The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to improve the quality of teaching of Japanese intensive reading courses, improve the quality of higher education, improve the quality of personnel training, and improve the level of scientific research, strengthen the social service ability, optimize the Japanese intensive reading courses in discipline. Put forward the curriculum design of Web network based on the teaching of Japanese intensive...
This paper presents a kind of architecture design of bus based CNC system of domestic-processor based on Loongson and analyzes both the design of module structure of domestic-processor based on Loongson and the function and implementation method of MII bus based CNC main control board. These studies can solve the problem of chip of domestic NC system chip and have great significance to improve the...
The rapid development of extra-high voltage, smart power grid and energy internet leads to relative lagging of production management. This management strategy develops electric big data in depth and realizes an intelligent management platform with full life cycle management, standard defect closed-loop management, safety risk control, equipment state evaluation, etc. as its main carriers on the basis...
Most of the existing methods achieve co-saliency detection at single level. In this work, we combine the object-level and region-level processing to detect co-salient objects in a group of images. At the object level, we formulate proposal selection as an outlier detection problem. We find good region proposals and generate a template for each image. At the region level, we introduce the smoothness...
Along with our country the implementation of the strategy of developing the new energy, solar energy is a kind of ideal clean energy future energy, with the power grid operation requirements of photovoltaic power generation system is increasing day by day, for the needs of the operation and control, is necessary for photovoltaic system monitoring, photovoltaic power plant key components of condition...
The evaluation of network system effectiveness is the key method to judge whether the system network architecture is stable and effective. This paper adopts the entropy method and the experience of decision makers to establish the evaluation system of the network efficiency of the intelligent distribution network monitoring service system, basing on the evaluation index of network effectiveness obtained...
It is systematic and comprehensive in building construction, and the construction project between safety investment and overhead with self correlation, there is a close relationship with the quality of construction, to analyze the relationship between the construction site safety investment and loss, to improve the quality of the project and has important significance to reduce the project cost through...
Space information network is an important development direction of future information network, and LEO-satellite DTN network is an important part of space information network. As LEO (low earth orbit) satellite network is characterized by big delay, frequent interruption and highly variable topological structure, the issue of routing has become the bottleneck constraint to the development of this...
In today's highly competitive market, the industry must focus on production yield to keep a competitive advantage. Through Automatic Optical Inspection (AOI) or Automated Visual Inspection (AVI), products can be monitored the situation and improved the quality of production. With the development of network technology, operators can use the graphical user interface (GUI) to capture remote visual images...
With the continuous development of communication technology, Unified Communication (UC) has also attracted much attention. At present, most of the Unified Communication servers are deployed on virtual machines, but virtual machines have the characteristics of large resource occupation, slow startup speed, poor flexibility and low efficiency, which brings some problems. In contrast, container technology...
With the development of Internet, network protocol became increasingly complex. This brought a sharp increase in network traffic based on these protocols. How to implement the efficient identification of network protocols has been a problem of network development. In this paper, we focus on protocol identification based on traffic analysis. The theme is that we just need to analysis the headers of...
In order to ensure that the message is fresh, both the identity of the communication and the shared key in the session are reliable, while avoiding the defects of the old message retransmission attack and identity posing in the native NS protocol, the optimized protocol adopts the means by which the receiver communicates with the key distribution center, and add the sender's identity and the temporary...
The paper introduces the research of tube-type bottle defects detection algorithm based on machine vision system, and the implementation method of detection system using machine vision and digital image processing technology. Industrial camera is used to collect the image of tube-type bottle, then the image is processed and analyzed by image processing technology. On this basis, by comparing with...
The frequent occurrence of road congestion and traffic accidents has affected people's travel efficiency and travel safety. Traffic sign recognition has become one of the key research objects in intelligent transportation system. This paper studies the identification of road traffic signs based on video images. First of all, collected image will be image preprocessing with image reduction, brightness...
Potato as the fourth largest staple food in China, The external defect detection directly affects the industrialization of potato and deep processing. As the currently domestic testing method are mostly based on specific circumstances, specific light, which does not satisfy the testing requirements of actual environment. Therefore, this paper presents a non-destructive method for the study of green,...
In order to succeed in updating ECU program without specific downloader, this paper designed and developed a Bootloader based on CCP protocol, which has the advantages of high flexibility, good portability. This system uses three steps– import of Bootloader, operation of the Bootloader and import of new ECU program–to realize online program upgrade for freescale chip MC9S12P64. Finally, this thesis...
This paper uses Linux4.2.0 and RTAI3.8.13 to form a dual-core solution to study the real-time performance of Linux systems. This paper studies the basic structure of RTAI-Linux kernel. On this basis, the ADBORROW algorithm is used to improve the time slice rotation strategy of EDF dynamic scheduling algorithm. Assign tasks to RTAI-Linux systems based on dual-core x86 architectures and perform real-time...
For 2D visual applications, using template matching algorithm to identify objects is difficult to get accurate matching results. Because the traditional template matching algorithm is based on gray-scale correlation, it is sensitive to rotation, illumination variation and noise. By improving the classical Canny operator, obtain the precise edge feature image. Employ the binarization to feature image...
Current hierarchical clustering algorithms face the risk of privacy leakage during the clustering process for big dataset. While differential privacy is a relatively recent development in the field of privacy-preserving data mining, offering more robust privacy guarantees. In the paper, BIRCH algorithm under differential privacy is studied and analyzed. Firstly, Diff-BIRCH algorithm which directly...
In order to estimate the accurate and real-time dynamic battery state of charge (SOC), owing to greater errors of extended Kalman filter (EKF) in estimating SOC, a method has been proposed to estimate the battery SOC based on LM-ICDKF algorithm. By using the two order RC equivalent circuit model, the MATLAB simulation tools are used to simulate the algorithm, this paper compares LM-ICDKF algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.