The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the continuously increasing of the sorts of the services, as well as the expanding of the current network capacity, Deep Packet Inspection (DPI) has played more and more vital role in the network and the information security. The existing regular expression matching algorithms and the related improvement algorithms already could not satisfy the demands for the high-speed and real-time. This article...
An automatic segmentation algorithm for touching rice grains images was proposed. Original gray image from rice inspection system was transformed into binary image and the edges of touching grains were extracted and de-noising was operated. This algorithm detected concave corner points of touching rice grains by a sector area and found corner point pairs by the shortest Euclidean distance. The touching...
It is an important problem how to make a company or enterprise to manage ecommerce transactions and delivering services with special pertinences to customers rapidly. In this paper, a Genetic Algorithm (GA) method is presented to acquire customer??s personal requirements so as to design a customized service business process specially for him (her) later. This method is then implemented in our project...
For increasing the efficiency of mining association rules in student score database, this paper presents an improved algorithm that doesnpsilat extract all rules, but extracts a subset of all rules that is called rule-generating set. We can use it to get all rules. The number of the rule-generating set is smaller than all rules, so the efficiency of mining is increased. The algorithm in this paper...
By adopting standard-based protocols, service components from different providers can be conveniently integrated into a composite service regardless of their locations, platforms and/or hardware speeds. This paper presents a framework to facilitate dynamic service composition, selection and adaptation of QoS-aware Web services towards pervasive computing. Considering both functional and QoS characteristics...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.