The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Near-infrared spectroscopy (NIRS) is a rapid, chemical-free, easy to use, and non-destructive analytical technique that has been widely applied to a diverse range of fields. NIRS analyzes the investigated samples through their NIR spectra. However, NIR spectral data are complex and multivariate, so multivariate data analysis methods (chemometrics) are used to interpret and predict the spectra's chemical...
Object proposal, typically served as preprocessing of various multimedia applications, aims to detect the bounding boxes of possible objects in an image. In this paper, we propose a novel object proposal method for RGB-D images based on layered edges, which can effectively eliminate the influence of the mixture of edges from objects and background and improve the accuracy of proposals. Firstly, we...
Mobile comic is now evolving into an industry with great potential for its convenience, huge user base etc. A key challenge in mobile comic is to adapt the comic content to various mobile screens for better visual effect, which is also called image retargeting. Although a lot of works have been conducted in this area, most of them target on nature or natural-like images. However, cartoon images are...
Aiming at the lack of adequate and flexible access control in 3D virtual environment when used in education, according to RBAC model, we present an authority control method which can manage manipulations to all objects, e.g. a variety of assets, avatars, scripts and network communication pipes in 3D virtual environment. The proposed technique overcomes the insufficiency on access control aspect in...
The Model-Driven Architecture approach defines system functionality using a platform-independent model(PIM).The PIM is translated to one or more platform-specific models (PSMs) that computers can run. The analysis and verification to these models is necessary at the first stage of software development process. Due to lack of formal semantics, UML model describing software character need to be translated...
In order to realize the automatic grading system of pear's appearance quality based on computer vision, a grading system is constructed which includes hardware and software environment. It includes transport unit, control module, image acquisition module, and image processing and recognition module. It can realize automatic feature extraction. The features include shape, color and defect. According...
A novel Colored Petri Nets (CP-nets) model based test case generation approach is proposed to makes the best of advantages of the ioco testing theory and the CP-nets modeling, where the Conformance Testing orientated CP-nets (CT-CPN) is proposed for modeling certain software systems, and PN-ioco relation is defined as a new conformance relation, and finally test cases are generated through simulating...
For a web application, we rebuild the use cases from the log file by applying Natural Language Processing technique; then based on these use cases we construct component model and extract the component behavior; finally, we compare this implementation behavior with the design behavior to check if these two behaviors are matched.
Cloud computing affects the development of mobile learning with its unique advantages. This article first sums up the traditional mode of mobile learning, analyses the characteristics of various patterns, sum up the characteristics of the cloud computing, and then make mobile learning mode under a cloud computing environment.
As the rapid development of mobile technology and wireless networks, the application prospects of mobile learning is getting more and more broad. My work aimed at the current four major mobile learning software, Nokia's “Mobiledu”, Digidea's “Englishto”, Unbounded Learning's “Drop English”, “Learneasy” soft to make a comparative analysis of their interface design, technical support and content design...
In this paper, we present a method to measure the survivability of an object-oriented software in design phase. Each component is responsible for this measuring and the relations between components are based on the communication type. Each component can be characterized by a composite Petri net which combines the features of statechart and object diagram. A fuzzy number is introduced to this net to...
AES algorithm is a new generation of the data encryption standard. With its strong security, high-performance and high efficiency, AES can meet the requirements of accounting information security. In this paper, started with the threats of accounting information, using the AES encryption algorithm to solve the security problems of accounting information in the storage, information transmission, security...
Assuring the consistency between collaborative services is a challenge problem in service oriented architecture. In this paper, we propose an approach to verifying the consistency of collaborative services based upon model checking. We first introduce an Extended UML Sequence Diagram for modeling dynamic behavior of collaborative service combining with UML State Chart Diagram. And then we define Collaboration-Contracts...
It is very costly if a software project development has to recover from an error that is due to a mistake made in the construction of the requirements model. Validation of requirements model is thus always an effective means for detecting defects in the requirements model. In this paper, we present an approach to modeling requirements by UML with OCL, and the design of a tool EOC (executable OCL checker),...
An object-oriented storage system NLOV (network logical object volume) based on BerkeleyDB is implemented. It provides a block level object-oriented storage interface. It uses NBD and AOE as transport protocols and supports interoperation between the two protocols. Compared with other object-oriented storage system, such as Lustre and Ceph, NLOV has good simplicity, better flexibility and applicability...
This paper proposes a method to reduce the number of concepts still conserving their formal structure. Our main idea is first to gather objects into classes such that the members of the same class share some set of properties, and then define a kind of Galois connection via a concept of inclusion degree in order to cope, to a certain degree (denoted as alpha), with this partition. Thus, a complete...
Secure key issuing in identity-based public key cryptosystems is a challenging task due to the inherent drawback of key escrow and the requirement for secure channel between the private key generator (PKG) and users. In this paper, we propose a practical key issuing scheme. User registers at a local registration authority in off-line manner, local registration authority signs and delivers authenticated...
Along with information technology's fast development, the educational technique receives the attention in today. Indeed, in the current international education form modernization, under the integrated environment, before the exploration, studies and promotes our country current duty, the teacher educational technique accomplishment level to educate the system sustainable healthy development in our...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.