The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Environmental data arriving constantly from satellites and weather stations are used to compute weather coefficients that are essential for agriculture and viticulture. For example, the reference evapotranspiration (ET0) coefficient, overlaid on regional maps, is provided each day by the California Department of Water Resources to local farmers and turf managers to plan daily water use. Scaling out...
Knowledge sharing, which is the basis for forming a knowledge application group, allows knowledge workers in an enterprise such as knowledge salespeople, knowledge operators, knowledge directors or knowledge managers to share the knowledge of other people or of other parts of the system to solve their problems in work. So knowledge sharing is an important part of knowledge management. In this article,...
Data are special kinds of resource in grid, and their flow, management and uniform view play an important role in the grid system. This paper presents a dynamic adaptive data transfer model based on multiple replicas in the grid environment, compared with the traditional data transfer method based on single replica, the experimental results show that this model has a better transfer performance.
Multilevel security management system can effectively manage the security devices, but how to realize data exchange between multilevel security management is an important problem. This paper designs and realizes data exchange between multilevel security systems.
Encryption has been a widely used technology for protecting secure data. However, recent threats show that encrypted data are being hacked and decrypted. A 128-bit encryption can be broken by a few weeks of supercomputing processing. These data are very critical to an organization and could be lethal if accessed by unauthorized group. Here a new transmission model is proposed for securing structured...
In order to promote the information-based development of the textile industry, and improve the production management, we develop a production monitoring and decision system via network technology, database technology, communication technology and transaction mechanism, and propose a Multi-Agent management decision and data analysis model. For all machines' production data and operating status, system...
As the fast development of Internet, the Web log mining technology has wide application in e-commerce and personal Web areas. The design and implementation process of the Web mining system based on XML are introduced in detail. It uses some pre-process methods to analyze Web log, which can recognize the user and conversation accurately. When logic modeling, it adopts star logic modeling, and designs...
Data communication is deeply studied to solve the real-time property and the stability of the data communication that is the key problem in the battle damage simulation system, following the logic process of data generating, sending, transmitting, receiving. Meanwhile, a series of optimized methods are proposed from the aspects of communication interface, communication server working model, concurrent...
The paper provides the model called the common data security access (CDSA), which can be used to keep data consistency. And the paper describes the method that is used by the CDSA to keep the local process-process and remote process-process access the common data safely. The model of CDSA can help to manage and synchronize data abstractly. So, it keeps the consistency and integrity of data. And, it...
As storage deployments within enterprises continue to grow, there is an increasing need to simplify and automate. Existing tools for automation rely on extracting information in the form of device models and workload patterns from raw performance data collected from devices. This paper evaluates the effectiveness of applying such information extraction techniques on real-world data collected over...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.