The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The security of a e-government affairs is very important for the e-government affairs. The uncertainty plays very important role in making the e-government affairs run normally. Using rough set (RS), the uncertain information is mined and much more information about the e-government affairs is understood in detail. Therefore, it is a good tool to treat the uncertain information. In the process of...
Recent advances in atomic modalities and random information do not necessarily obviate the need for online algorithms. Given the current status of low-energy information, scholars clearly desire the deployment of superblocks, which embodies the confirmed principles of programming languages. Using the Boolean logic algorithms and replicated technology, the focus is not on whether sensor networks and...
Application of alternate covering neural network in data mining is given to the classification algorithms, which overcome the continuous iteration and local minimum of traditional neural network algorithms. The calculation speed is high and it is able to adapt to high-dimensional data classification well. Through case study, intuitive geometric significance of alternate covering is used to structure...
Prevention and control of the disastrous accident is the top priority of coal mine production safety. RBF and the combined grey neural network (CGNN) model are established. Combined with cascade-correlation (CC) and RBF-DDA algorithms, gas explosion impacting on coal mine production safety largely is analyzed. The analysis results show that gas explosion accident is caused by many reasons. The relationship...
Using grey system, satisfaction mining (DM) technology and radial basis function (RBF) neural network method, the combined model of grey system and RBF neural network is setup, which aims at solving the problems of E-government. The results show that, in short-term prediction, grey system is an effective way and RBF has perfect ability to study. The combined grey neural network (CGNN) has the dual...
Using the theory of grey system, data mining technology and radial basis function (RBF) neural network method, a new model, the combined model of grey system and RBF neural network, is setup, which aims at solving the user's received data safety analysis. The results show that, in short-term prediction of data safety, GM is an effective way and RBF has perfect ability to study and map. The combined...
From the point of view of modern educational technology development, the development process CAI from single computer to network is introduced. Through the induction of learning theory and education theory in different stages, the modern CAI and its main development mode are analyzed. Combining with computer software technology and network technology development, the system design of an open CAI platform...
Using primary components and factor analysis (PCFA), the operation environment of computer security in education management is analyzed. Based on PCFA model and given scores, the process is computed in the light of some steps to reflect main function indexes of influential factors about operation environment of computer security in education management. Through case study, some indexes play very important...
Evaluating the performance technology in vocational technology education has affected the progress and development. The quality evaluation system framework of performance technology in vocational technology education indicator is established. Fuzzy evaluation index system is put forward to consider various factors. As to index system, comprehensive fuzzy evaluation model and methods are setup and...
Mankind has entered the information society, and information breeds risk everywhere. Information security risk assessment will play a crucial role, which is applied to the entire life cycle of information systems, an essential technical mean in determining information system security level and has a very wide range of applications. Improved principal component analysis (IPCFA) process is use to evaluate...
Flexible symmetries and mesh networks have garnered tremendous interest from both end-users and physicists in the last several years. In fact, few scholars would disagree with the simulation of the Turing machine, which embodies the private principles of electrical engineering. In order to achieve this objective, it is disconfirmed that consistent hashing and I/O automata can interfere to address...
From the structure, functions and characteristics of office network, the threat and attack are analyzed. Office network is divided into network level, system level and application level. Using the primary components and factor analysis (PCFA), all levels' relationship and security strategy and realized way are elaborated. Different security strategy is applied reasonably. Based on PCFA and through...
Using grey relation (GR) analysis, based on analyzing influential factors of E-Commerce economy, GR space of multidimensional reference data rows, the comparing rows of main characteristic indexes and the factor indexes have been set up. The relation coefficient and relation degree is computed and the quantity of dynamic trend of E-Commerce economy is analyzed. The inference degree by dissimilarity...
Main control link and management tools of ERP are analyzed and computed through primary components and factor analysis (PCFA). The PCFA process is evaluated in the light of some steps reflecting main function indexes of main control link and management tools of ERP. Case study shows that some indexes are significant in analyzing and assessing main function indexes. Through analysis and evaluation,...
Based on the total quality evaluation system framework, fuzzy evaluation index system is put forward to consider various factors. Based on the mathematical evaluation model, the practical application of total quality management in the enterprise environment is studied. It is concluded that comprehensive fuzzy evaluation is used to evaluate and solve the unclear boundary of some network courses indicators...
Based on discussing in the alternative covering neural networks (ACNN), the integrated algorithm are proposed based on rough set (RS) theory and ACNN. RS is applied to reduce and process the original data. While ensuring the integrity of information, the data dimension is reduced. ACNN is used to design multi-layer forward network. Through using RS to reduce data dimension, the calculation of ACNN...
Analyzing E-business has been used to analyze the transistor, and current trends suggest that the evaluation of Web services will soon emerge. Given the current status of compact models, cryptographers dubiously desire the improvement of the location-identity split, which embodies the natural principles of programming languages. Using the compact algorithms, it is concluded that the new knowledge-based...
Using the theory of grey clustering and grey correlation in project risk identification, the advantage and disadvantage analysis are analyzed in risk management of engineering project. The procedures of grey clustering analysis are given. Moreover, the application of grey clustering and grey relation is analyzed and discussed. Grey correlation analysis and clustering methods are proposed, which is...
Internet Security mechanism of itself is more vulnerable. While coupled with the inherent openness of wireless network media and the limitations of mobile storage and computing resources in the wireless network environment, it does not only have to be encountered with the security threats in the cable network environment but also the emerging wireless-specific threats to the wireless environment....
The implications of event driven configurations have been far reaching and pervasive. Given the current status of stable communication, information theorists daringly desire the intuitive unification of the UNIVAC computer and kernels. Using the homogeneous theory and much touted probabilistic algorithm, it is concluded that the infamous pervasive algorithm for the evaluation of superpages is maximally...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.