The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the advent of modern online services such as cloud, security of remote machines has become a major concern. Remote Attestation is a term recently introduced by the Trusted Computing Group that enables a platform owner to the remotely verify the trusted state of the client platform. For this purpose, TCG based attestation or Integrity Measurement Architecture is proposed. The major problem with...
As it often happens in cryptography, a visual cryptographic method serves as primitive for more evolved file encryption algorithm. During the development and evaluation process of the pixel sieve method, several weaknesses popped out. In the attempt of solving these weaknesses a possibility to transform the method from pixel based graphical cryptographic method to a bit based file cryptographic method...
This paper considers and suggests efficient patrol of nurses from analysis result of nurse calls log. As the method of analysis, we consider applying Bayesian network. This is one of probability model that is available for prospects of a phenomenon, rational mind decision and so on. In conventional studies, correlation coefficient was used to examine relation between phenomena. However, we could analyze...
In order to save volume of home energy consumption effectively, this paper proposes the method for being aware of factors with influence on energy consumption and then confirms if it works for practical data by numerical experimentation. The basic idea is based on the combination of information entropy for the former and on Bayesian network for the latter. Using 345 responses for the questionnaire...
Index structure system of urban rail transit is analyzed and optimized by applying information entropy. In this paper, a security evaluating C2R model on analyzing urban rail transit is set up based on DEA. Finally, a case study about Guangzhou Metro Line 1 is carried out, and annual relative validity of subway operation safety is evaluated by using the Matlab software program. According to the results...
In this paper, we give an introduction to Chinese standard Universal Transport Interface (UTI) for digital television receiving devices. UTI standard, with independent intellectual property rights, is based on the high speed USB2.0 physical interface. It has two logical interfaces: TS interface and command interface. It aims not only to support the conditional access (CA) service, but also to support...
The direction to civil service pension policy has become the axis problem of China's pension system adjustment. The previous pension researches were more concerned about plan balance, but paid less attention to the reform of some specific groups and the balance effects of pension reform among different groups. Through Pareto-improving ideology, this study promoted China's pension system in shape,...
As the development of e-commerce and the implementation of network accounting, companies have achieved operational and financial integration. More and more enterprises begin to use advanced information technology to re-engineer the organizational structure and change management models. In this environment, corporate accounting system has gradually become an information society. In this paper, from...
As natural disasters are becoming more frequent, especially the recent "Haiti's earthquake" has once again reiterated the important role of the Emergency Logistics, and the inventory management in emergency logistics is one of the important part. This paper aimed at the deficient of traditional methods of inventory management in the emergency logistics, forecast the demand for all kinds...
The land is foundation of human survival and development, land sustainable use is related to human survival and development. Taking Daqing City as an example, the paper constructs evaluating indicator system basing on the characteristics of Daqing's land. Combining the entropy theory and the matter-element to construct the evaluate model, the paper evaluates the land sustainable use degree with macroscopic...
In the e-commerce transaction process, varieties of network fraud problems occurred frequently. A C2C service reputation evaluation model under Cloud computing is Proposed. Firstly, the paper analyzes the four factors impact reputation evaluation under the cloud computing environment, and analysis the weights of each factor quantitatively. Secondly, a method to calculate the long-time reputation,...
The global financial crisis sprang from the Wall street have swept all the world, the financial markets and real economies in developed countries are badly affected. As the world's third largest economy, china can not sit idly. Affected by the crisis, in 2008 China's economic growth began to decline from the peak and declined quarter by quarter, the annual growth rate was 8% of the troika that promtes...
SMEs are the foundation of sustainable development of the national economy, which is important for the sustainability of economic development. However, financing Supporting the sustainable growth of SMEs have some problems that including endogenous financing is not strong, that exogenous financing is high cost, narrow channels, lack of credit. In this paper, we are by the financing and financing cash...
Syslog play an increasingly important role as a technological means of security audit in the monitoring equipment and resources. From the actual needs,the project design and realize audit logging . Compare the differences between RFC5424 and RFC3164, and achieve the syslog protocol with rsyslog. The project use PHP programming to implement user management interface and support to query log with Combination...
Porting applications to Distributed Computing Infrastructures (DCIs) is eased by the use of workflow abstractions. Yet, estimating the impact of the execution DCI on application performance is difficult due to the heterogeneity of the resources available, middleware and operation models. This paper describes a workflow-based experimental method to acquire objective performance comparison criterions...
The intelligent building system integration is a hot topic in the construction sector currently. The processing decision required to give in emergency, is to achieve the controlling, linkage, coordination and optimization goals, providing the time of escaping and passages for supervisors. In this paper, the mutual controlled monitoring and communication technology which is based on dual tone multi-frequency...
Based on the researches of E-education GRID and Cooperative Intelligent Grid, a new cooperative intelligent grid based E-education platform was designed.
The objective evaluation of the factors influencing the performance of the innovation talents is the key to the effective investment into the innovation. Up to now, some methods as survey, experiment, case study, etc. have been used to study the performance of talents. However, most of them are qualitative approaches. So, to raise the objectivity of the study, the paper applies Fuzzy Analytic Hierarchical...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.