期刊文献+
共找到27篇文章
< 1 2 >
每页显示 20 50 100
Research on System of Enterprises’ Information Management Based on Attribute Certificate
1
作者 张湘华 《电脑知识与技术》 2009年第12X期10590-10591,共2页
In order to accommodate the complex network data of large scale companies,this thesis analyses PMI,strategy and role hierar-chical model.On such a basis,the thesis proposes an applicable plan for access control of ent... In order to accommodate the complex network data of large scale companies,this thesis analyses PMI,strategy and role hierar-chical model.On such a basis,the thesis proposes an applicable plan for access control of enterprises’ information system based on attribute certificate. 展开更多
关键词 PKI PMI ACCESS control ATTRIBUTE CERTIFICATE
在线阅读 下载PDF
Classification Approach for Intrusion Detection in Vehicle Systems 被引量:5
2
作者 Abdulaziz Alshammari Mohamed A. Zohdy +1 位作者 Debatosh Debnath George Corser 《Wireless Engineering and Technology》 2018年第4期79-94,共16页
Vehicular ad hoc networks (VANETs) enable wireless communication among Vehicles and Infrastructures. Connected vehicles are promising in Intelligent Transportation Systems (ITSs) and smart cities. The main ob-jective ... Vehicular ad hoc networks (VANETs) enable wireless communication among Vehicles and Infrastructures. Connected vehicles are promising in Intelligent Transportation Systems (ITSs) and smart cities. The main ob-jective of VANET is to improve the safety, comfort, driving efficiency and waiting time on the road. VANET is unlike other ad hoc networks due to its unique characteristics and high mobility. However, it is vulnerable to various security attacks due to the lack of centralized infrastructure. This is a serious threat to the safety of road traffic. The Controller Area Network (CAN) is a bus communication protocol which defines a standard for reliable and efficient transmission between in-vehicle parts simultaneously. The message moves through CAN bus from one node to another node, but it does not have information about the source and destination address for authentication. Thus, the attacker can easily inject any message to lead to system faults. In this paper, we present machine learning techniques to cluster and classify the intrusions in VANET by KNN and SVM algorithms. The intrusion detection technique relies on the analysis of the offset ratio and time interval between the messages request and the response in the CAN. 展开更多
关键词 CAN-BUS IDS KNN SVM Machine Learning DOS ATTACK Fuzzy ATTACK
暂未订购
Design of a 3-tier smart middleware system for ubiquitous sensor networks
3
作者 Taegan Kim Jaeho Sim +1 位作者 Keewook Rim Junghyun Lee 《重庆邮电大学学报(自然科学版)》 2007年第3期367-371,共5页
As ubiquitous sensor networks (USN) technologies and its middleware are still at its early stages, the system of the USN relies on the middleware and applications. The past sensor networks are assumed to be designed f... As ubiquitous sensor networks (USN) technologies and its middleware are still at its early stages, the system of the USN relies on the middleware and applications. The past sensor networks are assumed to be designed for specific applications, having data communication protocols tightly coupled to applications. To avoid these problems, several kinds of USN middleware have been researched and developed. However, most middleware of USN are still restricted by its own infrastructure so far. This paper proposes appropriate 3 tier Smart Middleware System (3SMS) for USN. 展开更多
关键词 开放式网关 三层中间件系统 设计 传感器网络 UPNP
在线阅读 下载PDF
Study of Intrusion Detection Systems
4
作者 Li-Chin Huang Min-Shiang Hwang 《Journal of Electronic Science and Technology》 CAS 2012年第3期269-275,共7页
Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating syste... Modern network systems have much trouble in security vulnerabilities such as buffer overflow, bugs in Microsoft Internet, sensor network routing protocol too simple, security flaws of applications, and operating systems. Moreover, wireless devices such as smart phones, personal digital assistants (PDAs), and sensors have become economically feasible because of technological advances in wireless communication and manufacturing of small and low-cost sensors. There are typologies of vulnerabilities to be exploited in these devices. In order to improve securities, many mechanisms are adopted, including authentication, cryptography, access control, and intrusion detection systems (IDS). In general, intrusion detection techniques can be categorized into two groups: misuse detection and anomaly detection. The misuse detection systems use patterns of weB-known attacks or weak spots of the systems to identify intrusions. The weakness of misuse detection systems is unable to detect any future (unknown) intrusion until corresponding attack signatures are intruded into the signature database. Anomaly detection methods try to determine whether the deviation is from the established normal usage patterns or not. The critical success of anomaly detection relies on the model of normal behaviors. 展开更多
