The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Configuration management tools, CMTs for short, are a set of indispensable software for DevOps (Development and Operations). CMTs automate system deployment and configuration through CMT modules, which are reusable, shareable units of configuration code. Therefore, thousands of CMT modules have been developed for various systems, and are still growing fast. Although CMT repositories usually provide...
Operation services are reusable and shareable units of configuration code executed by configuration management tools (CMTs), achieving continuous deployment and continuous delivery. With the prevalence of DevOps (Development and Operations), thousands of operation services have been developed for various software systems, and they are publicly available through the online repositories of popular CMTs...
With the development of computer network and widely used of Internet, online information increases in broadband level exponentially, the difficulty and complexity of information retrieval also increase gradually, so the Crawler is developing rapidly. Crawler is a program that can auto collect information from internet. In this paper, we design and implement a multi-thread Crawler for specific resources...
As the virus has been spread without restriction, there needs an effective method to detect the virus. After analyzing the current detection methods of the virus, one method, which is on the basis of jump state, is proposed to analyze the malice behavior. From four aspects, such as the element definition, the simple regulation, the formalized description and the mapping-relation description, the formalized...
Image category recognition is important to access visual information on the level of objects and scene types. This paper presents an automatic recognition system of scene and object with PCA-SICEF feature for digital color images. SICEF (scale-invariant color and edge feature) is an extension of the conventional local SIFT (scale-invariant feature transform) feature, which only include edge invariance...
Much public attention has recently been drawn to the use of content identification technologies to filter or block the unauthorized publication of copyrighted material on Internet sites, as part of the content industry's effort to recover ground in the fight against Internet piracy. However, the underlying fingerprinting algorithms that are broadly used for content identification have actually been...
In this paper, we investigate a recently proposed efficient subspace learning method, Spectral Regression Discriminant Analysis (SRDA), and its kernel version SRKDA for head pose estimation. One important unsolved issue of SRDA is how to automatically determine an appropriate regularization parameter. The parameter, which was empirically set in the existing work, has great impact on its performance...
To explore the nanoparticles-dependent signaling pathways is a rapidly growing research field. Here, we globally elucidate the regulation modules of cellular molecules by using graph-based representation of complex networks. We have packed some useful bioinformatics methods (Matlab Simbiology and Pathway Studio) into an integrated system for graph-based representation and complex networks modeling...
The Introduction of multi-agent system is an attempt on fault diagnosis of solving complex problem. On the basis of the thought of the distributing artificial intelligence, this paper have analyzed diagnosis method and process of distribute intelligent malfunction based on MAS, and have discussed the problem-solving mechanism based on model cluster class, recognition and decomposition of diagnosis...
Currently those algorithms to mine association rules only pay attention to one aspect of efficiency or accuracy or correlativity respectively, even they ignore mining principal factors among all the correlativity. Thus, there seems a paradox among efficiency, accuracy and correlativity. In order to resolve to this conflict, a novel algorithm based on Probability estimate and principal component analysis...
This paper has analysed the a priori algorithm performance, and has pointed out performance bottleneck question of the a priori algorithm. Currently those algorithms to mine association rules only pay attention to one aspect of efficiency or accuracy respectively. There is a paradox between efficiency and accuracy. In order to resolve to this conflict, a novel algorithm based on probability estimate...
With the development of high rate data transmission technology via distribution line communication, the electric power, data, voice and video can be transferred in the same electric power distribution network, and the technology will be put in operation widely in the future. However the traditional technology of power line communication is not adaptable to the complex and harsh environment of distribution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.