The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the problems appeared in some infantry fighting vehicle's actual training, this paper combines the advantages of virtual maintenance, proceeds from aspect of system engineering, takes demand of actual training into account, uses Solidworks, 3ds max and EON synthetically, chooses the form of desktop, set up a virtual maintenance training system of the equipment.
This paper aims to devise a cardholder recovery scoring model which enables card issuers to identify creditworthy debtors recoverable from delinquency without misclassification risks. Taking advantage of integrating such highly performed classifiers as artificial neural networks (ANNs) and multivariate adaptive regression splines (MARS) with a relative efficiency evaluation tool, data envelopment...
Angular color uniformity (ACU) is essential for LED general lighting. We demonstrated a freeform lens to enhance the ACU of white light-emitting diodes (LEDs) whose phosphor layers were coated by freely dispersed coating processes. The design method of the freeform lens was introduced briefly. Accurate optical models of white LEDs were built. Monte Carlo ray tracing simulation results indicated that...
In the face of more and more complex and unpredictable network security threats, although an increasing number of security products have been deployed in personal computers, application servers and networks, we are still in a passive embarrassment. How to detect and response to network security threats immediately before threats occur or reach the target system is a key issue to solve current security...
Now, a model-based software developing method is promoted by the OMG through the specification of MDA (model driven architecture). In this paper, an application strategy of the method on component development and assembly is proposed, the meta-model and MOF (meta object facility) of MDA for component are described, and then analyzed the component model and model assembly. The feasibility of the technology...
In this paper, an edge driven model is proposed which allows all kinds of manipulations of complex networks that are common in most of the real-world networks. It is based on evolution features other than structural features that are employed in other models. Under this framework, a particular model is generated for reproducing the power-law distribution and the analytical results are also given.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.