The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Proved the superluminal propagation of light pulses is possible in theory and computer stimulation, and discussed the contradiction between the superluminal phenomena and the Special Relativity from three aspects: 1. defects of SR; 2. Special character of SR; 3, Epistemology. Pointed out that superluminal is a natural phenomenon; superluminal transmission of information is certainly possible, in future...
In this paper we study the computability of the solution operator initial value problem of Camassa-Holm equation. Define a nonlinear map K from the initial date to the solution. By using Sobolve spaces and Type-2 theory of effectivity, we proved that for s >3/2 the map K is Turing computable and thus enrich the theory of computability on nonlinear equation's solution.
As the search efficiency is not high and it's difficult to find user's interested information, this paper proposes the combination of ant colony algorithm and ontology to create search engine. By the clear formal specification of body shared concept, the search engine has intelligent search features, and then it can use ontology to provide users' interested search results. In the process of ontology's...
This paper deals with problems arising at Electromagnetic Compatibility (EMC) in relation to the interference caused by surge voltages and currents. For this purpose, IEC 61000–4–5 Standard has been instituted, describing the procedure of testing and verification of a device for immunity against surge. Specifically, measurements and tests were performed on an investigation of surge immunity of a personal...
The test method oriented function call path acquires function call paths through static analysis, but the uncertainty between definitions and call forms of function template in static analysis produces many redundant paths, which makes test workload increase exponentially, so determining uniqueness of function template call relation is an important part of improving test efficiency. Through analyzing...
C++ program exists uncertainty relations between call points and defining, the Polymorphism which is achieved by virtual function is one of them, so it could not determine that the call object is belongs to which class and which method in static analysis; using the basic idea of the Fundamentals of Compiling, through traverse of source code, building the symbol table, and nested each class' virtual...
Video is one of the most popular services in Internet. How to support large scale of streaming media transfer over the Internet has been studied in both academic communities and industry fields. VQM (Video Quality Monitoring) at the end point or in the network is necessary to improve customer's Quality of Experience (QoE). This paper first analyzes the requirements of VQM over the Internet. Then,...
In the process of software development, the frequent modification makes the software testing much more difficult, the source code management and control is an important complement to the white-box testing process. We propose modificatory identification algorithm for source code oriented which applies the combination of LCS algorithm and Divide and Conquer thinking. The experiment's result shows that...
Computer science and technology (CST) is one of the most important disciplines at most Chinese universities, and it has attracted a large number of excellent students who are worrying their future due to the shortage of systematic training of engineering. After analyzing some necessary features CST program should possess, this paper proposes some attentions ought to be paid for CST program as it is...
Nowadays mobile communication permeates daily life everywhere. So as the troubles made by spam SMS (Short Message Service), telephone frauds are also obsessing the users. In this paper a new method is proposed for avoiding telephone frauds using CAPTCHA (completely automatic public turing test to tell computer and human apart) systems. In this method, an authorize code is structured and decomposed...
Three-dimensional geological modeling (3DGM) is a complicated project in the research of the three-dimensional geographic information system, and there have many data model for the geological modeling by now. The thesis introduces a kind of object-oriented data model: the Component-based Topological Data Model (CTDM). Based on the modeling principles analysis, the author discusses and gives out the...
An artificial immune system (ARTIS) enlightened by the biological immune system is emerging as a new field of computation intelligence research. At present, it showed us many properties after the research to the immune system, including distributed computation, self-organization and lightweight, which were discovered to meet the requests of ARTIS. So the Immunology applied to the intrusion detection...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.