作者机构:
[Wentao Liu] School of Mathematics and Computer Science,Wuhan Polytechnic University
会议名称:
2018 3rd International Conference on Psychology, Information Science & Library Science (PIL 2018)
会议时间:
2018-01-10
会议地点:
加拿大温哥华
会议论文集名称:
Proceedings of 2018 3rd International Conference on Psychology, Information Science & Library Science (PIL 2018)
关键词:
Graphical user interface;Custom control;Direct UI;Message delivery mechanism
摘要:
The graphical user interface occupies an important position in the software development and the key issue is how to efficiently design the custom graphical user interface according to the function. This paper discusses several graphical user interface design techniques, including QT, MFC, WTL, WPF, GTK, wx Widgets, WEB, Java FX, and Direct UI and so on. Their advantages and disadvantages are compared, including design principles, application areas, and complexity and so on. Some Direct UI related technologies are discussed and it contains message delivery mechanism, graphics rendering engine, interface description style, control library design, interface layout and so on. The design method of software interface based on custom control is discussed, the principle and process of its realization are studied, and the flicker problem is described. Custom control can flexibly design the required interface and this paper designs a dialog which can provide very convenient custom features and can provide better compatibility and scalability.
作者机构:
[Wentao Liu] School of Mathematics and Computer Science, Wuhan Polytechnic University
会议名称:
2017 3rd International Conference on Creative Education (ICCE 2017)
会议时间:
2017-03-03
会议地点:
马来西亚吉隆坡
摘要:
With the popularity of mobile Internet, online courses learning systems have become increasingly popular and many excellent courses are uploaded to the network, so that more people can learn online co
作者机构:
[Liu, Wentao; Liu, WT] Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Hubei Province, Peoples R China.
通讯机构:
[Liu, Wentao] W;Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Hubei Province, Peoples R China.
会议名称:
2014 3rd International Conference on Material Science, Environment Science and Computer Science, MSESCS 2014
会议时间:
11 January 2014 through 12 January 2014
会议地点:
Wuhan, PEOPLES R CHINA
会议主办单位:
Wuhan Polytech Univ, Sch Math & Comp Sci, Wuhan 430023, Hubei Province, Peoples R China.
会议论文集名称:
Advanced Materials Research
关键词:
Casyncsocket;HTML5;HTTP;Server;Websocket
摘要:
The WebSocket makes the web application to deal with the web data directly in the HTML5 and it provides full-duplex communications channels using TCP connection. Some traditional web communication technologies and their shortcomings are introduced such as polling, long polling, stream and flash xml socket in this paper. The principle of the web socket is introduced and a WebSocket server is developed which can be used in the real time web environment. The server includes two modules which include the socket listener and the communication socket. The server implements the WebSocket handshake protocol and the data transfer protocol. The server is developed by C++ language which can provide high efficiency data operation and network transportation. The program is more scalability and flexibility and it uses the universal interface to implement the core functions of web socket with the CAsyncSocket.
摘要:
The canvas in the HTML5 provides very powerful ability to realize complex graphics and image operations. It can be used for developing information application about graphics such as chart module, scientific computing visualization, drawing software, animation system and information visualization and so on. It will play an important role in the web game for PC or mobile platform because the HTML5 has the platform-independent feature. In this paper a system of graphics algorithm presentation is provided and it uses the prototype object and image data structure of canvas rendering context 2D model to define the custom function to implement the graphics algorithm. It demonstrates the realization process of the principle of graphics algorithms and it shows that the canvas has great flexibility and scalability characteristics.
作者机构:
[Wentao Liu] School of Mathematics and Computer Science,Wuhan Polytechnic University
会议名称:
The 2014 IMSS International Conference on Future Manufacturing Engineering(ICFME 2014)
会议时间:
2014-12-10
会议地点:
Hong Kong,China
摘要:
The network download component is often used in many systems such as PC client software,mobile APP and some web server systems.It is also the important part in the web page crawler and the internet se
摘要:
Offline storage technology has many uses in the Web application and it can store the user status, cache data, temporary data, and persistent data and so on. In this paper several typical web client storage technologies are discussed and it includes the IE browser's unique storage technology UserData, localStorage and sessionStorage of HTML5, Web SQL Databases, Indexed Database, as well as classic storage technology Cookie and so on. Their concrete using methods are explained and their individual strengths and differences are compared. Their respective applications occasions and some issues that need attention are discussed. The general cross-browser offline storage method is presented and it can use the same application programming interface to complete different browser offline storage technologies.
