Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The behavior adaptation of Software component is a crucial problem in component-based software engineering. Software component adaptation aims at generating, as automatically as possible, adaptors to compensate behavior mismatch during components interaction, and ensure the deadlock-freedom of components interaction at the architectural level. A general and safe approach is proposed to solve the behavior...
This paper discussed the, meaning and related techniques of constructing the high-performance WEB sites for the self-help service system, for the sake of advance usability and dependability of the self-help service system, design the project that carrying out gather-group technique of servers and load-balanced technique in system, it is mostly considered the complexion of the difference construct...
Wenchuan Earthquake triggered more than thousands of landslides, which seriously threatened the lives and properties of local people in the disaster areas. Even though emergency investigation and monitoring have been carried on after the earthquake in order to make sure the reconstruction work well, there is still need an effective way to manage the considerable disaster information immediately. This...
This paper describes a method of digital audio public address (PA) system based on Ethernet. The main framework of the system is proposed and the core techniques are analyzed. The hardware design of network audio devices and software design are described in details in this paper. CYCLONE II EP2C5FA484 programmable FPGA chip and audio codec VS1003 are proposed in the network audio terminal design,...
Currently embedded remote monitoring technology step into a rapidly developing period. With the advancement of related technology, low cost remote monitoring system which is web-based, powerful and reliable at the same time will become the mainstream. Under this background, this paper presents a lightweight embedded remote monitoring system. The owerall system established a LAN using zensys's Z-WAVE...
In the paper, after researched current usage of RFID in automated storage and retrieval system (AS/RS), based on RFID technology , by using Kingview and some other softwares, including Visual Basic and MS Access, a control system, which can manage information in AS/RS and do storage works automatically for QXLMPS-005/1 AS/RS was established. The main steps of design process were given out. This system...
Based on the study of safety management of Major Hazard Installations, Major Hazard Installations Information Management System Based on GIS is built. This paper describes the system's development environment, design structure, function modules and so on. The system has achieved functions such as the show of major hazard maps, information management, evaluation and grade, prediction of the extent...
Basing on the idea of intrusion masking and defense-in-depth, a generic architecture of survivable storage system is presented. The architecture includes 3 subsystems: storage strategy, user management and security module. Through analyzing the overall survivability of storage systems, and importing survivable requirement into the design phase of storage systems, security and other attributes is easily...
In the video on demand system, user waiting time and bandwidth allocation are major challenges for the video broadcasting in mobile ad hoc environment. There are many broadcasting schemes which provide efficient bandwidth allocation and optimal user waiting time. In our work we divide channel into two groups (Regular Channel and Sub Channel) and video data into segments and sub-segments. Broadcasting...
Mobile agents are distributed programs which can move autonomously in a network, to perform tasks on behalf of user. Though mobile agents offer much more flexibility as compared to client-server computing, yet they have additional cost and issues such as security, reliability and fault tolerance which need to be addressed for successful adaptability of mobile agent technology for developing real life...
Adjustment and optimization of applications is an important stage throughout the software life cycle. Based on the database system coming into running applications, SQL statements on the optimization algorithms and improving the application efficiency have become an important goal. In this paper, based on the ORACLE database management system and the optimization goals, the methods and techniques...
The article stress on explanation and comparison of modern key technologies and main products of storage and backup system, by introducing original structure and current structure in stated-owned enterprise.
Video-on-Demand (VoD) systems are a category of adhoc multimedia services. To provide a quality oriented services to its users, a VoD system requires usage of various resources like bandwidth and disk space. As number of users increase the resources requirements do proportionally increase. Thus these resources are costly and important from QoS perspective. Hence efficient allocation and utilization...
Recent Developments in sensor networking for industrial application emphasized need for reliable integration of sensor networks with the internet. For sensor network deployed to record the industrial process parameter in various place of industry, it is important that collected information be delivered as fast as possible with minimum delays. In this paper, an integration module is proposed. The objective...
In this paper, a multifractal approach to the classification of unknown self affine signals is presented as an improvement over traditional traffic signal. The fundamental advantages of using multifractal measures include normalization and a very high compression ratio of a signature of the traffic, thereby leading to faster implementations, and the abiliiy to add new traffic classes without redesigning...
For the security issue in intranet storage systems, we design a data security storage system, which integrates information isolation, accessing control, virus detection, metadata safeguard of crucial data and fast-speed retrieval. This system can provide a solid foundation for data protection and multilevel storage in enterprise intranet. The result on trial displays that this system can ensure the...
Nowadays, more and more multimedia applications have appeared. As one of these applications, multimedia information publication system supporting multiple terminals and pre-editing program function is getting more and more popular. But the capacity of set-top box is limited, STB can't handle a mass of tasks. This paper proposes a method using information integration engine to restructure resources,...
C language programming is most one of important basic curriculums for computer curriculum teaching in science and engineering college. The traditional paper test is used in this curriculum examination. In order to meeting reformation needs of C language programming teaching, a paperless examination system based on WEB has been designed, The functions of the examination management and the curriculum...
Aims at some problems that exist in the current C language experimental problems in teaching, research and design of the C/S mode on the C language programming curriculum tests to the secondary system, better implementation of straightening out experimental teaching process, highlighting the main points of the experiment, it is able to effectively resolve problems of the experimental teaching.
With modern computer network technology as the primary means of financial information systems, financial management and development. The author believes that the network environment of financial system faces numerous risks on information technology and modern management level high demands. This article discusses the network security of the financial system, offers a range of preventive strategies.
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.