Affiliated with the General Administration of Quality Supervision and Inspection and Quarantine of the People's Republic of China (AQSIQ), China National Institute of Standardization (CNIS) is a nonprofit nationa...Affiliated with the General Administration of Quality Supervision and Inspection and Quarantine of the People's Republic of China (AQSIQ), China National Institute of Standardization (CNIS) is a nonprofit national research body engaging in standardization research. The main responsibilities of CNIS are to conduct all-round, strategic, and comprehensive research of standardization during the development process of economy and society,展开更多
Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chua...Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the GeneralAdministration of Quality Supervision, Inspection and Quarantine, called for the vigorousimplementation of technological standard- ization strategies to substantially elevate the overalllevel of Chinese standards.展开更多
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global infor...Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.展开更多
Aiming at the characteristics of modularity and reconfigurable in open architecture computer numerical control (CNC) system, the open architecture CNC system, Harbin Institute of Tech- nology computer numerical cont...Aiming at the characteristics of modularity and reconfigurable in open architecture computer numerical control (CNC) system, the open architecture CNC system, Harbin Institute of Tech- nology computer numerical control (HITCNC), is researched and manufactured based on the interface standards. The system's external interfaces are coincident with the corresponding international standards, and the internal interfaces follow the open modular architecture controller (OMAC) agreement. In the research and manufacturing process, object-oriented technology is used to ensure the openness of the HITCNC, and static programming is applied in the CNC system according to the idea of modularization disassembly. The HITCNC also actualizes real-time and unreal-time modules adopting real-time dynamical linked library (RTDLL) and component object model (COM). Finite state ma- chine (FSM) is adopted to do dynamically modeling of HITCNC. The complete separation between the software and the hardware is achieved in the HITCNC by applying the SoftSERCANS technique. The application of the above key techniques decreases the programming workload greatly, and uses software programs replacing hardware functions, which offers plenty technique ensures for the openness of HITCNC. Finally, based on the HITCNC, a three-dimensional milling system is established. On the system, series experiments are done to validate the expandability and interchangeability of HITCNC. The results of the experiments show that the established open architecture CNC system HITCNC is correct and feasible, and has good openness.展开更多
The article examines the world experience of e-learning as well as distance education technologies within the education process organization on higher and post-higher education programs.There have been listed the resu...The article examines the world experience of e-learning as well as distance education technologies within the education process organization on higher and post-higher education programs.There have been listed the results of the most popular e-learning platforms analysis.Furthermore,there have been looked through the core legislative background of the development of the mentioned technologies in Russia and worldwide among the universities,specialized in seafarers training.There have been also drawn up the points of the Admiral Makarov State University of Maritime and Inland Shipping(Admiral Makarov SUMIS)design of the distance education system LMS"FARWATER"in compliance with the International Convention on Standards of Training,Certification and Watchkeeping for Seafarers(STCW Convention).The practical application of distance education system to the advanced professional training has been discussed in the article.展开更多
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd...This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.展开更多
文摘Affiliated with the General Administration of Quality Supervision and Inspection and Quarantine of the People's Republic of China (AQSIQ), China National Institute of Standardization (CNIS) is a nonprofit national research body engaging in standardization research. The main responsibilities of CNIS are to conduct all-round, strategic, and comprehensive research of standardization during the development process of economy and society,
文摘Organized and hosted by the Standardization Administration of China, theNational Conference on Technological Innovation of Standardization was held in Beijing on March13th. In his speech at the conference, Mr. Li Chuanqing, Party Secretary of the GeneralAdministration of Quality Supervision, Inspection and Quarantine, called for the vigorousimplementation of technological standard- ization strategies to substantially elevate the overalllevel of Chinese standards.
文摘Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
基金This project is supported by Provincial Science & Technology Projoct of Heilongjiang, China (No. GB05A501).
文摘Aiming at the characteristics of modularity and reconfigurable in open architecture computer numerical control (CNC) system, the open architecture CNC system, Harbin Institute of Tech- nology computer numerical control (HITCNC), is researched and manufactured based on the interface standards. The system's external interfaces are coincident with the corresponding international standards, and the internal interfaces follow the open modular architecture controller (OMAC) agreement. In the research and manufacturing process, object-oriented technology is used to ensure the openness of the HITCNC, and static programming is applied in the CNC system according to the idea of modularization disassembly. The HITCNC also actualizes real-time and unreal-time modules adopting real-time dynamical linked library (RTDLL) and component object model (COM). Finite state ma- chine (FSM) is adopted to do dynamically modeling of HITCNC. The complete separation between the software and the hardware is achieved in the HITCNC by applying the SoftSERCANS technique. The application of the above key techniques decreases the programming workload greatly, and uses software programs replacing hardware functions, which offers plenty technique ensures for the openness of HITCNC. Finally, based on the HITCNC, a three-dimensional milling system is established. On the system, series experiments are done to validate the expandability and interchangeability of HITCNC. The results of the experiments show that the established open architecture CNC system HITCNC is correct and feasible, and has good openness.
文摘The article examines the world experience of e-learning as well as distance education technologies within the education process organization on higher and post-higher education programs.There have been listed the results of the most popular e-learning platforms analysis.Furthermore,there have been looked through the core legislative background of the development of the mentioned technologies in Russia and worldwide among the universities,specialized in seafarers training.There have been also drawn up the points of the Admiral Makarov State University of Maritime and Inland Shipping(Admiral Makarov SUMIS)design of the distance education system LMS"FARWATER"in compliance with the International Convention on Standards of Training,Certification and Watchkeeping for Seafarers(STCW Convention).The practical application of distance education system to the advanced professional training has been discussed in the article.
文摘This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court.