Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleMay 2023
Design and Implementation of College English Online Learning Platform
ICETM '22: Proceedings of the 2022 5th International Conference on Education Technology ManagementPages 91–98https://doi.org/10.1145/3582580.3582596The rapid development of the international process has made English the most widely used foreign language. However, due to the limited enrollment scope, uneven distribution of high-quality teachers' resources, high cost of classroom setting, single ...
- research-articleSeptember 2021
Finite element method coupled with TLBO for shape control optimization of piezoelectric bimorph in COMSOL Multiphysics
Finite element methods (FEMs) are more advantageous for analyzing complex geometry and structures than analytical methods. Local search optimization techniques are suitable for the unimodal problem because final result depends on the starting point. On ...
- short-paperMay 2021
Application of Remote Control and Video Technology Based on Internet in Jamming Station
CONF-CDS 2021: The 2nd International Conference on Computing and Data ScienceArticle No.: 85, Pages 1–4https://doi.org/10.1145/3448734.3450815This paper mainly studies remote control and video technology based on Internet. Using the JAVA language in the Eclipse environment to dahua TP1 camera and HLK - RMO4 P2P module source code editor and combination, the HLK - RMO4 P2P module information ...
- ArticleNovember 2020
Security Assessment and Hardening of Autonomous Vehicles
AbstractIn recent years, experts have noted the risks of hacking the autonomous vehicles. Since the latter become more complex, the number of potential vulnerabilities and the constraints on security algorithms increase. This paper proposes a model ...
- research-articleJune 2019
Effective convolution method for privacy preserving in cloud over big data using map reduce framework
Cloud computing is used to connect several number of remote servers through Internet to accumulate and recover large data anywhere and anytime. As of the conventional privacy defending process, there is a possibility for malevolent assault on the ...
-
- research-articleFebruary 2019
Efficient multi‐objective particle swarm optimisation based ranking system for cloud service selection
Cloud computing knowledge achieves the prominent role in elaborating the systems and distributing the applications throughout the internet. Currently, in a cloud computing environment, expedient service selection is essential, since cloud users dependably ...
- research-articleOctober 2018
Design and Implementation of Random Sampling System of Astronomical Spectrum
ICBDR '18: Proceedings of the 2nd International Conference on Big Data ResearchPages 192–195https://doi.org/10.1145/3291801.3291810Spectral library contains massive celestial spectra, including millions of spectral data of various types, and the spectral information is mainly stored in FITS file. In astronomical research, it is often necessary to obtain various spectra quickly and ...
- articleJanuary 2018
Performance Evaluating System Based on MapReduce in Context of Educational Big Data
International Journal of Organizational and Collective Intelligence (IJOCI-IGI), Volume 8, Issue 1Pages 1–12https://doi.org/10.4018/IJOCI.2018010101The Big Data subsist in every characteristic of our daily life. The educational Big Data is one of these aspects of Big Data which is linked to student life. This article provides the comprehensive understanding of the implementation of the grade ...
- ArticleJuly 2016
The Design and Implementation of a Cross-Platform Teaching System
AbstractWith the development of computer technology and network technology, the traditional test mode is not able to fully meet digital, standardized test requirements. Traditional exam modes include artificial test paper, artificial marking, several ...
- articleOctober 2014
Simulation Tool for Inventory Models: SIMIN
International Journal of System Dynamics Applications (IJSDA), Volume 3, Issue 4Pages 109–124https://doi.org/10.4018/ijsda.2014100106In this paper, an integrated simulation optimization model for the inventory system is developed. An effective algorithm is developed to evaluate and analyze the back-end stored simulation results. This paper proposes simulation tool SIMIN (Inventory ...
- ArticleOctober 2013
Evaluation of Software-Oriented Block Ciphers on Smartphones
AbstractThe main purpose of block ciphers is to ensure data confidentiality, integrity and robustness against security attacks. Nevertheless, several ciphers also try to be efficient in encryption and decryption phases, have a small energy consumption and/...
