The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A great portion of data on the Web lies in the hidden databases of the Deep Web. These databases can only be accessed through the query interfaces. The data information in these databases can only be obtained by data sampling. Efficient and uniform data sampling approach is very important to other research work, such as data source selection and ranking, for the data samples can give insight into...
This research aims to examine the legitimation process that gains stakeholder support for information system projects. A qualitative case study approach was employed to investigate a smartcard system project at a regional university in China, with semi-structured interview as the main data collection method. This case study revealed that the legitimation process consisted of four main project phases...
In this paper, Study on the streams encryption key generator based on Chaos Theory, and the number of parameters by introducing a range of piecewise linear chaotic map(PLCM), to achieve encryption algorithm design, analysis results show that this algorithm has good initial value sensitivity nature, distribution, as well as auto-correlation function features. This design can use the logic hardware...
In this paper, we proposed an algorithm finding roots of algebraic polynomial based on PID (proportional-integral-derivative) neuron network, which the hidden layer of PID neural network was composed by proportion, integral and differential neurons. The PID neural network's input was error signal between the value of polynomial at and the given value 0, and its output was the root to find. The specific...
In this paper, under linguistic truth-valued lattice-valued first-order logic system lF(X) , the Consistency of reasoning rules is obtained, by select the parametric ??,??, T and I of approximate input information from the fuzziness and the incomparability in the intelligent information processing. Secondly, with the representability of inference rules in model (1) investigated, we also study consistent...
An accurate and efficient method to predict the shielding effectiveness (SE) of a rectangular enclosure with rectangular apertures is presented. A more accurate mathematical disposal is suggested for the calculation of slot impedance. And the point is to replace the former approximate expression by rigorous elliptical integration. Finally, the predicted results of the new method are compared with...
Aspect-oriented programming is an emerging programming paradigm. Now the concept of aspect-orientation stretches over other development phases and other domains. Many researches have focused on aspect-oriented Web service composition domain. However, none of them offers a formal foundation for the aspect-oriented service composition. In this paper, we propose a Petri net-based algebra for aspect-oriented...
The concept of (????, ??????q??)-fuzzy filters of lattice implication algebras is introduced and some related properties are investigated. In particular, we describe the relationships among ordinary fuzzy filters, (??,?? ??q)-fuzzy filters and (????, ??????q??)-fuzzy filters of lattice implication algebras.
Authentication protocols are the basis of security in networks. Therefore, it is essential to ensure that these protocols correctly. However, it is difficult to design authentication protocols that are immune to malicious attack, since good analysis techniques are lacking. In this paper, combining some analysis methods currently for analysis of security protocols based on Petri Nets methods together,...
How does inhaled formaldehyde transfer the genotoxicity from exposure organ to site distant organs via blood? This is the key question to understand leukemia induced by formaldehyde. To answer this question, we used new born calf serum (NBS) as "blood" and Hela cells as materials to investigate its effects on cellular thiol concentration and DNA-protein crosslink (DPC) induced by formaldehyde...
In the development of grid-connected PV systems, efficiency plays a key role for solar farmers to shorten their capital payoff. Moreover, it is found that the architecture of a grid-connected PV system affects its efficiency greatly. After an overview for kinds of power architectures in grid-connected PV system, multi-string configuration attracts us most attention for its best compromise between...
The final destination of Chinese E-government is to establish the "one-stop" pattern, which is on the basis of the construction of integration among different units and application systems. And the key point of integration lies in the realization of data between heterogeneous information systems. This article discusses the use of bus technology to solve the data exchange efficiently and...
The emergence of World Wide Web has made flood of information. But the knowledge of the Web resources has not been utilized fully yet. Traditional search engine does not satisfy user need. At this paper, the soft match approach between user query and Web pages is put forward. And so, a Low Adjacence set is defined as Web pages in which contains all the words of user query. A concept lattice is constructed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.