The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the process of controlling crimes, public security often faces a lot of information which is incomplete, fuzzy and random information. How to extract useful and potential information and knowledge from above information has become a difficult problem for public security. The data explosion but the data mining technology rapid development and application of lack of knowledge of the status quo, data...
In this paper, we present a new algorithm of multi-point iterative method for simultaneous determination of all roots of polynomial. Its convergence was researched. The computation is carried out by simple steepest descent rule with adaptive variable step-size. The specific examples illustrated that the proposed method can find simultaneously the roots of polynomials at a very rapid convergence and...
In this paper, we construct a neural network iteration method for simultaneous extraction of all roots of algebraic polynomial with variable learning rate. Its convergence was researched. The specific examples showed that the proposed method can simultaneously find all roots of algebraic polynomial at a very rapid convergence and very high accuracy with less computation.
In the distributed video coding, side information is involved not only in the decoding of the quantized source, but also in the reconstruction of the images. So the quality of side information takes an important role in the distributed video codec. In this paper, a refined approach to SI extraction is proposed. Based on the high correlation between the motion vectors of adjacent blocks, the motion...
This paper proposes an event-driven mechanism to semi-automatically realize the complex service composition using event-condition-action rules. Different from traditional composition methods for determining service operator, message, structure, event and provider orderly, ECA rule-based service composition method executes different actions according to condition when event emerges. Taking user requirement...
As for personalized information service needs of the growing vertical search engine technology in the field of multi-media resources to play a role search. In this paper, in-depth analysis of existing multimedia search engine based on multi-media resources for the existing deficiencies in the areas of search, to propose a multi-media resources for the vertical search, has a certain value and personalization...
None-cooperation between a client enterprise and a third party logistics service provider lead to the lost of the best profit in common contracts. To solve this problem and introducing continuous improvement ideas, this paper apply the closed-loop supply chain coordination management methods to analyses a client enterprise and a third party logistics enterprise's cooperation develop into mature stage...
According to the attitude update request of micro-inertial measurement system in some Aircraft, a new method Rodrigues parameters attitude update algorithm was put forward attitude update. And then attitude differential equations and attitude matrix were proposed based on Rodrigues parameters. Under angle velocity as the input with low-accuracy micro-mechanical velocity gyro, attitude errors were...
With the increase of the web applications in information society, Web application software security become more and more important. Recent investigations show that web application vulnerabilities have become the largest security threat. Websense security report shows that in the first half of year 2008 above 75% of the most popular Web site have utilized by the hackers to run malicious code. Detecting...
This paper analyzes existing problems of graduation field work with enlarging of enrollments in the background recent years, and search after a new graduation field work pattern named ldquopackage patternrdquo which a practice menu composed of many courses are offered to students, and students regard as clients served by teachers, not employees managed by teachers. This new practice pattern has been...
This paper discussed the interference between 3G LTE random access preamble and the SRS (Sounding Reference Signal) via multi-UE link level simulations, analyzed the performance changes of two types of signal under the influence of interference and found out the factors which leading these changes, then we summarized the way of reducing the interference.
A method of 2D slices to 3D display technique used in the analysis and location of lesion site and image-guided treatment in craniotomy operation is put forward in this paper. By means of a clinical case-tumor surgery, three groups of clinical data are obtained and a 3D model of slices is built, then an image-guided treatment can be carried out. By experimental results, it is shown that this method...
With the fast development of the logistics industry, the fourth party logistics becomes a top issue in this line. The correct evaluation and selection of supply chain cooperation partners is a key problem in the development of the fourth party logistics. This paper constructs an evaluation model of the fourth party logistics provider selection by using analysis process of grey relation, GRAP together...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.