The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Time delay estimation is the basis of the localization algorithm for partial discharge (PD) based on time difference in GIS, and it is the key to the accuracy of localization. In this paper, the theory of fractional Hilbert transform for time delay estimation is described. Based on fractional Hilbert transform, a method for estimating the time delay of GIS ultra high frequency partial discharge is...
The coverage is a critical issue in WSNs and considered as a measure of the service quality of WSNs. We proposed a coverage optimal algorithm based on Virtual Distance (VD) to enhance the coverage of WSNs after initial random placement. We define the ideal position of node related to its neighbor, and then the distance vector of one node's real position to ideal position is defined as virtual distance...
In social networking (SNS), the user and the topic are important dimensions of social influence. This article presents a framework of decision-making on SNS topic expanding, named MSNTD [1]. MAS was used in this frame to describe SNS. For a specific topic, agents can get the best way to make the topic expand through active consultation and evaluation. Decision-making process is divided into two stages...
In image detection, it is often necessary to detect the sizes of foreign bodies in binary images. A new method to detect particle sizes of objects is proposed in this paper based on binary image analysis. A difference sum template is first used to extract edge of an object, a half-8-connected domain algorithm is then employed to obtain the coordinates set that corresponds to each object, and finally...
The present researchers urgently need a network tool that is able to edit pseudo-code and convert it into source code on-line. This paper puts forward an XML-based pseudo-code online editing and conversion system. The pseudo-code is described and saved with XML document which is analyzed and parsed by DOM4J, so as to realize the reuse of pseudo-code and source code.
To make up for the absence of tools for pseudo-code editing and code generation, a B/S based pseudo-code editor and generator named Transcode is presented. Transcode adopts Javascript in client for editing and displaying and uses Java in server for storage and code generation, making it possible to edit pseudo-code online without delay and providing the function of data reuse. It is compatible to...
The modern information technology is based on the computer technology, the network communication technology and the multimedia technology, and the multimedia technology is based on modern information technology. Due to the intelligence, interaction, openness, and sharing of multimedia technology, the multimedia teaching has an increasing proportion, and plays a more important role in modern college...
First of all, the concept of ODRM would be offered, and In order to meet the requirements of ODRM, This thesis would analyze Relation Space-Time Tree Model of digital watermarking; Then put forward the probability algorithm of digital watermark's relationship, noted the relationship of digital watermark by calculating the correlative coefficients of two-dimensional random variable. The algorithm would...
In this paper, we proposed an improved niche genetic algorithm on the basis of the density clustering-based DBSCAN algorithm which can distinct between niches dynamically and maintain the ability of population diversity. Its application in the field of closed-cell material optimization shows that the algorithm can effectively overcome some shortcomings, such as prematurity, poor local search capabilities...
Robots can be as flexible and smart as human beings, which has been the dream of a number of scientists and science fiction writers. The emergence of humanoid robots and the research of artificial intelligence and related technologies are the major step to realize the dream. This paper presents a framework design of autonomous humanoid robot soccer system based on the analysis of autonomous humanoid...
Ranking fuzzy numbers plays a very important role in decision making and some other fuzzy application systems. Many different methods have been proposed to deal with ranking fuzzy numbers. Constructing ranking indexes based on the centroids of fuzzy numbers is an important case. But some weaknesses are found in these indexes. The purpose of this paper is to give a new ranking index to rank various...
The Research of detection malware using machine learning method attracts much attention recent years. However, most of research focused on code analysis which is signature-based or analysis of system call sequence in Linux environment. Obviously, all methods have their strengths and weaknesses. In this paper, we concentrate on detection Trojan horse by operation system information in Windows environment...
Traffic schedule has role on multi-homing network. In order to improve efficiency of traffic schedule, a self-adjustability algorithm on traffic sense is proposed according to the characteristic of traffic on network. This algorithm can explore load in link by exploring grouping message, then schedule loading traffic. Experiment show that the algorithm effectively solved the problem of network load...
The "e" stands for electronic and it is associated with the use of the Internet to undertake the wide range of activities. Like the Internet itself, there is no way of controlling the advent of e-learning. What we can hope to do is begin to understand the complexities of the new environment and how we teachers can work effectively as e-teachers. Though there is a large shoe to fill, one...
FR is a steganalysis algorithm based on frequency domain for F5. It has been widely used because of its high-capacity and robustness. In recent years, many scholars have engaged in the field. In this paper, It is proposed for a JPEG information hiding algorithm of resisting F5(JHRF). By embedding secret information into IPEG image by rules, JHRF can deal effectively with abnormal data and get better...
In recent years, much research has been devoted to the analysis of VoIP; on the other hand, few have harnessed the study of that. After years of technical research into it, we show the deployment of flip-flop gates, which embodies the extensive principles of theory. This follows from the construction of IP. Our focus in this work is not on whether kernels can be made secure, authenticated, and heterogeneous,...
This paper initially proposes a new model about the mechanical computer graphics' teaching system based on cases. It elaborates on thoughts of characteristics of computer graphics, case selection, mechanical student interests and desired leaning outcomes. Then, the paper presents the implementation of mechanical CG case teaching. According to the characteristic of CG and mechanical students, we design...
Role-Based Access Control (RBAC) is a mainstream access control method of software systems. After RBAC policies are formulated, there may be permission inconsistency between RBAC policies and practical execution paths. First, we defined the concept of RBAC permission consistency, and the concepts of execution path, Role Requirement array and Role Holding vector etc. On this basis, we proposed RBAC...
The traditional security model, aimed at ensuring privacy and integrity of information, has limitations on special networks such as the electric power information network, which emphasizes the stable operation and cooperation of the electricity service. Then a new idea on protection of network service security is proposed in this paper. Firstly, divide the network service into two parts as processes...
This paper proposed the collaborative work model of collaborative teaching platform based on virtual classroom; and given the architecture of the distance education platform based on multi-agent technology; and analyzed the key technology of building the platform based on FMS technology; finally, realized prototype. The results showed the prototype meets the design objectives.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.