The automatic ticket vending machine that referred to in this paper is innovative, either from the structure, function or principle, it is fundamentally different from the tradition vending machine. It is a combination of reading card technology in industry and business, especially designed a special answer-sheet. Each card costs RMB 0.1 Yuan or less. Passengers use the purchasing ticket card in the automatic ticket vending machine, which is the rapid and intelligent process of obtaining the ticket, and greatly reducing the time in the tradition automatic ticket vending machine.
By installation of GC-02 Bluetooth module,inter-provincial express train TVM is relatively mature at present, so that passengers can, in accordance with the agreement, choose the available time, trains, departures and terminals and seats with their own Bluetooth-enabled phone. Hence, it will greatly reduce the time on the vending machine. In peak hours, passengers will experience “parallel virtual queuing”,and benefit from the less queuing time and fast tickets buying.
As the world’s most widely used phone operating system, Android has been chosen to get our lives convenient. However, as the importance of the services our cell phones support increases, so too do the opportunities for invasion. More attention should be paid to the risks of Android OS. In this paper, we analyze the Android security and then give methods based on Android privilege to prevent invasion while using or developing. The method can make users avoid most of the hacking.
This paper investigates the network security problem which is complex to evaluate. The key of this evaluation is to establish the factors and weights. Traditional methodologies cannot get rid of the key issues, resulting incorrect evaluation. In order to improve the accuracy, this paper proposes an evaluation model which is based on analytical hierarchy process (AHP) to evaluate the network security in the real-life background. There are several steps. First, evaluation factors are set up through Delphi method. Second, the weights are determined by AHP. Third, the evaluation is executed. Finally, the real-life cases are used to verify the model. The verification indicates that AHP enables to evaluate the network security efficiently in terms of objectiveness, high accuracy and comprehensiveness.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.