The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Most of power consumption in CMOS chip comes from dynamic power, which is direct proportional to the parameters of gate switching activity rate (R??) and number of gates (N). The gate switching power consumption accounts for above 80% (aiming at adder and multiplier) of total circuit's power consumption. By redefining this theory (RT = count / N), and using the gate or register as analyzed "particle",...
A novel porous micro heat sink system is presented for dissipating high heat flux of electronic devices. Numerical model for the micro heat sink is proposed to describe heat transfer in the metallic wall and liquid flow and heat transfer in the porous wick structure, and it is solved with SIMPLE algorithm as a conjugate problem. The numerical results showed that the heated surface temperature of porous...
A porous micro heat sink system is presented for cooling of high power LEDs, which has high heat transport capability. The operational principle and heat transfer characteristics of porous micro heat sink are analyzed. Numerical model for the micro heat sink is proposed to describe liquid flow and heat transfer based on the local thermal equilibrium of porous media, and it is solved with SIMPLE algorithm...
Preference restraint cone data envelopment analysis model is recommended and extended to interval number case. A mew model for project selecting has been established based on preference restraint cone data envelopment analysis model and interval data envelopment analysis. The approach is illustrated by an example. It is shown that the introduced model is convenient for integrates decision-maker's...
The products of higher education provided to the customers by colleges and universities are service. Service attribute is the basic characteristic of higher education. Whether customer is satisfied is very important to the future of college. The model of service customer satisfaction in higher education is established to explore the relationship of service quality, image of colleges and universities,...
Segregation in the Hot-Mixed Asphalt (HMA) causes inferior homogeneity of pavement structure which is a key contributor to the early pavement damage. This paper, by statistic principles, analyzes the contributive factors to the segregation, indicates the major factors and guides the controls in actual project, thus to reduce the unevenness of the pavement and improve the quality and durability of...
The investment and size of Hydraulic structures is usually huge and its working conditions are complex. If the optimization techniques are applied, the project investment can be effective economized, the period can be shorted. Thus the Economic and social benefits exerted in advance. In the paper, after the Defects of the optimization method and applications defects in the hydraulic structures, the...
Ethernet is gradually developed in the MAN and even WAN, which is taken as core network by more and more customers. Correspondingly, the Ethernet ring protection switch is increasingly being considered as a key technique of Carrier Ethernet. This article discusses the function modules of fast automatic protection switch and the mechanism of APS. Besides, this thesis proposes some solutions to certain...
In this paper, releasing range model of traffic guidance information is formulated based on combinatorial optimization by the correlation analysis of road traffic flow in time and space. As it is hard to get the optimal solution in a limited time through analysis, a greedy algorithm and a simulated annealing (SA) based algorithm are presented to solve the model. Some traffic flow data detected by...
In this paper, a novel method, process noise identification based particle filter is proposed for tracking highly maneuvering target. In the proposed method, the equivalent-noise approach is adopted, which converts the problem of maneuvering target tracking to that of state estimation in the presence of non-stationary process noise with unknown statistics. A novel method for identifying the non-stationary...
Starting from the goal to overcome the limitation of the single type algorithm of iris recognition. In this paper, a two-step iris recognition algorithm is proposed based on feature extraction on corner and Gabor transform. First of all, it uses the corner feature of iris texture to recognize for achieving the purpose of removal of alien and confirm the vast majority of similar samples rapidly; if...
E-learning is a modern learning manner that fitting the learning features in information society. It carries out education and provides service in virtue of Internet, and it also broadens out the confine and concepts of study, transcending the meaning and extension of traditional training. This article analyzes the background of times which e-learning was produced, states its basic implication and...
The emergence of e-learning has brought vitality to traditional teaching, because it has a great advantage in knowledge transformation, classroom teaching, social interaction. The e-learning into classroom, not an alternative to the traditional teaching, but keep collide and interact with each other, Then be continually refined and developed. For a long time, people focus on the role of e-learning...
Our model is a dynamic network model to the political districting problem. Firstly, we map counties in the state to points in the county-based network. Using depth first search (DFS) algorithm and breadth-first search (BFS) algorithm, we guarantee the continuity and compactness of each district. Also we introduce and use grid-based method to divide counties. Finally, we illustrate this model by districting...
The paper has improved the coding system and analysis techniques of the FIAS which a typical quantitative analysis tool for classroom teaching by the modern information technology. It is also to indicate that the improved system would display various deeds and behaviors in teaching practice at a very clear, objective, comprehensive and quantitative level. The results of the research and the practice...
Video has become an important element in e-learning. Comparing with text and picture, video is more difficult and important in navigation design because learners know about its real meaning only through playing linearly. The authors consider that the navigation system of instructional video can be divided into two categories: outer navigation and inner navigation. Based on two kinds of Inner navigation...
Regarding assessment level of experts in group decision making based on different granularity linguistic judgment matrices, the linguistic judgment matrices are quantified through constructing transfer function in this paper, the matrices are transformed into the reciprocal matrices with 1-9 scale, furthermore a method to assessment level of experts is proposed based on the theory of mathematical...
To improve the efficiency of firefighting practice, two artificial intelligence techniques, case-based reasoning (CBR) and rule-based reasoning (RBR), learning from other's strong points to offset its weakness, are combined and applied to the system designing process of firefighting tactics intelligent decision system in this paper. Then, the system architecture and its working process are introduced,...
During solving the constrained multi-objective optimization problems with evolutionary algorithms, constraint handling is a principal problem. Analyzing the existing constraint handling methods, a novel constraint handling strategy based on infeasible individual stochastic binary-modification is proposed in the paper. Its key point lies in modifying randomly infeasible individual into feasible one...
To provide large capacity of the hidden secret data and to maintain a good visual quality of stego-image, a novel steganographic method based on SOM and wavelet contrast is presented. Firstly, an image was divided into blocks, and every block was decomposed into one-level wavelet to obtain the wavelet contrast. Then, blocks were classified by the Self-organizing Map (SOM) Neural Networks. Finally,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.