The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper firstly introduces workflow technology and Activiti workflow framework. Then through the description of the fixed asset management in the power industry, the system is wholly designed. Component-based principle, object oriented development mode and the Three-tier architecture in Java EE were used in the system. For the complexity in the fixed assets management of electric power industry,...
The Big Data computing is one of hot spots of the internet of things and cloud computing. How to compute efficiently on the Big Data is the key of improving performance. By means of distributed computing or memory computing, many companies and institutions provide some technologies and produces. But they are invalid in the scene in which there are real-time demands in the low-configure cluster. To...
Concentration of Carbon monoxide (CO) and Carbon dioxide (CO2) that high in the air is very dangerous for human life. Carbon monoxide is a poisonous gas that damages the circulation of oxygen in the blood when inhaled, while carbon dioxide is one of the gases that cause global warming. Both gases are classified as colorless and odorless gas so that the necessary special tools to monitor their concentration...
Dynamic memory allocation is one of the most ubiquitous operations in computer programs. In order to design effective memory allocation algorithms, it is a major requirement to understand the most frequent memory allocation patterns present in modern applications. In this paper, we present an experimental characterization study of dynamic memory allocations in seven real-world widely used applications...
In 2013, the Center of Excellence in Remote Sensing Education and Research (CERSER) added more satellite receiving hardware to its current National Oceanic and Atmospheric Administration (NOAA) satellite system [2]. The program now processes both NOAA satellite images as well as Geostationary Operational Environmental Satellite (GOES) [8] satellite images. This new imaging capability required the...
Camel culture is an important part of the Mongolian nomadic culture. Although there are many current related works about camel culture, not many resources can be queried and applied directly through the network. In the new economic development era, it is an important way to promote and protect the traditional ethnic culture combining the advantages of information technology, using computer technology...
Service resiliency is crucial to the operation of global-scale cloud applications with fine-grained replication (FGR). If poorly designed, a few disruptions may cause cascading failures or severely impair the level of service. Due to high complexity of FGR configuration problem, existing techniques usually rely on over-provisioning and static replica configuration to achieve reliability to a certain...
Domain Name System is the most widely used protocol for domain name resolution in the Internet. Domain name resolution is necessary for most of Internet services and it is usually provided by DNS full resolvers. Unfortunately, many reports indicated that DNS protocol was also used in botnet communication recently. Botnet communications between bot-infected computers and Command and Control (C&C)...
Developers' daily work produces, transforms, and communicates cross-cutting information across applications, including IDEs, emails, Q&A sites, Twitter, and many others. However, these applications function independently of one another. Even though each application has their own effective information management mechanisms, cross-cutting information across separate applications creates a problem...
Video Capture of university lectures enables learners to be more flexible in their learning behaviour, for instance choosing to attend lectures in person or watch later. However attendance at lectures has been linked to academic success and is of concern for faculty staff contemplating the introduction of Video Lecture Capture. This research study was devised to assess the impact on learning of recording...
If originally computers were used only as a tool to perform some calculations, nowadays computers has a lot of functions to help people finish their tasks in almost every aspect of human life. As a lot of various functions computers have, they also need different specifications for each computer so they can do their tasks according to their functionalities. Therefore this application was build with...
The integrity and confidentiality of the multilevel security communication are guaranteed by using the key obtained from key negotiation process. To ensure the safety of this process is very important. The quantum key distribution process is unconditionally secure. This paper uses this process to distribute the authentication keys and the session keys, which are used in IPSec process. Thus, the method...
This paper aims at presenting a possible solution for solving problems that may occur during the admission process in higher education system related to the high school diplomas submitted by candidates. Without questioning the good faith of candidates, there are situations that can raise suspicions about the authenticity of the diplomas. In this regard, it would be useful to have a portal through...
The paper presents an improvement of assessment model using RFID (Radio Frequency Identification) technology which implemented on Computer Based Test (CBT). The RFID worked at frequency 13.56 MHz. The RF-CBT system is constructed with User-PC and Server-PC. A RFID reader module (Mifare RC522, Microcontroller ATMEGA328) and LabVIEW program are installed on User-PC. An RFID tag information from User-PC...
As a central course of computer science, Data Structure plays an important role in cultivating computer specialty students. In this course, programming practices are especially crucial, but there are some problems with the current programming learning methods. For this reason, we design and develop a distributed online Data Structure learning assistant system, which is based on ICPC modes and .NET...
According to the special feature of Trados, in this paper, the significant and function of the real-time voice system in English linguistics teaching was analyzed and the application of client in English linguistics teaching from three aspects discussed. At last, the Trados in English linguistics teaching was prospected.
University laboratory is very important place for teaching and scientific research. Our approach is to build the system on the campus network, and use the C/S-B/S model. Now the Opening Laboratory Reservation System (OLRS) has been adopted in practice and the results show that it can not only improve work efficiency and the utilization of equipment, save resources easy and visual to operate, but also...
Databases are always the main target of attackers because they contain the critical data of organizations. Although prevention techniques are available, the history of system breakins guarantees that there is no foolproof technique that totally eliminates security loopholes in a computer system. Hence, efficient damage assessment and recovery techniques are needed. Traditional methods require scanning...
Sound attack is meant as the initiation of the tone. Good attack involves the simultaneous start of exhalation along with the emission of sound. This situation is known as a soft attack. Much more common is a hard type of attack, which is normally used while speaking. It involves tightening of the vocal cords before the expiration. Unfortunately, this state is tiring for the ligaments and can cause...
The article describes the representation of the database structure as a graph, discusses in detail the developed algorithm of searching the shortest route of extracting information from a set of alternative routes.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.