The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Along with the rapid development of community housing construction, the housing healthy problem that has cropped up from the contemporary housing pattern has attracted extensive concern of both residents and researchers. Through data collection and analysis of real state investigation on various types of selected communities in Beijing and other cities, studies on application of data mining method...
In order to rescue ethnic minority culture, a virtual cruise system, stele garden of ethnic minority language ??Nu??shu??, is realized based on MultiGen modeling software Creator and 3D visual simulation software Vega. By using Microsoft Visual C++ programming language, characteristic human-computer interaction functions, such as cruise interaction, vocalism interaction and specific graphic display...
We introduce some basic notions of the normal basis over binary extension fields, and establish a field multiplication algorithm using these bases. The article can be viewed as a short overview of the normal basis over finite fields.
Personal knowledge management (PKM) is indispensable to human learning, working and living. Clouding computing, as an emerging and impressive technology, is promising to support personal knowledge management by providing users with all kinds of scalable services, such as channels, tools, applications, social support, for users' personal knowledge amplification, personal knowledge use/reuse, and personal...
Based on systematic collection of the hydrogeological data of coal mine, we analyzed the factors affecting water inrush from coal floor and determined the major factors. We used the fuzzy clustering method to evaluate the water inrush risk from coal floor in order to solve the evaluating limitation of water inrush risk from coal floor by the water inrush coefficient method. The fuzzy clustering method...
With the surge of complex network and the rapid growth of the text data, the network modeling and visualization analysis focusing on the text data are urgently needed. This paper proposes and implements such a framework and prototype system based on Chinese text. The system extracts entities and their relations from the Chinese text data, and then constructs three kinds of networks to discover the...
Tagging systems are known to be particularly vulnerable to tag spam. Due to the self-organization and self-maintenance nature of Peer-to-Peer (P2P) overlay networks, users in the P2P tagging systems are more vulnerable to tag spam than the centralized ones. This paper proposes SpamResist, a novel social reliability-based mechanism. For each tag search, SpamResist client groups the search respondents...
Automatic path-oriented test data generation is not only a key problem but a hot issue in the research area of software testing today. Genetic algorithm (GA) has been used to path-oriented test data generation since 1992 and outperforms other approaches. A fitness function based on branch distance (BDBFF) has been applied in GA-based path-oriented test data generation. To investigate performance of...
In light of the present situation research on learner model in adaptive learning system at home and abroad, this paper has put forward a new learner model to achieve self-organization and push of learning resources on the basis of learning goals and learner's personal conditions. It includes knowledge level module, cognitive ability module and preferences module. We respectively introduce the representation...
Typically, software libraries provide API documentation, through which developers can learn how to use libraries correctly. However, developers may still write code inconsistent with API documentation and thus introduce bugs, as existing research shows that many developers are reluctant to carefully read API documentation. To find those bugs, researchers have proposed various detection approaches...
Since attack graphs provide practical attack context and relationships among vulnerabilities, researchers have been trying to evaluate network security based on attack graphs. However, previous works focus their attention on specific evaluations they concerned, and each does things in his own way. There is no explicit way telling network administrators how to measure network security in a general...
An interpreter reads instructions of the source executable and perform each corresponding operation in turn on a software-maintained version of the old ISA's state. Interpretation has emerged as an important tool with real world applications. Interpretation is always adopted to support instruction set emulation and handle the non-hotspot code in a two-stage dynamic binary translation strategy. An...
Three-dimensional-position-sensitive semiconductor detectors provide both the energy and the locations of each gamma-ray interaction in the detector. From these data, Compton-imaging methods can reconstruct the source distribution around the detector as a function of energy. Automated detection and identification methods have been developed to use this combined energy and imaging information to detect...
A new software watermarking method based on public-key cryptography and graph coloring problem (GC) is proposed in this paper. The method with good stealth and security can be applied to protect and verify software copyright. Firstly, the copyright information of ownership should be encrypted for software by RSA public-key cryptography algorithm to ensure that the information is confidentiality, integrity...
Using three-dimensional-position-sensitive semiconductor detectors, our research group has demonstrated the ability to record multiple interaction locations and associated energy depositions due to incident gamma-rays in a pixellated CdZnTe (CZT) detector. These interaction locations and energies can be used to reconstruct a 4?? image of radiation sources around the detector. We have previously demonstrated...
Technology standards are the commanding heights of the competition of current high and new technology industry. Behind of this competition is enormous commercial profit. Starting from the network effect property of the technology standard product, by structuring the utility equation of the technology standard product and copying dynamic equation of the evolutionary game, the competition mechanisms...
The Compiler Construction Principles course is a core foundation stone in a computer science curriculum. The course features a combination of strong theoretical and practical. In order to help students understand the integral structure of compiler and master the complex principles and methods of compiler more easily, an assisted instruction software for Compiler Construction Principle with Java to...
This paper proposes a service selection solution named ZX, which is based on the selector-side QoS measuring results. In ZX, we identify the QoS attributes which could be measured in selector's side, and provide possible solutions to gather the QoS information, and we introduce a new service selecting method, which concerns normal-the-better QoS attributes, by implementing the nearest neighbor algorithm.
Automatic path-oriented test data generation is not only a crucial problem but also a hot issue in the research area of software testing today. As a robust metaheuritstic search method in complex spaces, genetic algorithm (GA) has been used to path-oriented test data generation since 1992 and outperforms other approaches. A fitness function based on branch distance (BDBFF) and another based on normalized...
Digital signal processing is one of the most important techniques in 500 MHz NMR spectrometers. Free Induction Decay (FID) signal should be quadrature-demodulated from 20 MHz intermediate frequency (IF) signal, decimated to a user-defined sample rate and spectrum width. In the design of digital processor of NMR spectrometer console, the techniques of Software Defined Radio (SDR) are applied to achieve...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.