Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
Information and communication technology (ICT) in education has become the strategies of all countries and economies around the world to achieve enriching human resources and rapidly developing economy and society. The purpose of the ICT in education is to cultivate innovative talents and implement the modernization of education. This paper utilizes the assessment results and questionnaire data of...
The style of clothing is complex and changeable, there are many kinds of clothing styles, different styles have different emotional expression, but the current description of clothing emotions is mostly qualitative characterization, and the words to express which have no systemic analysis until now. To establish the clothing semantic emotions space is the important prerequisite for computer recognition...
The network traffics of Denial of Service (DoS) rise in large scale. Adaptive detection technologies for large-scale DoS network behaviors are needed urgently. For the above, a detection method for large-scale DoS behaviors based on Artificial Immune System is proposed in this paper. The feature collection technology is used to efficiently capture large-scale network data. Network features are analyzed...
With large companies and corporations becoming increasingly responsible for data collection, in recent years, a growing number of scientists have proposed using a variety of algorithms and different theories to solve the database problem. Even though existing solutions are effective in many cases many, problems are left to solve during the integration of database. The entity resolution (ER) is a crucial...
Along with the trend of computer technology, programming skill becomes the core competency of the future world, which highlights the importance of programming education. However, most of the related literature indicated that programming is difficult to be tackled for both learners who learn it and teachers who teach it. Despite of the importance, there are only a few cases in which teachers adopt...
Computer forensics is the crucial technology against computer crimes. However, existing forensics methods or technology are inefficient and their stringencies are poor. This paper proposed a novel dynamic computer forensics model (DAIP) based on artificial immune and real-time network fatalness, which can vivify the crime scene. The definitions of self, non-self, and immunocyte in the network transactions...
We address the problem of improving the throughput and delay efficiency of distributed multi-channel MAC (MMAC) protocols. We design an MMAC protocol called FD-MMAC that exploits recent advances in full-duplex (FD) communications to coordinate channel access in a distributed manner. Compared with prior MMAC designs, the FD-MMAC protocol eliminates the use of in-band or out-of-band control channels...
A novel method is proposed to dynamically modulate the THz wave front with photo-generated carriers. Some special wave fronts are generated using this method. This new method is structure free, high resolution, and broadband.
The security situation of the Internet of Things (IoT) is serious. IoT encounters security problems more than traditional computer networks does. The attributes of dispersity and mass of IoT require that approaches to IoT security should be dynamic. Inspired by immunology, a novel approach to IoT security is proposed in this paper. Traditional network security models are used for reference and special...
This paper designs an expert system which can apply for analyzing on urban transit train signal system blocking. The system can be used for blocking and analyzing in various blocking signal systems. In the end, a urban rail transit has been designed by the system, and the results verify that the system is effective.
This article introduces a type of embedded MCU network measure and control system based on Ethernet, which adopts high speed MCU with kernel of 8052. Through controlling the special chip for Ethernet, the system realized the function of TCP/IP protocol. Since the system can be used as a independent system, any computer on the net can control the system or transmit order and data to the system through...
Digital Watermarking may be used to protect databases copyright. A new method for proving the ownership of relational databases is presented. Such approach is applied for protecting both textual and numerical data. This is done by embedding special mark and watermark bits into textual attributes and numerical attributes respectively. Carriage return character and linefeed character, representing 1...
In this paper, a formal description of knowledge element is given. On the basis of the formal description, a preliminary research about knowledge element acquisition method of emergency management system is proposed. For the characteristics of emergency management knowledge which is multi-field, multidisciplinary, multi-granularity and multi-dimensional, the knowledge element acquisition method is...
Classic colLision detection methods adopt hierarchical structure based on bounding box, judgment intersection efficiency is key factor that effects colLision detection efficiency. A fast approach to judging basic element intersection in polygons meshing is presented to improve judgment intersection efficiency. First, this approach discusses the clamping-edge pair existence form in each polygon basic...
CALL is one important method in education. Educators nee d to think what the mediation may give, and try to make full use of the technology-enhanced education process. CALL is very useful, ye t it is only one channel which supplements the traditional lecture. Blended learning is the trend of language learning and teaching. To make CALL facilitate learners more, we need to strengthen the construction...
For the surficial sediments sampled from the Shaxi River in Sanming, Fujian Province, China, the distribution and fraction of heavy metal zinc in surficial sediments were researched. The microwave digestion result showed that the concentration of zincin surficial sediments ranged from 568 mg/kg to 2126 mg/kg. The results of modified BCR sequential extraction procedure showed that heavy metal zinc...
Characterizing the Radar Cross Section (RCS) wind turbine structures is the first step to mitigate the impact of wind farms on radar operations. An efficient technique based on scaled wind turbine models in both laboratory and computer environment is studied. The scaled 3-D computer model is used in different electromagnetic solvers to predict the RCS properties, given radar parameters. The scaled...
A fuzzy comprehensive evaluation method of user experience is proposed to the problem on user experience quality which is difficult to accurately evaluate on the E-commerce web using. Firstly, being accordance with usability testing theory and the analysis of the user experience elements on E-commerce web using process, a evaluation index architecture is structured with views including human-computer...
Several features existed in Chinese texts result in technologic bottleneck in Chinese text mining, at present the results of Chinese text clustering obtained by traditional methods are not very satisfactory. In this paper, we propose the text clustering method by the English texts clustering method called as Text Clustering via Particle Swarm Optimizer (TCPSO) to solve the Chinese text clustering...
Although simple genetic algorithm (SGA) can, to some extent, improve the back propagation neural network (BP), it is prone to prematurity and losing the optimal solutions. Niche technology and fuzzy control theory are introduced to improve SGA and the improved one is used to optimize BP. The improved genetic algorithm is used to optimize BP neural network. In addition, due to the increasingly voltage...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.