Online Room-Booking System Based on Database

2014 ◽  
Vol 513-517 ◽  
pp. 1748-1751
Author(s):  
Ping Teng

With the rapid development of network technology, the Internet and electronic commerce technology is unceasingly used, the application scope of computer application in the hospitality industry booming, online room-booking system also increasingly mature. In this paper, based on the analysis of the present situation of online room-booking system, conducts specific design and system implementation of online room-booking system.

Author(s):  
Priya Yadav ◽  
Pranjeet Das ◽  
Ravi Kumar Malhotra

E-commerce is process of doing business through computer networks. Advances in wireless network technology and the continuously increasing number of users of mobile latter on make an ideal platform for offering various high utilityservices in just a snap of a finger to the mobile users and give pace to the rapid development of E-Commerce in India.E-commerce is considered an excellent alternative for companies to reach new customersbut the fact that has hindered the growth of e-commerce is security. Security is the challenge facing e-commerce today and there is still a lot of advancement made in the field of securityfor increasing the use of e-commerce in developing countries the B2B e-commerce is implemented for improving access to global markets for firms in developing countries. With the special characteristics and constraints of mobile terminals and wireless networks and the context, situations and circumstances that people use their hand-held terminalswhich will ultimately fuel explosive ecommerce growth in India This paper highlights the various key challenges and opportunities which Indian e-commerce industry may face in the upcoming years. And also discuss challenges in electronic commerce transactions.


2012 ◽  
Vol 170-173 ◽  
pp. 2789-2793
Author(s):  
Yi Qiang Chen ◽  
Hai Ping Xiao ◽  
Wei Liu

Along with the rapid development in the Internet network technology and the constant improvement in the GIS technology as well as the urgent demand for geographic information sharing and mutual operation application, WebGIS has become a hot issue in the field of the GIS application. WebGIS has made up for the traditional limitations of the GIS application, thus making GIS achieve the function of true information data sharing. In such case, it accelerates the process of informationalization of the city fundamental geography. Therefore, it has strong promotion and the application value.


2016 ◽  
Vol 2016 ◽  
pp. 1-14 ◽  
Author(s):  
Hong Zhong ◽  
Song Li ◽  
Ting-Fang Cheng ◽  
Chin-Chen Chang

With the rapid development of the Internet, electronic commerce has become more and more popular. As an important element of e-commerce, many Internet companies such as Yahoo! and eBay have launched electronic auction systems. However, like most electronic commerce products, safety is an important issue that should be addressed. Many researchers have proposed secure electronic auction mechanisms, but we found that some of them do not exhibit the property of unlinkability, which leads to the leakage of users’ privacy. Considering the importance of privacy preservation, we have designed a new auction mechanism. Through symmetrical key establishment in the registration phase, all messages transmitted over the Internet would be protected and, meanwhile, achieve the property of unlinkability. The security analysis and performance analysis show that our protocol fulfills more security properties and is more efficient for implementation compared with recent works.


2014 ◽  
Vol 687-691 ◽  
pp. 1832-1835
Author(s):  
Lin Wang

In 1980s and 1990s, with the rapid development of the "fourth media" of the Internet, a new literary form is accompanied by the generation of the internet. It is the "network literature." Today, the network has gone through decades of literature, literary garbage from the original to today's market legend, generate network literature and creative literary works for the development of a new model provides an unprecedented. Review network literature development process, we have to admit that the great network technology used in modern Chinese literature and transmission. How to guide the development of network technology and application in modern Chinese literary creation and dissemination, and for the prosperity of cultural undertakings to promote the harmonious development of society will play a positive role. To solve these problems, from the perspective of vector-borne departure of network technology, this article consider the creation and dissemination of modern Chinese literature to conduct a comprehensive sort, and to the existence of network technology in modern Chinese literature and communication problems, present their views and solutions.


2013 ◽  
Vol 339 ◽  
pp. 292-296
Author(s):  
Hong Ji

With the rapid development of computer technology and network technology, the information age is quietly approaching. The development and application of the Email system is to be promoted. Email system plays an important role which provides efficient, convenient, safe and accurate transmission of information. The Email delivery relates to the activities of the personal privacy, however, the internet is an open network, the mail transmission will be a security threat from all sides which through the internet. The mail system security issue has become increasingly prominent and become the focus of growing concern. The paper describes basic principle of mail system, furthermore, it analyses the property of security risk and proposes mail security policy based on network technology.


2011 ◽  
Vol 55-57 ◽  
pp. 1679-1682
Author(s):  
Pu Liu

With the rapid development and extensive application of network technology, the concept of IOT (Internet of Things) is coming into view. Through information sensing device, according to the agreed protocol, IOT can connect anything to the Internet and to achieve the exchange of information and intelligence management. This paper elaborates the core technologies of the IOT, describes the application of IOT, analyzes the three major issues of IOT development constraints, and makes a few comments to promote the development of IOT.


2014 ◽  
Vol 687-691 ◽  
pp. 2296-2299
Author(s):  
Ying Yue

In the process of rapid development of network technology, dynamic web page has become the mainstream of the Internet, as people gradually deepening love for pop music, make music combined with the network to meet the needs of people for pop music, this paper designs of the pop music website based on ASP technology, illustrates the trends of pop music, and briefly introduces the features of Website. Firstly, study the theory and working principle of ASP technology; secondly design the features of website, including online play, search song and other functions in the front desk service and the backstage management two modules, finally, for the design of the website, study the maintenance of pop music website. Contents of this paper not only enrich people’s lives, but also have great significance for the development of pop music.


2004 ◽  
Vol 23 (4) ◽  
pp. 269-273
Author(s):  
Ihssan Alkadi ◽  
Ghassan Alkadi ◽  
Zhiwei Zhu

Since the beginning of the Internet, electronic commerce (E-commerce) has grown rapidly. The rapid development of information technology has brought many business opportunities for companies doing business in a global market. This paper discusses the issues that affect a company's business operations in a global market.


2013 ◽  
Vol 475-476 ◽  
pp. 1219-1225
Author(s):  
Yan Zhang ◽  
Sha Sha Jiang ◽  
Jun Bin Zhang ◽  
Lei Lu

With the rising user number of mobile smart terminal and the rapid development of Internet in our country, the demand of resources sharing between mobile terminal and the Internet becomes more and more urgent. However, the mobile banking based on mobile smart terminal is facing increasingly serious security threatens. On the basis of a comprehensive analysis of the development and present situation of mobile banking, this paper describes the related security mechanism and potential security threatens of mobile banking. Furthermore, information security technology and development trend of mobile banking are comparised and summarized in this paper, and the security assessment demand for mobile banking is proposed.


2014 ◽  
Vol 1078 ◽  
pp. 321-324
Author(s):  
Dong Ming Zhao ◽  
Kai Feng Zhu

With the rapid development of network technology, computer networks and the Internet have become an important force in promoting social development, many enterprises and government agencies have been or are preparing to build its own internal network as the center of the entire information system, through a variety of methods accessed internal network to the Internet, thereby greatly enhanced their information acquisition and processing capabilities. Isolated net gap is an enterprise-level physical isolation technology; its generation is to solve the problems that exist in network security.


Sign in / Sign up

Export Citation Format

Share Document