The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the quality of teaching of Japanese intensive reading courses, improve the quality of higher education, improve the quality of personnel training, and improve the level of scientific research, strengthen the social service ability, optimize the Japanese intensive reading courses in discipline. Put forward the curriculum design of Web network based on the teaching of Japanese intensive...
Advancements in both computer science and biotechnology opened way for an unprecedented amount and variety of gene expression raw data to appear in the open access. It is sometimes worth to rearrange and unite data from several similar gene expression studies into new case-control groups to test new hypothesis using available data. Unfortunately, most popular gene expression databases, such as GEO...
The emergence of a new paradigm such as ubiquitous or IoT implies that the members of future software systems can vary dynamically, rather than being predetermined according to the purpose of the system. Unlike in the case of the conventional systems, in order to give adaptability to systems that change dynamically, the system rules should be designed and applied considering the dynamic changes of...
In the last decade, we have seen the emergence of the Bitcoin crypto-currency, where the Blockchain technology builds trust transaction after transaction through a validation process. Academics focused their research on security flaws or improvement, but we identify a lack of literature on how the validation of transaction and block proceeds. In fact, understanding the validation will help the conception...
This paper introduces a fitness data management system based on the Android platform for the strength fitness equipment, which can display, storage and mange fitness data. The server for this system is Tomcat and the mobile terminal's operating system is Android. App installed on the terminal interact with the database through HTTP transport protocol, which enable the visual management for fitness...
The paper presents the structure and peculiarities of the developed database used for Kharkiv incoherent scatter radar data storing. The heterogeneity of the raw data, the existence of specific periods of data acquisition, the use of the IS radar data processing program to estimate size and quality of the data, the use of the external server to store the results of data processing, and the ability...
Local databases have become an important component within mobile applications. Developers use local databases to provide mobile users with a responsive and secure service for data storage and access. However, using local databases comes with a cost. Studies have shown that they are one of the most energy consuming components on mobile devices and misuseof their APIs can lead to performance and security...
Flood is a natural disaster that many occur in Indonesia. Losses caused by the flooding is huge both materially and lives. Therefore, a system is needed that can tell when the floods come and what areas are affected to allow proper evacuation and can inform the possibility of flooding several hours before the floods occur. Flood Forecasting using Holt-Winters Exponential Smoothing Method and Geographic...
At present, the protection, inheritation, innovation and development of intangible cultural heritage in China are facing more severe opportunities and challenges. In order to overcome the shortcomings of too rigid and conservative expression, and poor interactive of traditional digital means, the virtual reality (VR) technology is applied to the protection and inheritance of the paper-cut art in this...
With the development of network technology, the design for the automatic generative system of examination papers that is based on web has become a trend. In order to reduce the burden on teachers and avoid duplication of work, we design the system to automatically generate test papers. It is based on a constantly updated examination question bank system, according to the teachers' demands, which can...
The science laboratory class is a key class in some universities. They learn a wide range of knowledge rather than specialized ones. To deepen knowledge in limited time, we propose a new method for database course. Students learn the basic knowledge from textbook. For difficult point, they can return to videos on MOOC websites. If there are still problems, they may discuss with teacher and classmates...
Nowadays the most used applications are the web based applications, for instance long range informal communication, shopping, e-learning, banking and social networking are all an examples of web based applications. It is commonly known that these Web applications are publicly available for all users around the world. This leads us to new challenges in securing these applications and exposing them...
In this work we tried to do morphological analyze both in Cyrillic Mongolian script and Traditional Mongolian script and define inflection method of suffix in accordance to orthography rule using computer.Mongolian language is an agglutinate language. The word building and word changing rules are based on the combination of grammatical and suffixes into the words stem. But the Cyrillic and Traditional...
It was analyzed the most frequent security algorithms used for information security to mitigate the integrity, confidentiality and availability of the information. The objective is to have an approach on security algorithms and define a quantitative algorithm using flowchart techniques for a process of Ecuador civil registry database. The deductive method was used to analyze the information of the...
Industrial robots are being widely used attributed to their flexibility, repeatability, and accuracy. The reliability of industrial robots are becoming more highlighted. Over-year evidence clearly indicates that the reliability of industrial robots has had a big improvement, not only by the more reliable hardware design, but also by collecting and analyzing the failure data in fields over a long period...
Being as the pivot of avionics system, Flight Management System (FMS) plays an important role in flight planning, trajectory prediction, navigation and guidance of aircrafts. Aiming at researching the functions and validations of FMS, the advanced FMS simulation is constructed. Performance Based Navigation (PBN) and Trajectory Based Operation (TBO) require high-fidelity and high-accuracy data, of...
The global forest covers over 30% of the Earth's landmass and plays a critical role in a number of global systems including the carbon cycle. Developing methods to track the carbon flow into and out of forests is necessary to gain a complete understanding of the global carbon cycle and, in turn, its effect on the climate. Remote sensing technologies such as satellite based passive optical remote sensing...
For Pleurotus eryngii product traceability system, the database design is the foundation of traceability system development and the key to achieve the efficient operation of the system. On the one hand, Pleurotus eryngii, compared with other agricultural products, has different growth characteristics and production process, which makes Pleurotus eryngii strict requirements of the growth environment...
This paper investigates the impact of the database layer on the scaling actions of the business layer of a 3-tier web service system in cloud resource provisioning. The research question is "What is the impact of the database layer on the business layer auto-scaling decisions?" In this work two hypotheses are tested: 1) "Database tier capacity has no effect on the business tier scaling...
Database driven web applications are some of the most widely developed systems today. In this paper, we demonstrate use of combinatorial testing for testing database supported web applications, especially where full-text search is provided or many combinations of search options are utilized. We develop test-case selection techniques, where test strings are synthesized using characters or string fragments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.