摘要:
The wireless sensor networks are widely used in many fields because of its characters such as large-scale, self-organization, dynamic, reliability and so on. But its developments have encountered many problems and the security is an important problem. The traditional security protection method cannot be applied directly to the wireless sensor networks such as the intrusion detection system due to its special characteristics with limited memory and storage space. In this paper, the security problems and related protection mechanisms in the wireless sensor networks are discussed and the intrusion detections are introduced. The essential reasons of security issues in wireless sensor networks are analyzed and some intrusion attacks methods are illustrated. The security pattern in the wireless sensor networks is provided and analyzed.
摘要:
The genetic algorithm is one of the most important intelligent method in the evolutionary algorithm and it has been applied in science and engineering field widely. In order to use the genetic algorithm easily and flexibly, this paper provides a simulation platform for the genetic algorithm by using the OOP language and the platform is called SPGAO. The architecture of SPGAO is presented and each module is implemented in detail. The data structure and functions for manipulating the genetic algorithm are defined in this platform and the chromosome data type, crossover, mutation, selection operators are defined. The animation demonstration module in SPGAO is implemented using the double buffer mechanism and it can show the progress of the every step of algorithm. The multithread technology is made for the genetic algorithm. Finally an example of function optimization based on genetic algorithm in SPGAO is provided and it shows that the platform make the user to use the genetic algorithm quickly and efficiently. The SPGAO provides strong interaction and better flexibility.
作者机构:
[Wentao Liu] Department of Computer and Information Engineering, Wuhan Polytechnic University, Wuhan, Hubei, China
会议名称:
2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet)
会议时间:
April 2012
会议地点:
Yichang, China
会议论文集名称:
2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet)
关键词:
cloud computing;cloud security;strategy
摘要:
The cloud computing is a new computing model which comes from grid computing, distributed computing, parallel computing, virtualization technology, utility computing and other computer technologies and it has more advantage characters such as large scale computation and data storage, virtualization, high expansibility, high reliability and low price service. The security problem of cloud computing is very important and it can prevent the rapid development of cloud computing. This paper introduces some cloud computing systems and analyzes cloud computing security problem and its strategy according to the cloud computing concepts and characters. The data privacy and service availability in cloud computing are the key security problem. Single security method cannot solve the cloud computing security problem and many traditional and new technologies and strategies must be used together for protecting the total cloud computing system.
关键词:
web service composition;quality of service;web service;genetic algorithm
摘要:
The software architecture based on web service has become the critical technique to construct system in the distributed environments. The web service composition is the most important method to find the correct service in the complicated application circumstance. The key question is to find service based on the QoS and how to guarantee the quality. This thesis focuses the web service composition in order to get dynamic business cooperation and integration. The key component of web service is discussed and the method of web service composition is analyzed including the formalization verification and service composition architecture and the QoS-aware composition methods. Aimed at the application of web service composition, a method based on approved genetic algorithm is put forward. The simple genetic algorithm based web service composition has many problems such as slow convergence rate and non-optimal service composition. In this paper a genetic algorithm based on niche is provided for the Qos-aware composition and it can get more accurate service composition result and can get the optimal path quickly especially in the large scale problems according to the experiment.
关键词:
web service;ws-security;xml signature;xml encryption
摘要:
Traditional security technologies can't be applied in the web service security because of the special character of web service. This paper focuses on the technology of Web services and its security. The web service based on XML and SOAP in SOA is discussed and some problems which may lead to security are analyzed. The mechanism of the web service security is analyzed according to the application of web service in heterogeneous distributed system. Some security specifications of web service including XML signature, XML encryption and WS-Security are introduced. The global XML architecture in .NET platform is analyzed. The procedure of implementing the web security is presented. The character of web service security in the .NET platform and the web service enhancements are discussed.
摘要:
The DoS attack is the most popular attack in the network security with the development of network and internet. In this paper, the DoS attack principle is discussed and some DoS attack methods are deeply analyzed. The DoS attack detection technologies which include network traffic detection and packet content detection are presented. The DDoS based on DoS is introduced and some DDoS tools are described and the important TCP flood DoS attack theory is discussed. The DoS attack program and a DoS attack detection program based on Winpcap for experiment are designed and the network packet generation and capture are implemented. The experiment expressed the key progress of DoS attack and detection in detail.
摘要:
Some difficult topics can't be easily understood by students in OOP teaching program such as class, object, inheritance, polymorphism, abstract class, templates and so on because they have no class and object thinking mode before studying OOP lessons. In this paper, some typical examples are designed and discussed for these topics and some ambiguous and similar concepts which include constructor, destructors, overload, override and order of execution are compared and analyzed using particular examples. The typical examples method can make it clear for students and the classroom and experimental teaching can get better results.