关键词 Anomaly detection detection systems misuse detection mobilevulnerability wireless.intrusionsecurity
在线阅读 下载PDF
Parallel Image Processing: Taking Grayscale Conversion Using OpenMP as an Example 被引量:1
5
作者 Bayan AlHumaidan Shahad Alghofaily +2 位作者 Maitha Al Qhahtani Sara Oudah Naya Nagy 《Journal of Computer and Communications》 2024年第2期1-10,共10页
In recent years, the widespread adoption of parallel computing, especially in multi-core processors and high-performance computing environments, ushered in a new era of efficiency and speed. This trend was particularl... In recent years, the widespread adoption of parallel computing, especially in multi-core processors and high-performance computing environments, ushered in a new era of efficiency and speed. This trend was particularly noteworthy in the field of image processing, which witnessed significant advancements. This parallel computing project explored the field of parallel image processing, with a focus on the grayscale conversion of colorful images. Our approach involved integrating OpenMP into our framework for parallelization to execute a critical image processing task: grayscale conversion. By using OpenMP, we strategically enhanced the overall performance of the conversion process by distributing the workload across multiple threads. The primary objectives of our project revolved around optimizing computation time and improving overall efficiency, particularly in the task of grayscale conversion of colorful images. Utilizing OpenMP for concurrent processing across multiple cores significantly reduced execution times through the effective distribution of tasks among these cores. The speedup values for various image sizes highlighted the efficacy of parallel processing, especially for large images. However, a detailed examination revealed a potential decline in parallelization efficiency with an increasing number of cores. This underscored the importance of a carefully optimized parallelization strategy, considering factors like load balancing and minimizing communication overhead. Despite challenges, the overall scalability and efficiency achieved with parallel image processing underscored OpenMP’s effectiveness in accelerating image manipulation tasks. 展开更多
关键词 Parallel Computing Image Processing OPENMP Parallel Programming High Performance Computing GPU (Graphic Processing Unit)
在线阅读 下载PDF
A Convolutional Deep Neural Network Approach for miRNA Clustering
6
作者 Ghada Ali Mohamed Shommo Hadia Abbas Mohammed Elsied +3 位作者 Amira Kamil Ibrahim Hassan Sara Elsir Mohamed Ahmed Lamia Hassan Rahmatalla Mohamed Wafa Faisal Mukhtar 《Communications and Network》 2024年第4期135-148,共14页
The regulatory role of the Micro-RNAs (miRNAs) in the messenger RNAs (mRNAs) gene expression is well understood by the biologists since some decades, even though the delving into specific aspects is in progress. Clust... The regulatory role of the Micro-RNAs (miRNAs) in the messenger RNAs (mRNAs) gene expression is well understood by the biologists since some decades, even though the delving into specific aspects is in progress. Clustering is a cornerstone in bioinformatics research, offering a potent computational tool for analyzing diverse types of data encountered in genomics and related fields. MiRNA clustering plays a pivotal role in deciphering the intricate regulatory roles of miRNAs in biological systems. It uncovers novel biomarkers for disease diagnosis and prognosis and advances our understanding of gene regulatory networks and pathways implicated in health and disease, as well as drug discovery. Namely, we have implemented clustering procedure to find interrelations among miRNAs within clusters, and their relations to diseases. Deep clustering (DC) algorithms signify a departure from traditional clustering methods towards more sophisticated techniques, that can uncover intricate patterns and relationships within gene expression data. Deep learning (DL) models have shown remarkable success in various domains, and their application in genomics, especially for tasks like clustering, holding immense promise. The deep convolutional clustering procedure used is different from other traditional methods, demonstrating unbiased clustering results. In the paper, we implement the procedure on a Multiple Myeloma miRNA dataset publicly available on GEO platform, as a template of a cancer instance analysis, and hazard some biological issues. 展开更多
