The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This research analyzed the current status pertaining to the sport industry's information system and information network in Korea to propose integrated information network of sport industry construction measures with the goal of optimizing vertical and horizontal network formation, and knowledge information sharing and dissemination. To construct integrated information network of sport industry, literature...
This paper presents World Wide Web Consortium's (W3C) Geolocation Application Program Interface (API), which is an interface to retrieve geographic location information of a client-side device. Currently Geolocation API is used as implementation in Web browsers, and new coming HTML5 standard. There are few methods how Geolocation API is determining location which are mentioned in this article, and...
Radio frequency identification (RFID) uses wireless local area network technology, which limits its scope of application. And the data security isn't well protected because of the limited hardware resource of cheap electronic tag. In this paper, we realize the combination of TCP/IP and RFID technology by the Ethernet interface of SAMSysMP9320 reader/writer. This is accomplished by assigning IP address...
This paper examines the expansion of the Learning Management System (LMS) beyond the Academic Institutions' boundaries. This includes taking advantage of the rapid development of Web 2.0 technologies for advancement of e-leaning in engineering education. The exponential expansion of different internet communication methodologies and its utilisation to facilitate the teaching and learning processes...
The paper explains the effectiveness of flexible learning methodology in engineering courses. This is an attempt to explore the traditional educational methods and to discuss the implications of flexible learning tools in engineering courses. It takes into account the latest application of Web 2.0 and other relevant techniques as well as components of delivery and material and resources needed. The...
In order to develop the communication competencies of the mechanical engineering students, a written technical report consisting of three documents (a report, a set of slides and a script for the slides) is used. Complex aspects of electronics equipments related to EMC, reliability and safety are learned not only by reading information, but also by creating a report. This tutorized task also helps...
The following topics are dealt with: user behavior; intention aware computing; Internet LAN based RFID; intrusion detection system; document analysis; Web service; search engine; machine learning; neural network; collaborative communication; virtualized server; collaborative learning; video summary; computer simulation; fingerprint image matching; data analysis; Bayesian network; text visualization;...
We proposed the “Quasi-static approach” as a method that can analyze the stability of a telecommunication system experiencing retry traffic. This method considers human interaction with the system, and use the difference of timescale between humans and system. Our recent studies evaluated the stability when all traffic including retry traffic has the same holding-time distribution as calls in the...
The platform of teaching resources which is in the form of the network course has combined the course website construction and teaching resources construction together. It has avoided the duplication of the resources construction and satisfied the need of the course website construction and teaching resources construction and has made up for each other's deficiencies. With the turning point of the...
The change of Virtual currency strategy is common in electronic business. Online game is one of the areas where virtual currency strategy changes frequently. This research focuses on how the change of Virtual currency strategy effects customer satisfaction. Online games' economic problems attributed the problem of inflation. And the change of Virtual currency strategy associates that of Inflation...
The internet resources are very rich, and the traditional search engines can accelerate the speed of network information retrieval. But the bilingual translation comparison pages' information in intemet are not fully used. So the combine of personalized search engine and the bilingual auxiliary translation become an important research subject at present. In this paper, basing on the large-scale network-based...
This paper studies the history of Diffusion Theory, put forward two new concepts of Tarde - Rogers Hypothesis and "Ryan - Gross" Paradigm. It's other theoretical significance is that introducing the classic hypothesis and paradigm of Diffusion Theory into Network News Communication and obtaining an empirical support. As for it's methodology, this paper puts forward some theoretical hypotheses...
This article focuses on research in the physical value chain and virtual value chain co-existence of economic environment, how to use third-party e-commerce service platform for the promotion of inter-firm cooperation, third-party e-commerce platform to solve the bottleneck problem, relying on the Internet for the first time to build a complete connection entities in the value chain and virtual value...
Compared with logistics of ordinary things, Chemical Logistics is flammable, explosive, toxic and corrosive and other characteristics. Storage and transport of specialty chemicals has inevitably brought a series of serious problems and potential problems because of its particularity, so the safety of chemical logistics management is very important. How to achieve real-time monitoring chemical logistics...
Keyword extraction is an important application in the area of information technology. Automatic keyword extraction can help people know what is the article primarily talking about without reading the long passage carefully. This paper mainly introduced a keyword extraction algorithm using pagerank on Synonym. Firstly, the content in a single document is represented as a weighted synonym co-occurrence...
This paper describes the implementation and evaluation of a system used for mobile learning. It describes how such a system can be monitored, and what must be taken into consideration for the deployment of the system on mobile devices. It is also leaves room for the modification of the system.
Automatic document classification is becoming an important research field with the rapid increase of electronic documents. The main purpose of this research is to construct an accurate document classifier based on support vector machines (SVM), which is known as the state of the art algorithm for document classification. The rough null space (RNS) based approach is also known as a good linear approach...
Tele-operated laboratory experiments are monitored or operated by visualization systems. In case of using a web browser the rapidly evolving web technology generates an increasing variety of client platform applications. Therefore, solutions are often obsolete after a short life time. New browser versions do not support earlier versions of web technology or browsers of different developers differ...
DDoS attack is a major Internet security problem-DoS is that lots of clients simultaneously send service requests to certain server on the internet such that this server is too busy to provide normal services for others. Attackers using legitimate packets and often changing package information, so that traditional detection methods based on feature descriptions is difficult to detect it. This paper...
With the rapid growth of the Internet, it is natural that we want to handle and process the document not as pen and paper but as online information. To deal with such large amount of information, people often want to use a certain classifier to classify it. To train a classifier, teacher signals are needed. However, different applications have different features, such as spam mail filter, patent analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.