The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
PHP and MYSQL has been the main web development tool for it is free and open source. The authors have discussed the environmental issues in development process based on PHP and MYSQL and the implementation process of the website ZhuoQi.
Recently, there have been many advances in the research underlying condensed co-change graph, but most research has focused on the discovery of the graph feature. There still few works have done with consideration that the mass unchanged artifacts profoundly effect on the clustering. This paper presents a method for constructing more accurate condensed co-change graph. By using random walk, all the...
The behavior adaptation of Software component is a crucial problem in component-based software engineering. Software component adaptation aims at generating, as automatically as possible, adaptors to compensate behavior mismatch during components interaction, and ensure the deadlock-freedom of components interaction at the architectural level. A general and safe approach is proposed to solve the behavior...
This paper describes a method of digital audio public address (PA) system based on Ethernet. The main framework of the system is proposed and the core techniques are analyzed. The hardware design of network audio devices and software design are described in details in this paper. CYCLONE II EP2C5FA484 programmable FPGA chip and audio codec VS1003 are proposed in the network audio terminal design,...
Currently embedded remote monitoring technology step into a rapidly developing period. With the advancement of related technology, low cost remote monitoring system which is web-based, powerful and reliable at the same time will become the mainstream. Under this background, this paper presents a lightweight embedded remote monitoring system. The owerall system established a LAN using zensys's Z-WAVE...
In the paper, after researched current usage of RFID in automated storage and retrieval system (AS/RS), based on RFID technology , by using Kingview and some other softwares, including Visual Basic and MS Access, a control system, which can manage information in AS/RS and do storage works automatically for QXLMPS-005/1 AS/RS was established. The main steps of design process were given out. This system...
The article stress on explanation and comparison of modern key technologies and main products of storage and backup system, by introducing original structure and current structure in stated-owned enterprise.
Although many studies proved that it was possible to embed application servers on a chip with limited resources, security considerations were generally marginalized. Due to their frontal position, application servers are subject to an increasing number of threats. These vulnerabilities are actually ignored in most cases mainly because of cost constraints. This paper introduces the concept of Secure...
User's behaviors in information systems have different formats in different working modes, they mean users' intention actually. API callings, menu selections or requests are the familiar base elements of software behaviors, and different technologies are required to monitor and understand them. In information systems, it is necessary to insure that users' software behavior is trusted while processing...
The progress of distributed interaction simulation is restricted by the traditional Basic Simulation Computing Resource (BSCR). It is difficult to speedily customize BSCR on demand. Aiming at this question, a BSCR management platform is proposed based on the virtualization technology. Upon the platform, users could apply for a Virtual Machine (VM) as BSCR to execute simulation application. B/S architecture...
A software cloud is ready-made for software delivery or Software as a Service (SaaS). As it becomes more and more popular, security problems of software running in the cloud also become an important issue. The threats, such as destroying system softwares and access violation, are frequently emerging in the field of software cloud. In this paper, we propose a watermark-aware trusted running environment...
Increase in emphasis on risk management allows for better enterprise IT risk management. Early risk identification and assessment ensures effective risk management steps are formulated. The formulation and sustenance of an IT risk management framework is one of the critical and challenging tasks of modern corporate enterprise risk management. The existence of a risk assessment tool allows for effective...
As applications grow more and more complex, the current software faces a great challenge in dynamism. This paper proposes to modernize legacy software towards runtime plug-and-play architecture using service-oriented component model. Our object is to provide runtime plug-and-play feature for software to simplify development and adapt to changing execution environment. We propose a two-stage modernization...
Model-based testing helps test engineers automate their testing tasks so that they can be more cost-effective. When the model is changed due to the evolution of the specification, it is important to maintain the test suites up to date for regression testing. A complete regeneration of the whole test suite from the new model, although inefficient, is still frequently used in practice. To handle specification...
To follow the technology advancement and satisfy the needs on the RTI software in the “Cloud computing” age, a scheme of remodeling the traditional RTI software to be with “Platform as a Service (PaaS)” architecture was proposed. Software construction, sub-component functions and the method of interacting based on the remodeled RTI software on the WAN were studied. The focus was scheduling computing...
To improve the intelligent reconstruction ability of manufacturing system, and quicken the development and manufacture of the products, a networked manufacturing oriented integrated control model is proposed based on the deeply analysis of networked integrated control for enterprise. The inside and outside integrated control of the enterprise is implemented by Common Object Request Broker Architecture...
Testing and debugging account for at least 30% of the project effort. Scientific advancements in individual activities or their integration may bring significant impacts to the practice of software development. Fault localization is the foremost debugging sub-activity. Any effective integration between testing and debugging should address how well testing and fault localization can be worked together...
Virtualization is an effective mean of supporting the new internet architecture research,The ForCES idea of control element and forwarding element separation provide a basis for router virtualization. This paper focus on the research of virtual service application implement base on the ForCES framework, we built a virtual service application architecture based on the ForCES framework in PC, this system...
As monitor plays a critical role in self-healing loop as the basis of self-healing, this paper proposes a comprehensive monitor model for self-healing systems on the basis of building model for general applications and organically combining monitor methods for different attributes of files. The monitor model can improve the performance of self-healing by reducing the grain size of monitor and recovery...
Classroom response systems have been envisaged to be one of the most useful e-learning technologies that have been notably employed to improve interactivity in classrooms. Students use state-of-the-art technology to convey their responses anonymously to the instructor's questions. Analysing the responses is necessary to attain higher understanding of the lecture's material by students. This paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.