This paper pairs of comprehensive survey of government websites of Handan, sums up the existing major problems, generates the analysis of reasons, puts forward ways and measures to improve it: step up publicity;streng...
详细信息
ISBN:
(纸本)9781424455379
This paper pairs of comprehensive survey of government websites of Handan, sums up the existing major problems, generates the analysis of reasons, puts forward ways and measures to improve it: step up publicity;strengthening the service capacity;establish and improve related security system;emphasis on the government websites performance evaluation;encourage the public to participate in government websites;building government website-group.
This paper argued that informationtechnology (IT) can improve innovation performance in higher education institutions (HEls) and provided evidence of a linkage between IT investments and innovation performance in HEI...
详细信息
ISBN:
(纸本)9781424455379
This paper argued that informationtechnology (IT) can improve innovation performance in higher education institutions (HEls) and provided evidence of a linkage between IT investments and innovation performance in HEIs. Based on extensive empirical research, using comparative and dynamic analysis, the paper presented the integrated architecture of IT and educational innovation and explained what its competitive value is. Furthermore, this paper discussed the difficulties of IT investment in HEIs and described what needed to be done to make this linkage successful.
the social search engine, as the meaning of its name, combines the SNS (Social Network Service) and search engine. Its key point is not at social, but at the search engine. The system will use the SNS to help users to...
详细信息
ISBN:
(纸本)9781424455379
the social search engine, as the meaning of its name, combines the SNS (Social Network Service) and search engine. Its key point is not at social, but at the search engine. The system will use the SNS to help users to get their useful information quickly and accurately. This paper mainly introduces the value of social search engine, forecast and the problem may meet in the future.
With the popularity of smart phones, GPS is used more and more in the cell phone. The location information in the GPS is very significant for evidence-gaining. This paper researched and realized the operations under S...
详细信息
ISBN:
(纸本)9781424455379
With the popularity of smart phones, GPS is used more and more in the cell phone. The location information in the GPS is very significant for evidence-gaining. This paper researched and realized the operations under Symbian OS such as GPS-related applications. Firstly I introduced the concept of GPS and GPS-related knowledge in the mobile phone. Secondly I programmed cell phone GPS detection and extracted the GPS information from Nokia N95.
This paper discusses the security protection mechanisms of digital content, including digital encryption, copying detection, information hiding and digital watermarking, etc. Comparative analyzes the affiliation and d...
详细信息
ISBN:
(纸本)9781424455379
This paper discusses the security protection mechanisms of digital content, including digital encryption, copying detection, information hiding and digital watermarking, etc. Comparative analyzes the affiliation and difference among them. And take text for example, introduces the current research situation of various mechanisms in the security protection on digital text, explores the application and development prospects of them.
Wireless sensor networks based on the description of P2P network functions, the bottom of the screen, and using the network characteristics of P2P networks realized dynamic changes of sensor network support and multip...
详细信息
ISBN:
(纸本)9781424455379
Wireless sensor networks based on the description of P2P network functions, the bottom of the screen, and using the network characteristics of P2P networks realized dynamic changes of sensor network support and multiple sensor network information sharing. This sensor network as the support of data, using high application of P2P technology gives P2P wireless sensor network layer of design and implementation.
based on the analysis and research of 3D graphics engine structure and work processes, this paper establishes a complete 3D rendering engine and realizes its main function modules. The engine program is relatively sim...
详细信息
ISBN:
(纸本)9781424455379
based on the analysis and research of 3D graphics engine structure and work processes, this paper establishes a complete 3D rendering engine and realizes its main function modules. The engine program is relatively simple to achieve, has fast speed, and through the realistic rendering effects, the picture quality is greatly improved.
API interception means a particular way of interrupting API calls and altering the original API execution to the code supplied by the user. This paper introduces how to realize process concealment by Intercepting API,...
详细信息
ISBN:
(纸本)9781424455379
API interception means a particular way of interrupting API calls and altering the original API execution to the code supplied by the user. This paper introduces how to realize process concealment by Intercepting API, and discusses several kinds of implemental ways of DLL injection and API interception with emphasis, which are the central techniques of the API Hook, then provides the key code for process concealment in practice.
In order to guide the strategy of distributing movies on the CDN system, this paper proposes a method which uses data mining techniques to predict the popularity of movies. The popularity of movies which is predicted ...
详细信息
ISBN:
(纸本)9781424455379
In order to guide the strategy of distributing movies on the CDN system, this paper proposes a method which uses data mining techniques to predict the popularity of movies. The popularity of movies which is predicted is more suitable to the current CDN system. We compare the performance of the Bayesian Network and Decision Tree, and find that the Bayesian Network model is more suitable to CDN.
Aiming at the difficulty of the process improvement in the small enterprises, an improved method based on SPP Model of CMMI level 3 was proposed. The method mainly used to tailor the document, review, training, role a...
详细信息
ISBN:
(纸本)9781424455379
Aiming at the difficulty of the process improvement in the small enterprises, an improved method based on SPP Model of CMMI level 3 was proposed. The method mainly used to tailor the document, review, training, role and resource, and it simplified the complexity and enhanced the feasibility in the small enterprises. Finally, the data analysis in the case showed the availability of the tailoring process.
暂无评论