The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problem of shortage of workers in large hospitals, this study design a kind of short distance wireless communication system based on brain-computer-interface (BCI) technology, it chooses the ultra-low power MCU MSP430F5438 and nRF24L01 as the core, and it includes the design of Lab view platform, brain electrical simulator, nRF24L01 wireless transceiver system and voice prompts...
Because the conventional printed circuit board defect detection is slow, a method base on the edge of image is proposed, this method can quickly locate and detect the detects on the circuit board. The algorithm combines gradient direction characteristics of image edge gray, the different characteristics of different defects in standard image and defect image are used to classify the defects, and then...
Computer basic teaching aims to develop and improve the quality of students' computer literacy, to have proficiency in computer application skills for students. Therefore, we must oriente to people, individualize students, we must combinatie the computer basic education and professional education. In this paper, we combined the actual condition of xinjiang agricultural vocational college with its...
By studying mental arithmetic for healthy adults by statistical analysis and investigating the load of local areas, the study is better to learn how the brain works. Subjects are 22 right-handed healthy university males. Subjects were asked to do mental arithmetic twice independently. Numbers were selected during 1 to 10 randomly. Every two numbers were given respectively; the time interval of them...
A system of wireless Smart home sensor network based on ZigBee technology was proposed in this paper. A common control unit and binding idea are used in design of this system, which improves the development efficiency and makes it easy to expand and upgrade various functions. The proposed system has high availability and reliability. It could meet the requirements of daily life such as the control...
In enterprises' activities in the 21st century, electronic commerce is a foremost tool of service. Firstly, existing trust management theory of electronic commerce is briefly reviewed based on the substance of trust in electronic commerce. Secondly, the analysis of quantitative notion of trust management in electronic commerce is showed emphatically in this paper. Finally, aiming at problems, this...
Security bootstrap is important to the platform security. If the bootstrap is not secure, Rootkits, Viruses and Trojan horses may be loaded into kernel, thus the following defenses built on the compromised kernel may be useless. In this paper, a trusted-computing based security bootstrap is introduced. We modify trust chain defined by Trusted Computing Group slightly by introducing a new component...
This paper discusses the three-dimension visualization of the geological data using the ray-casting algorithm which can display the internal structure of geological body in details. An improved scheme transforming lots of matrix multiplications to a few of vector additions is developed to accelerate the ray-casting algorithm for the imaging of huge amount of three-dimensional geological data. To further...
Numbers of proposals to incorporate delegation into secure service management have been seen the last years. How to assure that only the authorized users can fulfill specify services is one of the main problems for secure service management. Delegation is a mechanism that permits a user to assign a subset of his/her assigned authorizations to other users who currently do not possess the authorization...
In a secure workflow system, it is imperative to specify which users (or roles) can be authorized to execute which specific tasks. Users may also be able to delegate their rights of executing a task to others. Much of research work in the area of delegation has been carried out. In this paper, we provide a new formal method for representing delegation constraints in secure workflow systems, by adding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.