The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the health effects of radio fields (RF) concerned by public, many experiments exposed to RF in vivo and in vitro were studied, but some results were in the contradiction. Of all the possible reasons RF Uniformity might induce the contractions in experiments. In this paper, we proposes the Aperture-field method to evaluate field uniformity applying IEC published standard IEC 61000-40-20. The analysis...
Using IDE usage data to analyze the behavior of software developers in the field, during the course of their daily work, can lend support to (or dispute) laboratory studies of devel- opers. This paper describes a technique that leverages Hidden Markov Models (HMMs) as a means of mining high-level developer behavior from low-level IDE interaction traces of many developers in the field. HMMs use dual...
Recently, various 3-D talking heads have been applied to computer-aided language learning as a novel mode. However, there is a lack of objective evaluation of learners' perception of the talking head when learning Mandarin as a second language. This study used eye-tracking methodology to evaluate a multimodal 3-D Mandarin pronunciation tutor, in comparison with real human instructor. The pronunciation...
In this paper, we proposed a design considering for web application firewall system. Anyway, the website managing, web technology and hacker technology are vastly different from each other, whilst hacker techs are keep on moving forward, while company and government MIS are difficult of updating their information to the latest state due to working, they are often not updated and followed to the latest...
This paper introduces a memory efficient architecture for belief propagation based disparity estimation. To find the bottleneck of the memory, a lifetime analysis of the exchanged message is presented. The analysis leads to architecture which can take advantage of the data characteristics resulting in memory reduction, computing resource and memory access. In the experimental result, the proposed...
It is quite common and easy to modify graphics with special effects using multimedia software applications. Graphical effects might able to direct visual attention of the audience to the foci of the graphic presentation. This paper intends to demonstrate two different approaches on preparing the instructional graphics with special effects and to use eye tracking for analyzing the performances in terms...
The paper reveals a trend of substituting PC with thin clients. Features and application demand of thin clients are investigated. A comprehensive evaluation system is established, which takes factors including hardware, remote concentrated management system, peripheral compatibility, performance, reliability, virtualization platform compatibility and energy consumption into account. Furthermore, we...
This paper reports on a research project that aimed to identify the different aspects of knowledge management (KM) in the software (SW) industry sector. The study employed an inductive qualitative approach based on a single case study of a successful SW development company in Taiwan. The company was selected as it is already explicitly using knowledge sharing (KS) through story telling in their practices...
Text data hiding is a steganographic technique different from the secrets hiding in multimedia, such as images, audio and video. Sun et al. proposed a text data hiding scheme to divide the Chinese character into left and right parts for enhancing the capacity, which is called L-R scheme. Adopting the concepts of Sun et al.¡¦s scheme, Wang et al. proposed an improved version to incorporate the up and...
Many college students as well as youngsters have been addicted to computer-based games, which have negative and positive effects on them. Therefore, how to convert their negative effects into positive impacts has attracted a number of researchers' attention. Designing proper computer-based educational games is a good solution. By investigating college English teaching and college students' playing...
With the background of practical automatic control project of stage mechanical equipment in Qujing, Yunnan, P.R.China, high levels configuration software of Schneider Electric named Monitor Pro7 is introduced to accomplish the task of monitoring and controlling on site. Related structure diagram of the control system is shown and the function of Monitor Pro7 is emphasized. The characteristic of the...
This research adopts “A Pattern Language” as a basis, proposed by Christopher Alexander, an architectural theorist who thinks a designer can extend more design patterns if he can pass on the developed design knowledge and accumulate the results. On the other hand, the Agent-Oriented Design is a new generation method of programming design that mainly uses the script language as a basis for development...
The study is to empirically explore the enterprise resources planning (ERP) implementation strategies based on risk management theory. Five risks are proposed, namely: system risk, implementation risk, change risk, organization risk, staff risk after widely literature review. A survey is developed to collected data from ERP suppliers and firms in Xi'an to test the proposed model. The results from...
In order to simulate traffic movements of the left-turn waiting zone (LWZ) at signalized intersection to quantitatively evaluate the operational performances after the implementation of the LWZ, following the introduction of the concept of the LWZ, its application environment were recommended, the modeling method of the LWZ was established, and the simulation evaluation indexes were introduced. Based...
Because of the fluidity and continuity of a stream data, historic transactions might become obsolete and useless as new transactions arrive. It is more desirable to mine the frequent patterns in the recent time windows of a data stream. This paper proposes a method to mine the recent frequent patterns in the sliding window of data stream. It uses a conservative method to calculate the approximate...
Based on the demand analysis of network operation of rail transit AFC system, a new kind of contactless IC card reader middleware is designed in order to make different non-contact IC card reader equipment compatible with each other, unify the fare calculation and achieve uniform ticket process. The contactless IC card reader middleware includes initialization module, security access module, ticket-card...
In order to solve the problem that the fixed duration testing method, which based on the classical statistics, canpsilat satisfy the requirements of reliability testing for modern safety-critical embedded applications software due to the long testing duration, a hierarchical reliability demonstration approach was provided in this paper. The method unified architecture-based reliability modeling, maximum...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.