The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Facing the problem and current situation of the power grid master-slave station dispatching system architecture, this paper using the master-slave station distributed file system and master-slave station two-level business platform to divide the traditional master station business into master-slave station interacted distribution business, also issued the master-slave station distributed integration...
VoIP aims to provide safe, high efficient and low cost voice communications. It can even offer more comprehensive and quality services than the traditional telephone. Soft-Switch has the characteristics of simplicity, openness and flexibility. This paper advocates the VoIP voice communication system based on Soft-Switch. For its implementation we design and analyze the overall structure of the system...
Merchant acquirer is a business of acquiring debit card, credit card, and prepaid card transactions using EDC (electronic payment terminals) in merchants. It is included in one of the top business priority areas in PT. XYZ. It is in the area of retail payments and deposits. It increases fees based incomes, cheap funds, and high yield loans. In order to improve its business performance, PT. XYZ needs...
The current PKI has problems like certificate revocations and fraudulent certificates. To address such issues, we propose TwinPeaks, which is a new infrastructure to distribute public keys of named entities online. TwinPeaks leverages certificateless public key cryptography (CL-PKC), which we extend to make the public key of an entity depend on any combination of its networking parameters; thus TwinPeaks...
This paper presents a research of applying software-based SDN network virtualization technology across data centers in a large enterprise. The development history of SDN was briefly reviewed at the beginning, followed by introductions to two SDN network virtualization solutions based on overlay network. An implement method in an enterprise is elaborated based on SDN solutions. This method is proved...
Enterprises are under great pressure to be nimble and adjust quickly to ever shifting business priorities and constantly evolving technologies. This is usually seen as a driver to adopt Cloud technologies, however, the existing large investments in on premise IT infrastructure and data residency constraints combined with decreasing IT budgets precludes a fast and immediate migration to public or private...
With the development of healthcare technology and medical standard, the demands of the quality and efficiency of mobile nursing are increased significantly, hence it is necessary to improve hospital nursing mechanism dealing with massive tasks. In this paper, we develop an optimized mobile nursing system based on the specific nurse workflow analysis in obstetrics. An efficient integration system framework...
Indoor location can be of great assistance to shoppers: it enables them to find products, navigate around a large store or receive location specific promotions. Business owners also benefit from the collection of location data and movement patterns, as well as the potential for increased revenue and customer engagement by communicating with the user while in the shop. However, so far the lack of ubiquitous...
Network packet capture and analysis technology is a cornerstone of network security and protocol analysis technology. On the analysis of the LAN IP network traffic monitoring requirements, this paper detailed introduces the design ideas of traffic monitoring system based on WinPcap technology, expounds the key technologies and features in the process of system implementation, focusing on huge amounts...
Cloud federation is a group of aggregated providers, who are mutually cooperating and collaborating to share their resources in order to improve each other services. It has lured the attention of commercial industries towards itself for its effective utilization of cloud resources. Effective management of the resource is very much required in order to increase the profits of an individual service...
Recently, iBeacon is popular used in many fields to push notification to visitors or customers by smart phone APP installed beforehand. Local culture protection organization, such as museum, historic relics park, etc., has the task to disseminate local culture via new IT. iBeacon and smart phone APP, two hotspots research, can be used to push and illustrate local culture information. This research...
The detailed designs, technologies and implementations of cloud storage are presented, including the multi-tenant concurrency, separated framework between buffer and business etc. Master/Workers partition algorithm is adopted to improve the reading and writing efficiency for big data in the cloud storage. A cross-platform interface is provided by using RESTful API. Meta files and their permissions...
This paper presents about requirement elicitation in engineering for elderly care mobile application develpoment. As parent growing old, they need more attention especially from their son or daughter. In contrary, their child becomes mature and needs to gain their ideal like attending higher school or college or taking a job at other city. Based on this problem, it needs to keep their relationship...
Software Defined Networking (SDN) gives idea about including programming to the network with the opportunity to dynamically actions to be performed related to flow descriptions. Packet Header is the first phase of this process. In this concept, we illustrate improved action detection over conventional algorithms. This is achieved by analyzing various packet parameters (header fields of packet such...
As The integration of Physical space and cyberspace, the large-scale data distributing to diversification terminal which is geographical distribution of mass has become a huge challenge. When the data size can't be processed by the technology for traditional scope, how to deal with the user quality of service and efficient use of system resources has become an important issue of concern, with the...
In the Information Age, the problem of information overload as a form of explicitly good news or pollution has become more popular, the consumer's attention also becomes the scarce resource to be allocated. Member card can provide personal identification, authentication, data storage, and relevant application. It may provide strong marketing media for customer relationship within business organizations...
The Comprehensive Student Service Platform for institutions of higher education, an integrated management platform constructed based on unified development platform, unified database and re-arrangement of the “student business domain”, aims for realizing an integrated management of the student-oriented core business, fully covering the management of lifecycle business for students, from their registration...
Under most circumstances, cyber criminals will commit fraudulent transactions using proxy services which hide their real IP address and physical location. This is done in an effort to avoid being tracked and prosecuted by law enforcement agencies. This paper presents the investigation of a proxy detection methodology and efforts to implement such technology into a business solution with the sole purpose...
Mobile Marketing is a powerful means to grow business. Tremendous increase in the count of mobile users has motivated the mobile marketing to high level in the last several years. Emerging as a new type of mobile marketing, mobile location-based services (MLBSs) have attracted major attention of mobile users and the businessman now a days. Signal Processing is used to get latitude and longitude of...
This paper proposes an alternative of configuration management system development using IT ontology and semantic technology. To make the IT service management more effective especially the configuration management, the manager needs the appropriate and ad-hoc analysis for decision making. Our approach proposes a knowledge base to accompany the conventional database system in order to flexibly cope...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.