Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
ITRI container computer is a modular computer designed to be a building block for constructing cloud-scale data centers. Rather than using a traditional data center network architecture, which is typically based on a combination of Layer 2 switches and Layer 3 routers, ITRI containercomputer's internal interconnection fabric, called Peregrine, is specially architected to meet the scalability, fast...
Figures method is based on the lissajou graph of more fringe photoelectric signal. The waveform generator produce signal of simulation, the signal lissajou graphs and actual collection of signal lissajou graphs fitting to and comparison. Through the goodness-of-fit parameters of judgement, we can determine parameters of actual waveform. Then we can get the photoelectric signal to meet the equation...
This article is a report written for the school directors to propose an action plan integrating ICT into education. It discussed the potential benefits of ICT to the school and the difference between modern ICT and previous educational technology, the difficulties that may arise in using ICT effectively and the possible solutions and recommendations to the problems.
Process flow of wheelset dismantler and the necessity of mechanics analysis about it are described in this paper. The mechanics-action of wheelset dismantler's connected beam in press-fit condition is analysed using universal finite element software ANSYS, connected beaam stresses and deformations are calculated and compared each other. The results indicate that the maximum stress of connected beam...
Computer graphics technology is very active in recent years, technology research, design applications in the more extensive and successful. With the development of computers and peripheral equipment, computer graphics functions have been greatly developed and improved software features computer graphics continue to strengthen, graphics itself toward standardization, integration and intelligent progress...
On the basis of some research work about the educational evaluation index system of electronic games,we establish an educational evaluation system for electronic games using BP neural network model.The system has self-learning and adaptive characteristics.After the BP neural network trained with the expert knowledge,it not only has the experience of experts, but also realizes the changes from the...
Utilizing computer aided security risk assessment, administrators can apperceive network security situation quickly and take countermeasures effectively. Most assessment methods disregard the dependencies among services, lack the evaluation against indirect risks, and seldom mention the composition of multiple source risks. Regarding the above problems, an assessment method that based on service dependency...
Compared with other large-scale warfare simulation systems, wargame, as a traditional type of warfare simulation, has the advantages of low cost, convenience, practicability, etc. This paper discusses the system structure and class model based on “Future: Korea War” which is a product of U.S. “One Small Step” company's Millennium Wars series strategic-level wargames, and designs wargame umpire rule...
To meet the need of modernization, informationize and safety, the miner lamp management system is designed. It realizes the whole process from miner lamp's hanging up, charging, full-charged and taking away to automated statistics, reporting and checking attendance. So this system is able to offer accurate information to managers in time. On the basis of describing the design background, the paper...
Delegation is an important means in modern offices system. In some case, we need to control the verification of a proxy signature, since it is not necessary for anyone to be convinced a justification of signer's dishonorable message such as a bill. In the paper, to realize verification's control and proxy signature's revocation, we put forth a new primitive: controllable proxy signature scheme with...
Customer order planning and scheduling (COPS) is an integral part of computer integrated manufacturing system (CIMS). Although many scheduling approaches have been proposed, the two features, i.e. the efficiency and the single shipment requirement are seldom considered simultaneously. Also the design of controlling mechanism for COPS is lack. In this study, we design a controlling mechanism to account...
In this paper, we propose a computerized embroidery machine's controller based on ARM and DSP, which divides the whole system into two modules. The main control module based on Samsung S3C2410X, using embedded Linux as its operating system, is used to analyze the pattern format and run the graphic user interface by using MiniGUI, and the electromechanical control module based on TI TMS320LF2407A is...
This paper combines tangible augmented reality and shape grammar into collaborative design learning to bridge the gaps such as the difficulties of imaging the spatial form in a complex content and the obstacle of communication during the collaborative design. This work has been successful in mapping out a space of technical possibilities and providing a possible system setup to pursue the innovative...
It's necessary to create a credible and general evaluating index model in network threat assessment. According to the network indices' effect, this paper proposed an algorithm which combines grey correlation degree in grey theory with traditional analytic hierarchy process (AHP) to determine the indices. It considered both objective and subjective factors. Experiments showed that this method had a...
An enhanced architecture of TPM (Trusted Platform Module) is presented in this paper. Besides the previous components, a new special information I/O interface is added. By connecting with the various parallel or serial trusted devices outside TPM, the new special information I/O interface replaces the function of physical-presence and implements the preconfiguration, backup and restoration of information...
A new algorithm named ant colony optimization with multiple nestspsila cooperation (MNACO) is presented to resolve the narrow traveling salesman problem. The union suppose and intersection suppose based on MNACO are proposed. The black, white and grey edges are defined. The edges in the intersection (black edges) are deposited certain pheromones. The white edges are deleted and the grey edges in the...
The paper analyzed key problems about the model and framework of urban emergency response system. It aims to present a new model and framework of urban emergency response system. The new model is based on decision-system. And in the framework, it includes the procedure of creating contingency plan. In this paper, it expatiates on emergency affairs, layers and functions and framework of the platform...
The World Wide Web is a major source of the news now. The news analysis play more and more important roles in the political decision, financial analysis, invest decision, market forecast and so on. This paper proposes a news analysis system based on the hall for workshop of metasynthetic engineering. In this system, in order to analyses online news, the news articles are active fetched, and being...
In this paper, a novel gray-level image watermarking algorithm based on local feature region and Singular Value Decomposition (SVD) is presented for copyright protection. A new way which utilizes the Binary Coded Decimal (BCD) method and encodes the gray-level secret information into bit string is used. It employs the singular values of SVD to extract the most valuable features of the watermark image...
With the plentiful application of various electronic equipments and control devices which used in industry, the communication networks based on field bus are produced. Connection between CAN bus and normal bus RS-232 which is used in existing serial communication, could realize to construct network with multidrop and long-distance communication. Method of conversion between RS-232 and CAN bus is discussed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.