关键词 MIRNA Deep Clustering DeepTrust Convolutional Neural Network Recurrence Plot
暂未订购
A Decode-and-Forward Scheme for LDPC Coded Three-Way Relay Fading Channels 被引量:2
7
作者 YE Xia GAO Feifei 《China Communications》 SCIE CSCD 2015年第8期46-54,共9页
In this paper a low-density pairwise check(LDPC) coded three-way relay system is considered, where three user nodes desire to exchange messages with the help of one relay node. Since physical-layer network coding is a... In this paper a low-density pairwise check(LDPC) coded three-way relay system is considered, where three user nodes desire to exchange messages with the help of one relay node. Since physical-layer network coding is applied, two time slots are sufficient for one round information exchange. In this paper, we present a decode-and-forward(DF) scheme based on joint LDPC decoding for three-way relay channels, where relay decoder partially decodes the network code rather than fully decodes all the user messages. Simulation results show that the new DF scheme considerably outperforms other common schemes in three-way relay fading channels. 展开更多
关键词 three-way relay channel physicallayer network coding LDPC codes decode-and forward
在线阅读 下载PDF
Improved Balas and Mazzola Linearization for Quadratic 0-1 Programs with Application in a New CuttingPlane Algorithm 被引量:1
8
作者 Wajeb Gharibi 《International Journal of Communications, Network and System Sciences》 2012年第4期208-212,共5页
Balas and Mazzola linearization (BML) is widely used in devising cutting plane algorithms for quadratic 0-1 programs. In this article, we improve BML by first strengthening the primal formulation of BML and then consi... Balas and Mazzola linearization (BML) is widely used in devising cutting plane algorithms for quadratic 0-1 programs. In this article, we improve BML by first strengthening the primal formulation of BML and then considering the dual formulation. Additionally, a new cutting plane algorithm is proposed. 展开更多
关键词 QUADRATIC PROGRAM INTEGER PROGRAM LINEARIZATION CUTTING Plane ALGORITHM
在线阅读 下载PDF
A High Performance Silicon-on-Insulator LDMOSTT Using Linearly Increasing Thickness Techniques 被引量:2
9
作者 GUO Yu-Feng WANG Zhi-Gong +1 位作者 SHEU Gene CHENG Jian-Bing 《Chinese Physics Letters》 SCIE CAS CSCD 2010年第6期179-182,共4页
We present a new technique to achieve uniform lateral electric field and maximum breakdown voltage in lateral double-diffused metal-oxide-semiconductor transistors fabricated on silicon-on-insulator substrates. A line... We present a new technique to achieve uniform lateral electric field and maximum breakdown voltage in lateral double-diffused metal-oxide-semiconductor transistors fabricated on silicon-on-insulator substrates. A linearly increasing drift-region thickness from the source to the drain is employed to improve the electric field distribution in the devices. Compared to the lateral linear doping technique and the reduced surface field technique, twodimensional numerical simulations show that the new device exhibits reduced specific on-resistance, maximum off- and on-state breakdown voltages, superior quasi-saturation characteristics and improved safe operating area. 展开更多
原文传递
Performance Evaluation of IPv4/IPv6 Networks for Ubiquitous Home-Care Service
10
作者 Cheng-Chan Hung Shiow-Yuan Huang 《Journal of Electronic Science and Technology》 CAS 2013年第3期241-248,共8页
Abstract--- Because of rapid development in network technology, Internet usage has become widespread. It allows users with sensing devices to obtain medical data for healthcare, such as physiological signals, voice, a... Abstract--- Because of rapid development in network technology, Internet usage has become widespread. It allows users with sensing devices to obtain medical data for healthcare, such as physiological signals, voice, and video streams from telemedicine systems, and to send the healthcare data to back-end database systems, creating a ubiquitous healthcare environment. However, this environment requires a widespread and suitable network. IPv6 (Internet protocol version 6) is the next-generation Internet protocol that will be the protocol of future networks; it improves many shortcomings of IPv4. In this paper, we propose an IPv6/IPv4 U-home-care test system and analyze the network's parameters though a series of tests by adjusting network parameters to find the optimal design for applications in the IPv6/IPv4 U-home-care service so as to assure good performance and high quality. 展开更多
关键词 Index Terms---Healthcare Internet protocol version6 performance TELEMEDICINE ubiquity.
