The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, there have been complaints that the traditional curriculum system of the universities of China do not respond properly to the needs of the labour market. To be competitive in a global market and to educate successful global talents, the universities of China have to restructure their education programs. In this paper, based on the successful experiences in the modular teaching of...
This paper presents the teaching design for Computer Basic Course Group, according to lack of learning initiative in current universities computer basic teaching and weak independent study of students. The combination of "classroom, experiment, extracurricular" with the information network method using in teaching realizes the process of student-centered teacher-directed teaching practice...
Component-based software has been proposed as a methodology for improving software reuse and has increasingly been adopted by robot software developers. At the same time, robot systems typically have real-time performance requirements and performance gains can often be obtained by multi-threading. It is challenging, however, to create correct multi-threaded software, especially when standard mutual...
With the energy crisis and environmental pollution becoming more and more serious, the traditional fuel vehicles have exposed many shortcomings. Electric vehicles gradually became the focus attention of both governments and car manufacturers, and the popularity of electric vehicles will be the inevitable trend of social development, so the electric vehicles charging station will become indispensable...
The rapid development of internet has brought a series of challenges for traditional software theories, models, approaches and technologies. An agile software engineering method is thought to be imminent. Components designed for reuse is expected as a way to resolve these problems. Some methods provide a top-down vision to direct the component-oriented development process. But the gap between initial...
The ability to account system resource usage by software is the key to the design and optimization of modern computer systems. For example, scheduling and memory management are two classic operating system (OS) functions based on the ability to account the CPU and memory usage by process. Energy has become an important system resource due to electricity and thermal concerns. This is particularly true...
According to the characteristics of these pressure waveforms, we firstly design the gross structure of the acquisition system and make the matching and triggering circuits corresponding to the AC1030 acquisition card. Secondly we place a sampling length to the interface through programming, and meanwhile circularly start up the A/D conversion, so the way of memory of the memorizer changes into the...
The Chinese Very Long Baseline Interferometry (VLBI) network (CVN) is a synthetic aperture radio telescope with the equivalent diameter up to 3000 Km. Through the electronic VLBI (e-VLBI) technology, the four stations and the data processing center are connected by the high speed network. e-CVN is a multi-purpose e-science platform with the merit of quick response ability. e-CVN has been successfully...
Today's online social networks (OSNs) do little to protect users' private information especially relationships between them. This paper presents PrivOSN, an online social network system designed to be more private than existing systems while keeping neutral performance, preserving existing services, and defending against kinds of attacks already known. In PrivOSN, users' relationships are kept locally...
With the society's advocacy of "low-carbon energy-saving" way of life, saving energy has been a heated topic. Although the street lamp is an indispensable part of the basic facilities of a city, its large energy consumption at present has wasted a lot of natural resources. In order to solve this problem, many scientific researchers provide many solutions by using software or hardware methods...
A wireless Ad Hoc network is an infrastructureless self-organizing network. Access control problem of strangers may happen because of its strong openness. Trust management based on policy can dealt with such problem, which can deliver access control policies to strangers through credential-delegation to give them permissions. But the delegation frameworks are somewhat coarse-grained and subjective...
In this paper, a hardware/software co-design approach is proposed to parse the video bitstream which conforms to various video compression standards. The layered structure of the syntax elements in video bitstreams is analyzed. Then a hardware/software partition is proposed accordingly. Due to the high data rate, syntax elements in slice data and lower layers are commonly parsed by hardware. As for...
Radar scattering characteristics is an important researching content of military target. It is always very difficult to deal with simulation of electromagnetism field , especially to analyze the monostatic RCS characteristics. Aiming at a kind of complex & electrically large size target , this paper reasonably estimated its multi-point monostatic RCS using smaller resources by adopting the electromagnetic...
Selective regression testing involves retesting of software systems with a subset of the test suite to verify that modifications have not adversely impacted existing functions. The J2EE platform has come to dominate the commercial Java application market. Unlike standalone Java applications, J2EE applications also use configuration files to control the presentation, service, data access, and persistence...
Contradiction between the rapid expansion of WAN traffic demand and local area network export-bandwidth force the flow control nodes are deployed to the local area network key links. The article analysis of the traffic needs of network users. From the perspective of the LAN operations, described the principles and objectives of channel flow control that based on application layer the principle, designed...
How to enhance technological capability of the software outsourcing enterprise is a focal issue in theory study and practice. According to the different executives of enterprise R & D investment, the paper builds the dynamics model of technological capability of software outsourcing enterprise, and verifies the rationality of the model by using vensim software with neusoft group data. Developing...
This paper introduced the research of aircraft maintenance virtual teaching and training system. The system is applied to solve the problems of traditional education technology. In order to realize this system, we chose system configuration, and design system hardware and software platform and structure according to system function requirement. We also discussed the outstanding advantages of the system...
Abstract-On the basis of previous literature, we propose five dimensions of relationship quality in information technology outsourcing (ITO): trust, effective communication, commitment, interdependence and harmonious conflict resolution; then we build a theoretical model of relationship quality, knowledge sharing and outsourcing performance, and propose some hypotheses about them. To test these hypotheses,...
As semiconductor technology scales into deep submicron regime, transient fault vulnerability of both combinational logic and sequential logic increase rapidly. It is predicted that in 2011 transient fault rate of combinational logic will overtake that of sequential logic in processor. In this paper, particle radiation-induced multi-bit transient faults in decoder unit, representative combinational...
In enterprise networks, idle desktop machines rarely sleep, mainly because turning off the hosts will affect the internet connection. While a number of solutions have been proposed, few of them have jointly considered energy consumption and performance. In this paper, we consider the case of file downloading, which is one of the most common internet applications. A system called Parasite is proposed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.