Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Automatic train control system (ATC) is widely used in China, which effectively improve the efficiency of train operations, reduce system maintenance and construction costs, etc. In view of this situation, we propose the use of structural analysis and design language (AADL) for ATC modeling and analysis, It is described by automatic train protection (ATP), automatic train supervision (ATS) and Automatic...
In this paper, a new method for ECG biometric recognition using a hierarchical scheme classifier is presented. The integral process of the method is introduced, including preprocessing, feature extraction and classification. To achieve a better performance of proposed method, cross-validation is applied to determine the parameters in the classifier. As a result, proposed method offers considerably...
Traffic identification technique is used for classification of different network protocols and applications even with detection of users' network activities. In this paper, we conduct our study on some typical users' network activities and present a traffic identification method to describe the feature about users' behaviors. We convert users' network activities information into different sequences...
Big data has brought new challenges to Top-k in data partitioning and parallel programming model. In order to overcome these problems, a new Top-k query algorithm for big data based on MapReduce is proposed. Based on the features of MapReduce, this paper presents an in-depth study of Top-k query on big data from the perspective of data partitioning, data reduce, etc. Theoretical and experimental results...
In order to remove the problem of the shadow of moving vehicles in video surveillance, this paper presents an algorithm based on projection features of the connected regions to eliminate the dynamic shadow. Firstly, the Frame Difference method is applied to image blocks to extract the background. Then, the moving vehicles are detected as the foreground in the current frame by background subtraction...
K-means is one of the most significant clustering algorithms in data mining. It performs well in many cases, especially in the massive data sets. However, the result of clustering by K-means largely depends upon the initial centers, which makes K-means difficult to reach global optimum. In this paper, we developed a novel algorithm based on finding density peaks to optimize the initial centers for...
The missing trajectory problem is a difficulty in various transportation applications, e.g. the road which the truck usually travels and the driver's behavior. Most of previously developed missing data are not concerned about the spatial and continues space. Therefore, in this article, an algorithm is proposed to complete the missing trajectory in a vehicle's trace. The possible traces are found out...
Resource scheduling is a main research direction of cloud computing technology. In the emergency material dispatch, the unexpected event has the characteristics of high uncertainty and strong destructive. Therefore, the demands for accuracy and timeliness of data analysis are very high, and only through the efficient and accurate implementation of emergency dispatch, we can get the possible realization...
The identification of Web servers has great significance for assessing security of Web system, researching market share and forecasting the scope of influence on a network security incident. This paper introduces the principle of the Web server detection technology based on HTTP, and analyzes how to identify Web servers from aspects of the Banner information, HTTP response characteristics and special...
CSLN is the citation semantic link network that combines the citation network and the semantic network. This paper firstly gives the model of CSLN. CSLN model not only makes the citation network to have semantics, but also make the citation network to have reasoning ability. Then the paper gives the method of constructing the citation semantic link network. Finally, the experiment verifies the effectiveness...
As computer software systems grow ever more sophisticated, so do the mechanisms used in compromising them. Some of the most advanced cyber attacks in recent years would have required considerable preparation and research on the specific software applications and the hardware they targeted. In this paper we focus on native applications and evaluate different reverse engineering techniques with a focus...
Understanding the videos' popularity evolution in social media is important to service providers, video uploaders and viewers. Such understanding can not only drive the improvement of load balancing in the network, but also can be helpful in advertising and discovering new business opportunities. While concentrating on the evolution of video's cumulative number of views after uploading, by modifying...
A Cyber-Physical System (CPS) is defined as integrations of computation and physical processes. In CPS, small embedded devices are used to monitor and manage the physical process. Because of these physical devices with limited resources, it is impossible to perform complex calculations and processing. In view of this situation, we apply Service-oriented Architecture (SOA) concepts to CPS, called a...
Specification is a kind of efficient way to help improve software quality in software engineering. Many quality related documents in real application development are full of non-effective information. This paper gives method to elicit effective information from software quality specification. A software quality specification ontology model is built as a knowledge support for quality specification...
Modern software systems often run on a changing and unpredictable environment, they need to adapt itself at runtime in response to changing requirements of users and running environment. Therefore, numerous methods have been proposed to support the development of self-adaptive system. Some approaches are requirements-based. Other approaches are architecture-based. By considering only a partial view...
With the increasing amount of detected genes and gene products, more and more unknown functions of genes and gene products need to be predicted. A lot of methods are proposed to predict gene functions, but most of them neglect the existing annotation information. This article proposes a novel method to predict function similarity between genes and gene products based on existing annotation information...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.