The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The path constraints are leaked by conditional jump instructions which are the binary form of software's internal logic. Based on the problem of above, reverse engineering using path-sensitive techniques such as symbolic execution and theorem proving poses a new threat to software intellectual property protection. In order to mitigate path information leaking problem, we propose a novel obfuscation...
The explosive growth of computer networking enormously increases security costs in universities. It is necessary to encourage the cooperation of students, faculty, and staff through education and training of information ethics, together with improving management and technologies, and as a consequence, to reduce university costs. We have been producing collections of video clips for information ethics...
A study on the employment of disabled people as forklift truck drivers for cargo handling operations is here presented. The work focused on the design of a customized forklift and the development of a novel lift machine as aid for people with paraplegia. Results of a market research about the usefulness of such a system is presented and a novel robotic modified forklift simulator has been realized...
By fostering public-private partnerships in cybersecurity education, the US government is motivating federal agencies, industry, and academia to work more closely together to defend cyberspace.
Based on Jiangxi Science and Technology Normal University needs, using JSP technology framework and SQL Server database technology, we designed and implemented scientific research training project information management system of college students based on WEB. This paper discusses the system structure, module function, parts of the operating interface and network security mechanism. System development...
Based on the "pharmacology" method, this paper puts forward that safety consciousness concentration is the key factor to judge the effect of safety education and training in response to the lack of effective supervision in the enterprise safety training. Besides, the paper provides a theoretical basis for enterprise to formulate the training programs scientifically and rationally by establishing...
Over the past decade the traceability research community has focused upon developing and improving trace retrieval techniques in order to retrieve trace links between a source artifact, such as a requirement, and set of target artifacts, such as a set of java classes. In this Trace Challenge paper we present a previously published technique that uses machine learning to trace software artifacts that...
3D virtual worlds and game-based simulations are to an increasing degree used for military training. However, there is a lack of research-based methods for using game-based simulations and developing scenarios for educational role-plays in a military context, especially in the area of cultural awareness. The CAMO project (Cultural Awareness in Military Operations) seeks to address these challenges...
Serious games show to have positive impact on training results. Advantages of simulation games lay in the provision of a safe training environment, where users are able to play, test and probe without serious consequences. At the same time, it is important to engage learners by providing a motivating, challenging environment, which becomes meaningful to the player when skills and knowledge acquired...
Important users are high-status vertices in social networks. They are everywhere in most fields of society and have big impact on those around them. Although a lot of effort has been made on identifying important users, the efficient methods still need to be developed, especially for the web users from Sina microblog, which is the most popular social networking sites in China and has unique characteristics...
Shortcomings of existing training management systems have caused the decline of training quality in driving schools. This paper presents a new driving training management system based on the Internet of Things, which combines the technologies of radio frequency identification and video identification. It provides mainly functions of student attendance authentication, training timing, distance measuring...
Skills gap is a common problem between university products and industry needs. This is apparent in many, if not all of the areas. The gap plays a role in the productivity or development of a given industry, as well as the unemployed rates. In a competitive world, employers are always looking for the best candidates for employment, with the best being defined as being competent both technically and...
In the field-work, the study on safety assessment of oil & gas drilling troop management is limited. Aiming at the characteristics of oil & gas drilling troop management, this paper uses the Fuzzy-AHP and Fuzzy comprehensive judgment method to set up the safety management assessment model of oil & gas drilling troop. Select a drilling troop of Changqing petroleum bureau, the...
This paper presents and discusses a conceptual framework designed to analyze how higher education institutions are using advanced communication technologies to support learning. The focus is on the institutional perspective and the paper includes a review of literature and a proposal of a model of analysis, supported by two main concepts -- institutional framework and use, whose dimensions and components...
With the development of network security technical, the pivotal factor is not technique but the administrator and management mechanism. In the domain of information security, social engineering can get into information system by using people' s weakness, just not using the computer's leak. This method can be used in many attacking way and turn up a new important project for its study and protection...
The necessity of computer based training for airport security screening officers to achieve and maintain a high level of x-ray image interpretation competency is well-known. During such training, x-ray images of passenger bags, similar to how they appear at the security checkpoint, are presented to the screening officers on a screen and have to be judged regarding their contents. Certain computer...
Container security and contraband interdiction in air cargo have become highly relevant topics at airports all over the world. The European Union (EU) requires detailed measures for standards in the field of aviation security that also cover training and certification of security personnel. In Switzerland, the same standards are being enacted by the Federal Office of Civil Aviation (FOCA). The training...
Computer basic teaching aims to develop and improve the quality of students' computer literacy, to have proficiency in computer application skills for students. Therefore, we must oriente to people, individualize students, we must combinatie the computer basic education and professional education. In this paper, we combined the actual condition of xinjiang agricultural vocational college with its...
In recent years, with the rapid harmonious development of society and economy in China, the progress of urbanization is also speeding up. More and more migrant workers come to cities. It has become an important task to guide the new generation migrant workers to merge into cities. To enhance research on citizenization of new generation migrant workers helps to eliminate the barriers for citizenization...
Analyze the characteristics of network security courses and the use of task-driven teaching practical significance. Discuss the detailes to carry out all aspects of curriculum, including classroom teaching, task-driven experimental procedures, evaluation system of the re-establishment and task-driven implementation of teaching effectiveness.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.