在线阅读 下载PDF
Reversible Data Hiding for Medical Images in Cloud Computing Environments Based on Chaotic Hénon Map
11
作者 Li-Chin Huang Min-Shiang Hwang Lin-Yu Tseng 《Journal of Electronic Science and Technology》 CAS 2013年第2期230-236,共7页
Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In... Reversible data hiding techniques are capable of reconstructing the original cover image from stego-images. Recently, many researchers have focused on reversible data hiding to protect intellectual property rights. In this paper, we combine reversible data hiding with the chaotic Henon map as an encryption technique to achieve an acceptable level of confidentiality in cloud computing environments. And, Haar digital wavelet transformation (HDWT) is also applied to convert an image from a spatial domain into a frequency domain. And then the decimal of coefficients and integer of high frequency band are modified for hiding secret bits. Finally, the modified coefficients are inversely transformed to stego-images. 展开更多
关键词 Cloud computing environments ENCRYPTION Haar digital wavelet transformation Henonmap reversible data embedding.
在线阅读 下载PDF
Efficient and power-awareness query over sensor networks
12
作者 Sang-Hun Eo Ho-Seok Kim +1 位作者 Sook-Kyoung Cho Hae-Young Bae 《重庆邮电大学学报(自然科学版)》 2007年第3期270-275,共6页
Sensor networks consisted of low-cost, low-power, multifunctional miniature sensor devices have played an important role in our daily life. Light and humidity monitoring, seismic and animal activity detection, environ... Sensor networks consisted of low-cost, low-power, multifunctional miniature sensor devices have played an important role in our daily life. Light and humidity monitoring, seismic and animal activity detection, environment and habitat monitoring are the most common applications. However, due to the limited power supply, ordinary query methods and algorithms can not be applied on sensor networks. Queries over sensor networks should be power-aware to guarantee the maximum power savings. The minimal power consumption by avoiding the expensive communication of the redundant sensor nodes is concentrated on. A lot of work have been done to reduce the participated nodes, but none of them have considered the overlapping minimum bounded rectangle (MBR) of sensors which make them impossible to reach the optimization solution. The proposed OMSI-tree and OMR algorithm can efficiently solve this problem by executing a given query only on the sensors involved. Experiments show that there is an obvious improvement compared with TinyDB and other spatial index, adopting the proposed schema and algorithm. 展开更多
关键词 传感器网络 查询 最小界矩形 效率
在线阅读 下载PDF
Analytical models of lateral power devices with arbitrary vertical doping profiles in the drift region
13
作者 花婷婷 郭宇锋 +3 位作者 于映 Gene Sheu 蹇彤 姚佳飞 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第5期595-603,共9页
By solving the 2D Poisson's equation, analytical models are proposed to calculate the surface potential and electric field distributions of lateral power devices with arbitrary vertical doping profiles. The vertical ... By solving the 2D Poisson's equation, analytical models are proposed to calculate the surface potential and electric field distributions of lateral power devices with arbitrary vertical doping profiles. The vertical and the lateral breakdown voltages are formulized to quantify the breakdown characteristic in completely-depleted and partially-depleted cases. A new reduced surface field (RESURF) criterion which can be used in various drift doping profiles is further derived for obtaining the optimal trade-off between the breakdown voltage and the on-resistance. Based on these models and the numerical simulation, the electric field modulation mechanism and the breakdown characteristics of lateral power devices are investigated in detail for the uniform, linear, Gaussian, and some discrete doping profiles along the vertical direction in the drift region. Then, the mentioned vertical doping profiles of these devices with the same geometric parameters are optimized, and the results show that the optimal breakdown voltages and the effective drift doping concentrations of these devices are identical, which are equal to those of the uniform-doped device, respectively. The analytical results of these proposed models are in good agreement with the numerical results and the previous experimental results, confirming the validity of the models presented here. 展开更多
关键词 surface electric field breakdown voltage OPTIMIZATION
原文传递
Google Maps Security Concerns
14
作者 Aqil Burney Muhammad Asif +1 位作者 Zain Abbas Shamaila Burney 《Journal of Computer and Communications》 2018年第1期275-283,共9页
Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, ... Google Maps and other such maps in GIS have a lot of significance in every one’s life for in modern world due to technological development as well as contemporary needs in travelling, business planning, agriculture, e-marketing supply chain management, census and planning and excessive use of mobile phones. Being a revolutionary technology, it attracts the users from its inception. It has been revolutionary in having an impact on one’s daily life by helping one explore geographical locations virtually anywhere on the whole planet. It has become a norm that people use Google Maps before or while commuting to a certain place as most of the people rely on it to provide the shortest or fastest route to a destination. Google Maps has had a profound impact not only one’s personal life, but has opened new avenues of marketing, business intelligence, urban planning, infrastructure strategy development, as well as traffic engineering. Hence, no one can deny the impact it has had on our society in a short period. However, Google Maps has security concerns associated with its use. This is because whenever a user is searching for a geographical location on Google Maps, there is no way to ascertain his/her intention. As result, whatever is requested by the user, it is provided without much security checks or personal specific logging history. Criminal minded people may use the technology to carry out unwarranted and uncalled-for activities such as terror attacks, exploitation of military assets, target killing, trailing a potential victim, kidnapping, demanding ransom money, and compromising national security etc. Numbers of such activities may be carried out using the guidance from “Google Maps” without getting noticed. This is largely due to that anonymous login is allowed into Google Maps. The paper highlights the main security issues that exist in the use of Google Maps and suggests the key areas to improve upon. In this research paper, we discuss the security concerns related to Google Maps utilization and try to identify the associated risks that may be worst in some situations due to that it is significant to assess the usage of this tremendous technology. We categorize the millions of Anonymous Google Maps users into two major categories (Anonymous Good Users and Anonymous Bad Users) based on Google Maps browsing and analyze the associated risks and potential threats and propose the way to minimize them. In future, if Google Maps adopts the proposed techniques and improves upon, then its utilization minimizes security concerns and makes the world much safe place. 展开更多
关键词 Google Maps ANONYMOUS USERS CYBERCRIME SECURITY Issues SECURITY CONCERNS Spatial Information Signup Mechanism Potential Threats
暂未订购
A Survey of MANET Survivability Routing Techniques
15
作者 Malik N. Ahmed Abdul Hanan Abdullah Ayman El-Sayed 《International Journal of Communications, Network and System Sciences》 2013年第4期176-185,共10页
Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have deve... Mobile ad hoc networks have a wide range of application usage today, due to its great services, easy installation and configuration, and its other distinctive characteristics. In contrast, the attackers also have developed their own way to disrupt MANET normal operations. Many techniques, approaches and protocols have proposed to support Mobile Ad hoc Network (MANET) survivability in adversarial environment. Survivable of routing operations is the key aspects of the challenge in MANETs because most of destructive attacks classified as active attacks and all are intent to attack MANET routing operation to prevent it from providing it services in a right time. In this paper, we will discuss the most effective and practical initiatives have designed to keep MANET survive in an adversarial environment and how it supporting MANET availability. 展开更多
关键词 MANET SURVIVABILITY ROUTING TECHNIQUES
暂未订购
Carving Thumbnail/s and Embedded JPEG Files Using Image Pattern Matching
16
作者 Nurul Azma Abdullah Rosziati Ibrahim Kamaruddin Malik Mohamad 《Journal of Software Engineering and Applications》 2013年第3期62-66,共5页
Images (typically JPEG) are used as evidence against cyber perpetrators. Typically the file is carved using standard patterns. Many concentrate on carving JPEG files and overlook the important of thumbnail in assistin... Images (typically JPEG) are used as evidence against cyber perpetrators. Typically the file is carved using standard patterns. Many concentrate on carving JPEG files and overlook the important of thumbnail in assisting forensic investigation. However, a new unique pattern is used to detect thumbnail/s and embedded JPEG file. This paper is to introduce a tool call PattrecCarv to recognize thumbnail/s or embedded JPEG files using unique hex patterns (UHP). A tool called PattrecCarv is developed to automatically carve thumbnail/s and embedded JPEG files using DFRWS 2006 and DFRWS 2007 datasets. The tool successfully recovers 11.5% more thumbnails and embedded JPEG files than PredClus. 展开更多
关键词 Component JPEG Image Pattern MATCHING FILE CARVING DFRWS 2006/07 THUMBNAIL
在线阅读 下载PDF
Prediction of the Bombay Stock Exchange (BSE) Market Returns Using Artificial Neural Network and Genetic Algorithm
17
作者 Yusuf Perwej Asif Perwej 《Journal of Intelligent Learning Systems and Applications》 2012年第2期108-119,共12页
