The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the validity of the near-field equivalent method is studied to solve the problem of distortion in simulations. To analyze the validity, the condition of the principle of equivalence is reconsidered. The relationship between the principle of equivalence and the methods of near-field equivalence and far-field equivalence is studied, results show that the distance between the antenna and...
G-layer of RGPS requirement meta-model is used to refine the general business goals acquired on the basis of the Role layer. A business goal is a high-level and general statement when first proposed. Whether it can be achieved or not depends on the correctness of goal decomposition. Towards these problems, a decomposition model is proposed in this paper. Particularly, with the development of semantic...
The initial population of Particle Swarm Optimization (PSO) directly concerns global convergence and searching efficiency of PSO. The reasonable setting of initial population and operational parameters is an important problem in the application of PSO to perform optimization calculation. Based on the study on how to set the initial population, such conclusion can be drawn that the initial population...
In intelligent surveillance field, the numerous methods have been proposed for foreground extraction from a stationary or dynamic background from a general video sequence. It is very difficult for the proposed methods to have both high accuracy, low computational complexity and less memory requirements. Unlike previous approaches to object detection which detect objects by building adaptive models...
Latent Semantic Indexing is a widely used text mining technology nowadays due its effectiveness in dealing with the problems of synonymy and polysemy within a proper matrix scale. However LSI is enormously computationally intensive especially for processing large scale data. And effective solution is to increase the computational power available to LSI using multiple computing nodes. In this paper...
Recently MapReduce programming model is becoming popular for large scale data intensive distributed applications due to its efficiency, simplicity and ease of use. The Hadoop implementation of MapReduce is one of the most popular tools for many programmers due its ability to hide details of parallel programming from the users. However work on simulating the Hadoop environment is still in its infancy...
Methodology of automatic generation of test cases based on Model Driven Architecture is proposed, and its design and implementation have be done. The process of generating test cases is that a platform-independent model is converted into a platform-independent test model through level conversion, and the platform-independent test model is converted into the corresponding test cases through vertical...
UML has become the dominant modeling language in software engineering arena. In order to reduce cost induced by design issues, it is crucial to detect model-level errors in the initial phase of software development. In this paper, we focus on the formal verification of dynamic behavior of UML diagrams. We present an approach to automatically verifying models composed of UML state machines. Our approach...
Internet has become an essential part of the daily life for billions of users worldwide, who are using a large variety of network services and applications everyday. However, there have been serious security problems and network failures that are hard to resolve, for example, botnet attacks, polymorphic worm/virus spreading, DDoS, and flash crowds. To address many of these problems, we need to have...
Isolation between antennas is one of the most important indexes for electromagnetic compatibility (EMC) problem on airborne platform. Take the Rooivalk helicopter for example, as the electrically size of the airborne platform is large, the structure is complex, the simulation results are usually not accurate enough. Due to the inaccuracy of the former modeling method which used the simple typical...
The key problem of simulating the security events in parallel network is how to partition the simulation duty reasonably to enhance the events simulating performance. This paper improved the pretreatment algorithm of topology partition, analyzed METIS from time complexity and space complexity, and obtained the best partition result. It achieved minimum long-distance routers and maximum time windows...
Affective computing has been investigated by many to allow computers to respond to or react to human or user emotion. In this paper, a model of personality and emotion was proposed based on the architecture of a cognitive system. Considering the external and internal factors of a virtual agent, formalized description of the emotional model was built. Experiment results indicated that the emotion generated...
The traditional network simulator don't have the ability of simulation for the process of large-scale network security incidents outbreak, we designed a grid-based Internet worm behavior simulator which is consisted of foreground applications and background analog subsystems in parallel. It makes the most of the benefit of the grid computing capability, resource and task management. The experimental...
Under a unexpected disaster, The fundamental purpose of emergency evacuation is to take a scientific and effective evacuation strategy to maximize the population of the evacuation of the affected in the shortest time, and in which, the construction of evacuation routes and the distribution of evacuation intersection flow is the key of the realization of this purpose. In this paper, aiming at the problem...
Grid system is inclined to support resource sharing for mixed types of workloads nowadays to improve the whole user utility, which requires an effective allocation method that not only each workload user can have desirable resources to satisfy its performance requirement from the view of user, but also can avoid shortage or waste of resources from the view of system. Currently, most resource allocation...
Resource management technology enables grid system to support on-demand resource achievement across multi organizations, which acquires great efforts in grid computing research field. Most current grid system can only serve one kind of workload for that resource management and workload management are tightly coupled, called system-centric resource management model, in which the resources utility for...
This paper studies evaluation problem in psychological health. Based on the psychological dimensions and the actual evaluation work, we propose a kind of generalized linear regression model with convex constraint, named as Evaluation Model, in which the dependent variable and regression coefficients all are unknown. We analyze the algorithm of the model with linear regression method. Then the least...
By using the quarterly data of 1996-2005 in China, this paper evaluates the usefulness of a monetary policy rule designed for developed economies. Drawing on our econometric analysis, we argue that the model comes closer to the data of China ,it is an ideal framework for chinese monetary policy analysis. The paper also suggests to make modifications of the typical policy rule to explain Chinese economy...
3D digital library is a hotspot in recent years. With the continuing development of 3D graphics technology, 3D model as the fourth-generation media has been one of the digital resources in digital library. This article analyzes the progress of two directions: 3D model indexing and compression. At last, we propose a simple frame of 3D model indexing and compression in digital library.
Model transformation is the core of MDA and plays an important role in implementing MDA especially. On the foundation of defining the core concept of MDA and dividing the model into three kinds of JPIM (Platform Independent Model of JEE) , JPSM (Platform Specific Model of JEE) and JCM (Code Model of JEE) afresh according to JEE (Java Enterprise Edition) platform, this paper puts forward an approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.