Based on the RFID (radio frequency identification) technology features, the paper make a deep analysis of the RFID technology effect on all aspects of the logistics supply chain management to make it achieve synergy a...
详细信息
ISBN:
(纸本)9781424455379
Based on the RFID (radio frequency identification) technology features, the paper make a deep analysis of the RFID technology effect on all aspects of the logistics supply chain management to make it achieve synergy and optimization, and proposed information sharing and security protocols for the exchange of information in the supply chain management process.
Database is a part of the information systems (IS) which contains all of the data that the IS should have [I). In this paper, a database for a football league has been designed by classifying and representing those da...
详细信息
ISBN:
(纸本)9781424455379
Database is a part of the information systems (IS) which contains all of the data that the IS should have [I). In this paper, a database for a football league has been designed by classifying and representing those data in categories and using the Thai football league for a case study. Each category consists of the data which is significantly important and needs some tools to analyze and store as beneficial information. The prototype (design) database for football league had then been investigated and verified by the experts of the Thai football league. The result can then be further studied and implemented for improving the efficiency and cost benefits.
Along with the infiltration of wireless sensor network in every field of our life, sharing sensor network resources in Internet environment is one of key problems which must be solved by wireless sensor network applic...
详细信息
ISBN:
(纸本)9781424455379
Along with the infiltration of wireless sensor network in every field of our life, sharing sensor network resources in Internet environment is one of key problems which must be solved by wireless sensor network application. This paper expounds Web Service technology and uses Web Service technical framework for reference to design a new kind of service-oriented sensor network structure. And finally, it introduces in detail the established wireless sensor network from software and hardware, etc.
In order to improve the accuracy of risk assessment of corporate networks, the paper introduces the concept of network shell into the field of security risk assessment. After analyzing the actual needs of corporate ne...
详细信息
ISBN:
(纸本)9781424455379
In order to improve the accuracy of risk assessment of corporate networks, the paper introduces the concept of network shell into the field of security risk assessment. After analyzing the actual needs of corporate networks, we give the risk assessment model of network shell, then based on this model we analyze the application of network shell and give the algorithm to repair the network shell through the attack graph. After that, a calculation method of the integrated value of network shell is given. Finally, an example is given to verify the validity of assessment model.
E-government is a rapidly growing phenomenon in both developed and developing countries. Recognizing the perceived benefits, governments are investing huge sums in e government initiatives. However, very few e-governm...
详细信息
ISBN:
(纸本)9781424455379
E-government is a rapidly growing phenomenon in both developed and developing countries. Recognizing the perceived benefits, governments are investing huge sums in e government initiatives. However, very few e-government projects succeed. There are technical and economic failures. This paper presents the nature and problems of e-government. An integrated approach to developing a successful one-stop portal e-government is introduced including knowledge management and efficient personalised services.
In this paper we present a new technique for non photo-realistic rendering by using genetic programming. Our technique produces aesthetically pleasing animations in which a subject gradually emerges from a random coll...
详细信息
ISBN:
(纸本)9781424455379
In this paper we present a new technique for non photo-realistic rendering by using genetic programming. Our technique produces aesthetically pleasing animations in which a subject gradually emerges from a random collection of brushstrokes. We employ triangular brushstrokes with three different possibilities of strokes drawing on the canvas. The animations are evaluated by using a numerical measure of similarity to a target image and a qualitative evaluation of aesthetic characteristics by an artist. We provide many facilities to the artists to control the rendered images and create desirable animations.
This paper proposes a new method for simulating realistic three-dimensional yarn. Main factors that decide yarn appearance are firstly pointed out through analyzing yarn structure. Secondly, we present a method by usi...
详细信息
ISBN:
(纸本)9781424455379
This paper proposes a new method for simulating realistic three-dimensional yarn. Main factors that decide yarn appearance are firstly pointed out through analyzing yarn structure. Secondly, we present a method by using the steps as follows: (1) Building a basic yarn model by means of adopting the NURBS curve to design the yarn cross-sectional shapes and control the centreline of yarn path;(2) Inserting twist effect on the yarn appearance. And then 3DS MAX 2010 is selected to simulate yarn by means of the method described above with the aim to create more realistic geometry for fabrics.
Adaptive controlling and classifying ieee802.16 WiMAX standard and ieee802.11 Wireless LAN Networks standard is our main focus in this paper. All of advantages and benefits are in using this standard and its aspects. ...
详细信息
ISBN:
(纸本)9781424455379
Adaptive controlling and classifying ieee802.16 WiMAX standard and ieee802.11 Wireless LAN Networks standard is our main focus in this paper. All of advantages and benefits are in using this standard and its aspects. Some functions and algorithms in improving wireless networks, especially WiMAX access networks has been described and presented in this paper. Modules and functions in analyzing WiMAX and WLAN networks provide a standard link in using and applications of these kinds of networks.
Assessment for computer network attack is a technology for assessing hostile attacks against computer network system. In the paper, relevance vector machine is applied to assessment for computer network attack. Compar...
详细信息
ISBN:
(纸本)9781424455379
Assessment for computer network attack is a technology for assessing hostile attacks against computer network system. In the paper, relevance vector machine is applied to assessment for computer network attack. Compared with support vector machine assessment method, the RVM method can provide better classification accuracy. The experimental data collected in the paper include U2R attack, R2L attack, Probe attack and DoS attack. It can be seen from the experimental results that it is an effective model for assessment of network attack.
The traditional landscape garden teaching methods can not meet the needs of students learning at any time and at any place. Therefore, a campus tree species management information system based on. Net technology was d...
详细信息
ISBN:
(纸本)9781424455379
The traditional landscape garden teaching methods can not meet the needs of students learning at any time and at any place. Therefore, a campus tree species management information system based on. Net technology was developed. This system is picture-based, together with the detailed text description, to provide a platform for students studying at any time and at any place. This system also provides an efficient tool for management of tree species in campus.
暂无评论