The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Applying automatic summarization to search engine can make it easier for users to find out the content of the Web page. In this paper, the results of search engine are analyzed. On the basis of query keywords expansion, we propose a new summary approach which calculates the sentence weight utilizing the information of the distance between words. The results of experiment show that this method can...
The aim of the study is to evaluate the cell affinity of poly(3-hydroxybutyric acid-co-3-hydroxyvaleric acid) (PHBV) thin films using a parallel plate flow chamber system. The PHBV thin films were modified by anhydrous ammonia gaseous plasma treatment. Mouse 3T3 fibroblast cells were seeded on bare and plasma modified PHBV thin films, respectively. A laminar flow enforces the cells on these films...
This paper considers the guaranteed cost control problem for uncertain nonlinear networked control systems (NCSs). Firstly, the NCS model with random time-delay is transformed into a discrete-time system model with uncertain parameters. Then, the Lyapunov stability theory and the linear matrix inequality (LMI) approach are applied to design a guaranteed cost controller, which results in that the closed-loop...
Different from traditional risk management, real-time risk management describes system risk dynamically. It includes three phases: risk analysis, risk evaluation and risk prediction. This paper proposes a practical framework to real-time risk management. Risk evaluation is a quantitative analysis process of system security and risk, and it is a basis of real-time risk management. This paper adopts...
The traditional annotation technologies focus on the content of the resources which is normally done by the system managers. There are some Web applications which allow users to annotate the resources besides the content; we call this phenomenon as pervasive annotation. This paper defines the pervasive annotation as a correlative procedure of tag assignation, rating, description and usage status marking...
Uplink resource allocation in OFDMA cellular networks enhanced with two-hop fixed relays is studied in this paper. A resource optimization problem that maximizes sum uplink throughput of all users is formulated under path selection and PHY/MAC constraints. The dual decomposition method is adopted to solve the problem efficiently and optimally. Dual problem of the primal problem is decoupled into N...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.