The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we will firstly pay attention to the holistically external business environment of the outdoor adventure clothing in the UK and present a full picture of its market based on the UK. By giving this full picture, we will also identify the economic and sociocultural factors as two main factors from the PESTEL tool. They both are believed to have the most significant impact for the market...
In order to analyze the influencing factors of near-miss initiative report in coal mine, a random questionnaire survey was designed based on nine factors that affect the miners un-initiative report near-miss that were identified by interviews and literature review. Then using AMOS 7.0 the influencing factors of near-miss initiative report in coal mine were analyzed by confirmatory factor analysis...
The MRAAGILE is a device designed to monitor and reinforce medication consumption as well as promote a healthy daily regimen for those who choose to live independently. The device provides interactive reminder messages to inspire the user to follow directives. The purpose of this is to implement motion detection following a reminder to determine whether the user is responding. The device will receive...
This paper studied the variable-dimensional optimizer in order to solve the variable-dimensional numerical optimization problem. Unlike employing conventional variable-length crossover, this paper developed a novel pseudo addition and subtraction for evolutionary procedure. The pseudo operations can perform vectors computing with different length vectors. Thus, each individual can be evolved with...
Based on the lane marking tracking, this study presents a robust tracking approach for vision-based forward vehicle detection. Following vanishing point of lane which is according to lane detection point and linear regression analysis, five scan lines created as region of interest (ROI) for tracking is adopted to reduce the computational cost in detection process. The proposed algorithm implemented...
Chang et al. proposed a new digital signature scheme with message recovery. They claimed that their scheme was accomplished without using one-way hash functions and message redundancy. However, several forgery attacks demonstrated that Chang et al.'s signature scheme with message recovery is not secure. However, the idea of how to get the attacks is unclear. In this paper, we present more general...
Designated verifier signature (DVS) is a cryptographic primitive, which allows a signer to convince a designated verifier of the validity of a signed statement and prevents the verifier from convincing any third party about the signature. As a variant of DVS, strong DVS (SDVS), which exhibits perfect non-transferability, does not accommodate secure disavow ability (or non-repudiation). It makes a...
An algorithm of digital watermarking based on hyper chaos sequence and the discrete fractional Fourier transform (DFRFT) is proposed. First, the watermark image is scrambled in the spatial domain. The original image and the watermark image are discrete fractional Fourier transformed respectively with different order. Secondly, the watermark image's real part and imaginary part are encrypted by the...
There exists "the prisoner's difficulty" between employees in the process of their knowledge sharing. Only by the way of being shared can knowledge develop and increase. Meanwhile, the effectiveness of knowledge sharing depends highly on the design of the organization structure. The author of this thesis which is based on the Game theory, by introducing the concept of "knowledge potential",...
A new modified backstepping approach was suggested for time-delay system of static var compensator (SVC). The transient stability problem is studied for a single machine-infinite bus system. In the recursive design procedure of the feedback control law, the class- k functions are introduced. The method preserves useful nonlinearities, improves the transient response of closed-loop system, and effectively...
Modern enterprise need to continuously provide customers with perfect services to maintain its competitive edge. Therefore, the enterprises attach great importance to service innovation activities. For enterprises, how to assess the success of service innovation, to guarantee the rate of service innovation success has become urgent practical problems. Based on this real problem, this paper takes empirical...
The paper firstly introduces the characteristics of higher vocational research oriented courses, and analyzes the deficiency of the common methods used for evaluating the quality of the courses at present. Based on this, more scientific, comprehensive and objective multi-level fuzzy comprehensive evaluation method based on fuzzy theory is brought forward. At the same time, aiming at the characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.