The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Information technologies are a helpful tool in the teacher-student interaction. Teachers can give support to students without the need for an 100% in person contact, which is needed in the context of Bologna paradigm. For many activities, no schedule match is needed, since students access to resources and send requests to teachers whenever they need. In this paper the work of two Electrical Engineering...
PHP and MYSQL has been the main web development tool for it is free and open source. The authors have discussed the environmental issues in development process based on PHP and MYSQL and the implementation process of the website ZhuoQi.
Internet education has more and more percent in tradition education because the network technology develops faster in this 21 century. In order to take full advantage of the network resource in universities, and accelerate the college education reform, we develop Campus Network Based Teaching Resource Management System. This system applies the B/S architecture based JSP, The JSP language which is...
Based upon the software reliability and reliability design of information system, this paper puts forward various measures of software structure design, software error-avoided design of simplified design, reuse design and interface design, software error-tolerated design of redundancy design, robust design and recovery design, software error checking and correcting design. Thenceforth a primary prospect...
In the paper, after researched current usage of RFID in automated storage and retrieval system (AS/RS), based on RFID technology , by using Kingview and some other softwares, including Visual Basic and MS Access, a control system, which can manage information in AS/RS and do storage works automatically for QXLMPS-005/1 AS/RS was established. The main steps of design process were given out. This system...
Because of the limit of the domestic configuration software which is in the use of scrutinizing the coal mine, the ActiveX technique is discussed and the design of the safety of coal mine, which utilize the ActiveX technique, is actualized. The fig of system frame and the implementation of part of modules are also given. This system can provide the friendly interface for the controlling of coal mine,...
The article stress on explanation and comparison of modern key technologies and main products of storage and backup system, by introducing original structure and current structure in stated-owned enterprise.
In this paper, CDA&A, a program for develop the professional acquisition and analysis software for engineering measurement written with Lab Windows/CVI. CDA&A includes many features of general interest to generate the professional measurement software (PMS), such as data acquisition, data display, data processing, and file operations. As the program is written using Lab Windows/CVI, a C-programming...
In order to improve the stability, validity and reliability of network management, the management architecture of multi-agent network is analyzed, and the communication and language between the multi-agent are introduced. Finally, a Distributed Network Management Framework based on multi-agent is presented. The functions of each module and mutual cooperation process in the framework are outlined....
The 21st century is the information age. Every university student should take possession of certain information capabilities. It is the basic level of university students. This paper sets forth the contents of the information capabilities, and explores the effective training ways.
This paper presents a hybrid intelligent method to design Morphological-Rank-Linear (MRL) perceptrons to solve the Software Development Cost Estimation (SDCE) problem. The proposed method uses a modified genetic algorithm (MGA) to determine the best particular features to improve the MRL perceptron performance, as well as its initial parameters. Furthermore, for each individual of MGA, a gradient...
This paper presents an approach to providing better safety for adolescents playing online games. We highlight an emerging paedophile presence in online games and offer a general framework for the design of monitoring and alerting tools. Our method is to monitor and detect relationships forming with a child in online games, and alert if the relationship indicates an offline meeting with the child has...
Virtual screening is a newly emerging method used in new drug research and development (R&D). The introduction of virtual screening immensely reduces R&D cycle and decreases R&D cost directly. Mass of chemical data used for virtual screening needs to be managed effectively in certain ways. We have developed the first release of ChemDataBase, but it only has the basic functions of chemical...
To overcome the shortcomings of compatibility with different CAN (Controller Area Network) communication devices and applicability in different fields for the current real-time monitoring systems for ECU (Electronic Control Unit) based on CAN bus, a novel architecture for the monitoring system was put forward, and the corresponding monitoring software has been developed, which consists of a communication...
Through the analysis of the existing educational technology management status, combining with the existing project management knowledge systems and educational technology management knowledge, this paper proposes a management program based on educational technology and realizes it. This program is a common program to solve such problems and therefore has a high versatility and practical value.
We introduce the concept of database proxies capable of mitigating the gap between two disjoint productivity-enhancing techniques: Component Based Software Engineering (CBSE) and Real-Time Database Management Systems (RTDBMS). The coexistence of the two techniques is neither obvious nor intuitive since CBSE and RTDBMS promotes opposing design goals, CBSE promotes encapsulation and decoupling of component...
It's convenient for people's communication by Internet's rapid growth. Tengxun QQ is IM with excellent function using by large amount of Internet users and because of its large cardinal number of users, it becomes a target which is attacked by many Internet illegal users. This paper firstly introduces us QQ virus and their classification, virus phenomenon and several solutions about attacking for...
The recent years have seen a flurry of research inspired by social and biological models to achieve the software autonomy. This has been prompted by the need to automate laborious administration tasks, recovery from unanticipated systems failure, and provide self-protection from security vulnerabilities, whilst guaranteeing predictable autonomic software behavior. However, runtime assured adaptation...
This paper introduces a software as a service (SaaS) application which is designed and delivered in high level maturity model. In order to realize the configurability, metadata is used to define all the variability points of the application. Meanwhile, JMX is used to manage the metadata so that changed metadata can be hot deployed immediately during runtime. Scalability is discussed both in application...
Along with benefits of ERP system companies experience high costs associated to them. Setting up and maintaining the infrastructure and adjusting standard ERP software to a specific customers requirements drive the costs of such systems. To lower the total cost of ownership companies employ software as a service (SaaS) paradigm: instead of owning software they subscribe to it. However, this does not...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.