The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web services hold a great promise of implementing the B2B e-commerce by dynamically integrating business processes over the Internet. It is necessary to automatically and accurately select appropriate Web services satisfying client requirements before and after integrating business processes. However, current Web services standards do not well support it. We propose a formal method to select appropriate...
In modern society, especially on the Internet, you might have found you are having more and more usernames or IDs and passwords, which contains your private information. There are too many for you to remember and it is unsafe to write them down on you notebook. To solve this problem, this paper made a design and implementation of Passwords Management System (PMS), by which you can manage your usernames...
In distance education, the elementary function of data management system is to handle the related data in network teaching in filtering, sorting and classification, and make it to be the useful information for management and decision-making. Through the analysis and comparison of the commonly used data management modes that mainly used for calculating the learners' learning information in network...
In this paper, a diffusion mechanism for encrypting data in the electronic code book (ECB) mode is introduced. Our diffusion mechanism treats the encryption leakages of the ECB mode by using a substitution/permutation network (SPN), which diffuses the bytes of the data together before encryption. The tests were made on AES and RC6 block ciphers implemented in the ECB mode pre-processed with our mechanism...
The so-called PageRank algorithm has been used at Google for properly ranking search results. It quantifies the importance of each page by the structure of links in the web. In our recent work, we have proposed a distributed randomized approach for the PageRank computation, where the pages find their own values by communicating with linked pages. This paper builds upon this approach to improve the...
With the development of P2P technology, research on flexibility of P2P system will be the leading direction in the P2P technology research. Through in-depth analysis the "platform/plug-in" architecture, this paper puts forward a design of P2P system based on "JXTA/Plug-in", it not only solutes the interoperability problem of heterogeneous P2P system, and implement the function...
It's necessary to accelerate the modernization process of folk sports' reservation and ways and means of passing down. Based on Web system, this research uses advanced computer technology, information technology and database theory, to establish necessary database for folk sports to design and develop management information system, so as to achieve modernization and maximize reservation and passing-down...
Based on user's browsing path, a novel clustering model is proposed to cluster Web users. It represents users' characteristics by their transaction paths and presents a new similarity computational method-WUSC (Web user similarity calculation). Considering the relationship between the common path and the whole path of the user, combining with the residence time of user's paths to calculate the similarity...
A solution to evaluate network workload by data fusion is put forward, which can be for surveillance the traffic of interconnected communications network in order to keep the network working well by identifying potentially serious problems in the early stages and evaluating network performance. Through fusing the historic network traffic data and network online traffic data, which is based on least...
In this paper, we developed a analysis framework for the online auction in people-to-people (P2P) lending. In online P2P lending auctions, the bidding object is dividable in one auction, lenders bid for the privilege of supplying all or part of the requested loans. It is this characteristic that distinguishes online P2P lending auctions from other general auctions. We tackled this problem by dividing...
In high technological complexity industrial systems, the operators' role is more and more critical. They need deeper and deeper specialization and a continuous monitoring of both process and plant to achieve high efficiency and proper working. That requires a continuous training and upgrading of the operator knowledge to react promptly and properly to the different plant/process situation to manage...
Handling the problem of finding all of the occurrences of a string in a given text is solved through using string matching techniques where string matching represents one of the major problems that should be solved by computer technologies. With regards to information retrieval, pattern matching was widely implemented as well as Web search engine. There are major and important tasks executed by string...
We present a system to extract definitions from a term using the Web. Definitions are organized according to a typology and its context. The structural and functional design is described; emphasizing its relevant components: the extractor of definitional context to candidates using the Yahoo!'s BOSS API; the extractor of definitional contexts and a clustering module based on textual energy as a measure...
This paper presents a field study on Web security vulnerabilities from the programming language type system perspective. Security patches reported for a set of 11 widely used Web applications written in strongly typed languages (Java, C#, VB.NET) were analyzed in order to understand the fault types that are responsible for the vulnerabilities observed (SQL injection and XSS). The results are analyzed...
This paper introduces a non-traditional Web search problem, referred to as ??process-based search??, and focuses on the query analysis and formulation of this type of search. Traditional information retrieval models were created based on the assumption that one query can be answered by one document. A query needs to properly specify the topic being requested. Recently published work, referred to as...
With the development of mobile communication, there arises the requirement of ubiquitous access to Internet Email service from small screen terminals such as mobile phones and Pads. This paper proposed a framework, MMSEmail, for delivering Emails to mobile phones through Multimedia Messaging Service (MMS). MMSEmail integrates the functions of Email proxy, content adaptation broker and MMS sender....
Based on web interactive digital technology to exhibit the achievements of digital recovery for cultural heritage, it is better for the purpose of the dissemination of Chinese culture. In the three-dimensional virtual environment, the camera which could be independently controlled was added. Based on web interactive technology, character animation technology, collision detection and path planning,...
Applying automatic summarization to search engine can make it easier for users to find out the content of the Web page. In this paper, the results of search engine are analyzed. On the basis of query keywords expansion, we propose a new summary approach which calculates the sentence weight utilizing the information of the distance between words. The results of experiment show that this method can...
This paper shows two improvements of twisted-Ate pairing with Barreto-Naehrig curve so as to be efficiently carried out by dividing the calculation loops of Miller's algorithm based on divisor theorem. Then, this paper shows some experimental results from which it is shown that each improvements accelerate twisted-Ate pairing.
Search engines on the Web have popularized the keyword-based search paradigm, while searching in databases users need to know a database schema and a query language. Keyword search techniques on the Web cannot directly be applied to databases because the data on the Internet and database are in different forms. So keyword search systems in relational databases have recently proposed. However existing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.