The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A method for classifying objects into categories and indexing is proposed to implement object recognition. The relational measurements such as the distance between two points, color comparison is encoded by the attributed relational graph (ARG) representation to provide one-to-one correspondence between models and object features. If the contour is traversed counterclockwise, a sequence can be formed...
Currently, Thinking Maps(TM) which includes eight kinds of sub graphs, has been a set of popular visual tools for learners to achieve the tasks of inductive and deductive thinking, dialogical thinking, metaphorical thinking and systemic dynamic thinking. But many of the researches focus on building these sub graphs manually. In this paper, after analyzing the features of e-Learners' behaviors, a method...
In order to increase the protection ability of the network intrusion diction system (NIDS), it is important to gather the host information of the intruder. In the proposed IDS called NIDS-SA, three basic components are developed to support the active monitoring capability, Intrusion Detection Node (IDN), Intrusion Detection Coordinator (IDC), and Snooper Agent (SA). The IDN is used to capture packets,...
When digging association rules among items, the items are dealt in an equal way. However, it is usually not happen in databases in the real world. Different items always have different importance. To reflect them, The way of draw weight into items and use weight association rules can solve the problem. But weighted association rules arithmetic of these research based on Apriori arithmetic at the present,...
The routine Cyclic Association Rules and its upgrading alternatives were found with some problems as these:Some disadvantage of technique that compartmentalize a cycle into several time segments; The basic arithmetic use Apriori Arithmetic ,Their disadvantage are huge the candidate items and low-level efficiency. In regard to these problems, a new Cyclic Association Rules method was discussed. The...
In the engineering we need to evaluate the welding properties of material before it is joined by welding, soldering, or brazing technology. The highest hardness in heat-affected zone (HAZ) is one of important index. We need to do many experiments to get it which takes us a plenty of time and money. The grey theory is an effective method to investigate the poor information and can be used to find the...
Many questions in natural science and engineering are transformed into solving nonlinear equation. Newton iterative method is an important technique to one dimensional and multidimensional variables and iterative process exhibits sensitive dependence on initial guess point. Continuous time-delay chaotic system is the infinite dimensional system which can produce several positive Lyapunov exponents,...
Many questions in natural science and engineering are transformed into solving nonlinear equations. Newton iterative method is an important technique to one dimensional and multidimensional variables and iterative process exhibits sensitive dependence on initial guess points. For the first time, the fractional order mechanical chaos methods of mechanism synthesis and all solutions of the nonlinear...
Traditional approaches to network management are mostly based on the centralized client/server model. Due to the intrinsic limitations of SNMP-based management paradigms, such as information bottlenecks and lack of flexibility, have encouraged a trend towards distributed management system. The emergence of mobile agent frameworks has led many researchers to examine their applicability to network management...
The execution of course program and timetables in distance learning systems is more strict in military school, it imposes necessity for teachers to guarantee the progress of students according with a set of course program by monitoring the studentspsila behaviors and giving the alert when the predefined schedules are violated in such an e-learning situation. An active monitor system is designed to...
In future pervasive computing environments, applications should be able to automatically adapt to their changing context such as environment status and system conditions. Therefore, context information collection is an ignored yet significant research area. An efficient sensor data collection protocol is studied in this paper for a sensor header (collector) to continuously collect data from mobile...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.