The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For improving the evolvability of software architecture, the paper proposes a software architecture refactoring strategy based on software evolution, which is retrieved from software change history by using the formal concept lattice technology to analyze the evolution dependency relation between components. Moreover, an example is shown for explaining its usability.
The compression effect of existing lossless compression algorithm for JPEG file is poor. This paper introduces lossless compression methods combined by shuffle algorithm and lossless compression algorithm and proposes a novel algorithm. Combining this algorithm and universal lossless compression algorithm, we compress losslessly to JPEG file. The results show that this method can further remove the...
The three-phase software phase-locked loop is widely used in electronics converters. Because of the difference in the loop filter, the precision and the speed of the phase-locked loop(PLL) have some distinction. This paper designed PI filter for loop filter and PI together with second-order HPF for loop filter respectively. The simulation result indicated that the PI controller have good tracking...
With the increasing prevalence of large scale cloud computing environment, researchers has draw more attention about how to provide software as a service through the internet. In this paper, a novel approach named vSaaS is proposed in iVIC platform, which is the virtual computing environment for HaaS and SaaS applications. The aim of this approach is to provide the software as a service from a cloud...
A novel methodology for development of recipe engineering by using Procedure Function Chart (PFC) is proposed. The method is based on the combination of procedure and equipments in the batch process. The batch recipes are elaborated by Procedure Function Chart that linked to phase level operation. The Procedure Function Chart supports recipes with complex procedures that vary from one product to another...
Software reliability is a very important and active research field in software engineering. There have been one hundred of prediction model since the first prediction model published. Halstead model needn't test data and can be used before software test. But the model lost sight of many factors affecting software reliability. We aimed to improve prediction precision of Halstead model. So we improved...
This article is discussing in how to optimize a suitable computer aided industrial design software, from the follow three aspect, industrial design students, design company and manufacturers, product type. And conclusing that the key to learning software, “not much, but in essence.“ A good designer should be master one software of every type of software. In accordance with their own strengths, interests,...
In this paper, 40 important factors which inflected the practicing of evaluation information systems was found, that was an obstacle to promote the evaluation software in China today. A four-layer complex system about problems in performance evaluation is created, which involves some tough problems existing in the process of performance evaluation and its information systems in China. Taking the management...
In recent studies, the lifetime of Wireless Sensor Network(WSN) has been paid more and more attention to in order to evaluate the network performance. To save energy on software level, sleep scheduling plays a very important role and how to predict the time period when a mote can go to sleep mode is an essential technology. In this paper, a predicting model is proposed as a preliminary study to do...
Because of the deficiency existing in both zero-order algorithm and first-order algorithm of ANSYS, this paper presents an improved method combining with both algorithms. Firstly, the zero-order algorithm is adopted to confirm the approximate location of the optimal solution, which will not be trapped into local optimum solutions. Secondly, the first-order algorithm is applied to determine the best...
In this analysis of profiles and messaging behavior on a major online dating service, we find that, consistent with predictions of evolutionary psychology, women as compared to men state more restrictive preferences for their ideal date. Furthermore, women contact and reply to others more selectively than men. Additionally, we identify connections among messaging behavior, textual self-descriptions...
Aiming at solving the problem that existing model driven architecture (MDA) cannot provide effective guidance in business modeling and requirement modeling stages of developing management information system (MIS) software, this paper presented a business-model driven architecture for developing MIS software by introducing a business model component into current MDA framework. In the presented architecture,...
This paper analysis the structure and working mechanism of capacitive vortex flow sensor and studies the signal conversion way of capacitive vortex flowmeter sensor. The part of hardware circuit of secondary instrument of capacitive vortex flowmeter was designed. Signal conditioning circuit was designed including a preamplifier circuit, filter circuit and Schmitt shaping circuit. The keyboard interface...
For better predicting and optimizing the blasting parameters in underground deep-hole mining, 16 groups of deep-hole blasting parameters are collected and collated, combining rough set and artificial neuron network theory, an optimized model for basting parameters in underground mines' long-hole caving based on rough set and artificial neural network is set up. Adopting the rough set software for...
In general, the present China's safety production situation takes a turn for the better continually, but the situation remains harsh; it is considered that one of the important measures for preventing accidents is intensifying safety education, safety training and improving the quality of laborers. In this paper, the famous statistical software-SPSS is introduced firstly, then a sample survey bas...
The sharing of map symbol is an obstacle to the sharing of map data. And It is a basic problem of computer mapping. Because the map symbol is always kept as an internal structure and different systems generally define different structures of map symbols, the sharing of map symbol become difficult. Researchers have tried many methods, but get fewer achievements. The paper analyzes the problems in current...
The Chinese Very Long Baseline Interferometry (VLBI) network (CVN) is a synthetic aperture radio telescope with the equivalent diameter up to 3000 Km. This telescope aims to astronomy observations and deep space explorations. The correlator is the kernel data processor, and its operation is both data intensive and computation intensive. This paper presents the structures of two CVN software correlators...
This paper clarifies the importance of developing an information security training platform and expounds the composition of knowledge system and platform architecture of the training system which aims to train students' practical ability, design ability, communication skills and team cooperation ability. And finally it puts forward to a solution about real environment and virtual host of information...
This paper reports put forward a research about secure access gateway based on moving the control terminal down to the layer 2 switches through the analysis of the actual network condition in university, and design a 24 ports hardware product by using embedded NAT processing unit. After a year of online testing, this product achieves in the function of address translation, access control, user binding,...
Researchers have done many studies on the low performance of information system development (ISD), requirement uncertainty, user interaction, personal conflict as well as IS performance has become focus. Previous literature has mentioned the importance of the above four, but empirical studies are handful. This paper attempts to summarize the relationships among them through empirical research, providing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.