The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article combining Internet development under innovation 2.0 with the new form of material management, take West Inner Mongolia Central Railway Corporation for example. Through discussion, it propose a new mode of railway materials management and solve the problem which are widespread of the current construction enterprise material management. It will solve deep-seated problems existing in the...
Along with advances in information technology, cybercrime techniques also increased. There are several forms of attacks on data and information, such as hackers, crackers, Trojans, etc. The Symantec Intelligence report edition on August 2012 indicated that the attacker selected the target of attacks. The type of data is valuable and confidential. The Hackers selected the target to attack or steal...
Abstract- Many engineers are exposed to binary data. These can be files or data exchanged over network links. When involved in the verification and validation of systems that deal with specific protocols or binary data storage, it is often tedious to analyse the hexadecimal dumps in order to find specific parameters of interest. Despite detailed protocol specifications, it takes a lot of manual effort...
The sensor node signal interface is the channel for sensor connecting to sensor node. Therefore, in order to verify the conformance between sensor network signal interface and signal interface standard, the design and implementation of WSN signal interface conformance test system based on web wsa presented. The test content included the signal interface description file, signal type supported by interface,...
This paper presents the SUNRISE GATE, namely the interface through which users can run their experiments, accessing in a unified way the heterogeneous resources offered by the testbeds of the SUNRISE federation (http://fp7-sunrise.eu).
The paper presents results from the SEE TV-WEB project, which is tackling the problem of the digital divide by extending the HbbTV standard solution for provisioning of advanced services. Excellent coverage of DTT networks compared to the broadband Internet access and a large number of users being accustomed to the TV as the main device enable tackling of the digital divide. Many benefits of such...
Interoperability testing is an important part of the lifecycle of a protocol. Interoperability tests not only help to reduce implementation bugs, but they also often improve the accuracy of a protocol specification. In a pursuit to improve Network Configuration (NETCONF) interoperability and foster it for community-based education, we have developed and deployed a NETCONF Interoperability Lab. The...
Reusability of resources is a challenge for the development of e-assessment. We have analyzed the existing frameworks reported in surveys and literature in e-assessment and complementary domains. It turns out that they insufficiently address issues such as security, accessibility, quality, and context. We suggest overcoming these barriers by integrating metadata into a multidimensional framework,...
This paper first designs the entire framework of OILP, and then it constructs some specific modules of OILP, such as searching module, online testing modules and teaching pack. It also introduces the user-level, the resource database and the technologies for realization. At last, it concludes that OILP is the perfective choice for information literacy education in academic libraries.
This study centers on multiple-scheme encryption using annotation technology. The objective was to propose a composite encryption framework that combines several encryption specifications. It was assumed that combining several encryption standards can further enhance information security. It divided a message to be encrypted into packets and each packet was coded with a methodology independent of...
Port state control (PSC) inspection is the most important mechanism to ensure world marine safe. Recently, some SVM-based risk assessment systems have been presented in the world. They estimate the risk of each candidate ship based on its generic factors and history inspection factors to select high-risk one before conducting on-board PSC inspection. However, how to improve the performance of the...
The net generation of students have characteristics which make them well-suited for participating in open source projects including being comfortable with information technologies, using IT as a form of communication, desiring to work in groups, a desire to do social good, and being fascinated by new technologies. The nature of open source projects where communities of developers from around the world...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.