Stock Market is the market for security where organized issuance and trading of Stocks take place either through exchange or over the counter in electronic or physical form. It plays an important role in canalizing ca... Stock Market is the market for security where organized issuance and trading of Stocks take place either through exchange or over the counter in electronic or physical form. It plays an important role in canalizing capital from the investors to the business houses, which consequently leads to the availability of funds for business expansion. In this paper, we investigate to predict the daily excess returns of Bombay Stock Exchange (BSE) indices over the respective Treasury bill rate returns. Initially, we prove that the excess return time series do not fluctuate randomly. We are applying the prediction models of Autoregressive feed forward Artificial Neural Networks (ANN) to predict the excess return time series using lagged value. For the Artificial Neural Networks model using a Genetic Algorithm is constructed to choose the optimal topology. This paper examines the feasibility of the prediction task and provides evidence that the markets are not fluctuating randomly and finally, to apply the most suitable prediction model and measure their efficiency. 展开更多
关键词 STOCK Market Genetic Algorithm Bombay STOCK Exchange (BSE) Artificial Neural Network (ANN) PREDICTION Forecasting Data AUTOREGRESSIVE (AR)
暂未订购
Ultrasound Mediated Delivery of Liposomal Doxorubicin in Mice with Glioma
18
作者 Feng-Yi Yang Shih-Cheng Horng 《Engineering(科研)》 2012年第10期68-71,共4页
Malignant brain tumors remain difficult to treat with chemotherapy because the blood–brain barrier (BBB) limits the amounts of potent agents that can reach the tumor, such that the drugs are unable to reach therapeut... Malignant brain tumors remain difficult to treat with chemotherapy because the blood–brain barrier (BBB) limits the amounts of potent agents that can reach the tumor, such that the drugs are unable to reach therapeutic dosage. Although various targeted carriers that encapsulate chemotherapeutic agents have been shown to improve drug delivery to brain tumors, the BBB is still a major obstacle in the use of chemotherapy for the treatment of these tumors. Human glioblastoma-bearing mice were injected intravenously with doxorubicin (Dox) encapsulated in atherosclerotic plaque-specific peptide-1 (AP-1)-conjugated liposomes or unconjugated liposome. These treatments took place with or without BBB disruption induced by transcranial pulsed high-intensity focused ultrasound (pulsed HIFU). This study showed that the treatment with Dox encapsulated in AP-1-conjugated liposomes followed by pulsed HIFU enhanced the accumulation of the cytotoxic drug in cells and inhibited the growth of brain tumors in vivo. Combining pulsed HIFU with cytotoxic agents might improve their efficacy in patients with brain tumors while simultaneously reducing the drug side effects. Further investigation is required to provide a comprehensive physical characterization of the sonication process and to determine its bioeffects. 展开更多
关键词 FOCUSED ULTRASOUND IL-4 Blood-brain BARRIER Brain Tumor Drug Delivery
暂未订购
An Innovation of an Academic Cloud Computing Service
19
作者 Wen-Lung Shiau Han-Chieh Chao Chia-Pin Chou 《Journal of Software Engineering and Applications》 2012年第11期938-943,共6页
Despite the popularity of cloud computing services, few studies have investigated academic cloud computing services. This study explored the innovation of an academic cloud, the Ming Chuan University Cloud System (MCU... Despite the popularity of cloud computing services, few studies have investigated academic cloud computing services. This study explored the innovation of an academic cloud, the Ming Chuan University Cloud System (MCUCS). A cloud computing service provides numerous benefits to an organization. We conducted a comprehensive review and observation of MCUCS and identified 8 benefits for teachers and 10 for students. Teachers and students agreed that MCUCS consistently provided a service that improved their performance. The most beneficial features of MCUCS were its high usage and user satisfaction. Between April 2010 and April 2012, the usage exceeded 878 300 events. Overall student satisfaction with MCUCS was 79.2%, and teacher satisfaction was 86%. We concluded that MCUCS provides a good model of an academic cloud computing service and a high qualified system. 展开更多
关键词 INNOVATION ACADEMIC Cloud Computing SERVICE Evaluation BENEFITS SATISFACTION
暂未订购
The Impact of E-commerce on the Development of Regional Economy and Its Analysis of Security Strategy
20
作者 Pengfei GAO 《International Journal of Technology Management》 2015年第5期59-62,共4页
The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively dis... The rise of electronic commerce has broken the traditional trading mode, changed people' s production and life, has gradually become an important factor of regional economic development. The paper comprehensively discuss on present situation and characteristics of electronic commerce development in our country, on basis of it, the paper analyze electronic commerce major impact on regional economic development, and put forward to strengthen the development of e-commerce related strategies to promote regional economic development role. 展开更多
关键词 Network shopping E-commerce system Regional economy Security strategy
在线阅读 下载PDF
上一页 1 2 下一页 到第
使用帮助 返回顶部