- research-articleJuly 2013
MODTOHAFSD - A GUI based JAVA code for gravity analysis of strike limited sedimentary basins by means of growing bodies with exponential density contrast-depth variation
Computers & Geosciences (CGEO), Volume 56, Issue CPages 131–141https://doi.org/10.1016/j.cageo.2013.02.005Based on the principles of modeling and inversion, two interpretation methods are developed in the space domain along with a GUI based JAVA code, MODTOHAFSD, to analyze the gravity anomalies of strike limited sedimentary basins using a prescribed ...
- research-articleOctober 2012
Adaptive multi-level compilation in a trace-based Java JIT compiler
OOPSLA '12: Proceedings of the ACM international conference on Object oriented programming systems languages and applicationsPages 179–194https://doi.org/10.1145/2384616.2384630This paper describes our multi-level compilation techniques implemented in a trace-based Java JIT compiler (trace-JIT). Like existing multi-level compilation for method-based compilers, we start JIT compilation with a small compilation scope and a low ...
Also Published in:
ACM SIGPLAN Notices: Volume 47 Issue 10 - articleJune 2012
Autonomous role discovery for collaborating agents
Software—Practice & Experience (SPRE), Volume 42, Issue 6Pages 707–731https://doi.org/10.1002/spe.1091Role-based collaboration is an emerging methodology to facilitate an organizational structure, provide orderly system behavior, and consolidate system security for both human and non-human entities, like agents, that collaborate and coordinate their ...
- ArticleAugust 2011
Study of Long-Distance Real-Time Data Transmission Technology Based on Web
ICDMA '11: Proceedings of the 2011 Second International Conference on Digital Manufacturing & AutomationPages 1129–1132https://doi.org/10.1109/ICDMA.2011.278This article introduces the principle of Remote based on web, It describes in details the key technology in socket programming to reaLize Remote control software which is described in the JAVA and VC++ language environment. The key technology and method ...
- ArticleJuly 2011
Distributed Java-Based Content Protection
COMPSAC '11: Proceedings of the 2011 IEEE 35th Annual Computer Software and Applications ConferencePages 420–425https://doi.org/10.1109/COMPSAC.2011.62The increasingly sensitive nature of data shared over the Web calls for a new approach to cross-domain content protection. Towards addressing this need, in this paper we introduce a novel Java-based architecture for distributed content protection Java - ...
- ArticleNovember 2010
Researches on the Applications of Mass Short Messages in Hospital Information System
MINES '10: Proceedings of the 2010 International Conference on Multimedia Information Networking and SecurityPages 949–951https://doi.org/10.1109/MINES.2010.201-Mass SMS becomes one of the widely-used technical method in many areas now. Considering the real application of HIS, however, connection to the phone in this way is more convenient and quickly. How to use the MSCOMM control with the programming design ...
- articleNovember 2010
Application note: Open geospatial technology standards and their potential in plant pest risk management-GPS-enabled mobile phones utilising open geospatial technology standards Web Feature Service Transactions support the fighting of fire blight in Norway
Computers and Electronics in Agriculture (COEA), Volume 74, Issue 2Pages 336–340https://doi.org/10.1016/j.compag.2010.08.006The threat posed by invasive alien species to global crop production and biodiversity is recognized as one of the major drivers of global change today. Here we report on a successful implementation and operational use of new technology to support risk- ...
- ArticleMay 2010
Study on Virtual Experiment Platform of Computer Network
ICICTA '10: Proceedings of the 2010 International Conference on Intelligent Computation Technology and Automation - Volume 03Pages 648–651https://doi.org/10.1109/ICICTA.2010.782The paper aims at studying how to design and develop a virtual experiment platform, and solving the difficulties of the course experiment project for Computer Network. By creating actual 3D scene and instruments, abundant human-machine interaction, ...
- articleApril 2010
Transport supervision of perishable goods by embedded context aware objects
Intelligent freight objects can be introduced in order to simplify the solution of complex logistical planning tasks. This enables splitting logistical problems to local executable subtasks. The concept of Ubiquitous Computing (UbiComp) presents a model ...