The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we use the function rank and the function select in wavelet tree to implement the faction of the suffix arrays. We also introduce the Canonical Huffman code to encode the Burrows-Wheeler transform (BWT) of a text T. First of all, we use the canonical Huffman code to encode wavelet tree in order to reduce the space of the wavelet tree with Huffman code, we also implement some functions...
Relational storage of XML documents is a hotspot of XML research field. But few studies put forward by now focus on the relational storage of graph-structured XML. Considering that recursive XML schemas are very common in practice and modelling an XML document as directed graph is more reasonable and recommendable, we propose a relational mapping method of graph-structured XML documents based on a...
E-democracy is a new form of democracy in the internet age. E-democracy plays active roles in democratic construction in China. However, the information asymmetries, the inadequate of government administration, imperfectness of relevant laws, and the absence of internet ethics, all restrained the building of E-democracy. Therefore, great efforts should be made to strengthen development of information...
The strong deviation theorem is one of the central questions for studying in the international Probability theory. In this paper, Many strong deviation theorems for Markov chains on a non-homogeneous tree are obtained by constructing a nonnegative super martingale and using Doob's martingale convergence theorem.
In this paper, we propose a security evaluation model for the web application and define a security evaluation function based on the Analytic Hierarchy Process (AHP) to describe the model. We use the evaluation method proposed by this paper to evaluate the vulnerability test effect of a BBS application named IPB. The experiment result reveals that the evaluation value calculated by the security evaluation...
This paper reports on luminescence property of the Er3+-Dy3+ co-doped tellurite glasses. The samples are studied by absorption and visible emission spectra. The measured emission spectrum of Er3+-Dy3+ glass has revealed luminescence bands of both Er3+ and Dy3+ when pumping with the wavelength of 325 nm. The concentration quenching occurred as Dy3+ concentration increased beyond 3 mol%. The characteristic...
Er3+-Tm3+ codoped amorphous Al2O3 thin films were synthesized using pulsed laser deposition and their photoluminescence (PL) properties were investigated. The infrared fluorescence was improved by post-annealing and a broadband emission was obtained. Three cross relaxation channels between Er3+-Tm3+ and Tm-Tm ions were observed for the films with annealing temperature increased from 800 to 850??C,...
Magnetic flux leakage detection (MFL) is widely used as an effective method in detection of broken wires of ropes. In order to improve the accuracy of flaw detection using MFL signal, the effect of the distance between a sensor and the surface of a wire rope (i.e. lift-off) is investigated. The main principles for the choice of lift-off are analyzed, and a method is proposed from the point of view...
A novel nano Fe3O4-Au modified amperometric immunosensor for rapid separation-free determination of human immunodeficiency virus (HIV) p24 antigen in acquired immunodeficiency syndrome (AEDs) patients' serum is proposed. Firstly, one novel sebacato-bridged Cu(II) phen complex Cu(phen)L2 (referred to as CuL, H2L=sebacic acid; phen=1,10phenanthroline) was absorbed on the surface of glassy carbon electrode...
Based on arbitration rules, this paper puts forward a combined coordination mechanism-hierarchical coordination and nonhierarchical coordination-to settle the disputes occurred between/among the supply chain partners. Introduction of intelligent agents system which has the advantage of a more systematic and organizational method in reality without causing unnecessary emotional and behavioral side...
E-government is an important way to enhance the administration and the public service. With the study on metadata, the paper proposes the concept model of the government affairs system(GAS) based on metadata, and also explores the application of metadata and its related technology. At last it probes into the function of metadata in the government affairs system with an instance. It is hoped to be...
Every node in a wireless ad hoc network is both end host (it generates its own data and routing traffic) and infrastructure (it forwards traffic for others), but rational nodes have no incentive to cooperatively forward traffic for others, since this kind of forwarding is not costless. In this paper, we use game theory to analyze cooperative mechanisms, and derive optimal criteria in forwarding.
First-year students in CS/IT curriculum are often overwhelmed by the introduction to programming module, which is a mandatory component for the whole study program. In this paper, we discuss the difficulties students may encounter in this module and propose a novel approach to teaching programming to new programmer with games. We reflect on our experiences on making the programming module friendly...
SoSs (System of Systems) is an unpredictable entity for the users who wish to control and utilize it before it has been constructed. How to distill the concept which is buried in peoplepsilas brain about the SoSs is a difficult and critical work in the SoSs requirement research. This thesis introduce some authority concept of SoSs firstly. By the reference of framework of JCIDS which is USA DOD newly...
In this article, an analytic hierarchy process (AHP) approach is described and applied to a fuzzy synthetic evaluation on customer loyalty of commercial banking industries. Results of the AHP show that the customer loyalty coefficient of certain commercial banking enterprise is within the "very promising" range. In addition, the results also show that repeat purchase intention, referral...
Tongue inspection is not only main content of four diagnostic methods "observation, auscultation and olfaction, interrogation, palpation" for TCM (Traditional Chinese Medicine), but also one of most important characteristics of TCM diagnostic methods. Traditional tongue inspection mainly depends on doctor's eyesight to diagnose a disease. The diagnostic result is not only restricted by doctor's...
It is fundamental work for objective tongue inspection to accurately segment tongue body from original image. This paper presents a new color tongue image segmentation algorithm based on HSI model. The original image was converted to HSI space firstly. Then it was segmented by threshold value of hue and intensity component before it was converted to binary image. Finally the sequential algorithm was...
In wireless ad hoc networks, nodes are both routers and terminals, and they have to cooperate to communicate. Cooperation at the network layer means routing (finding a path for a packet), and forwarding (relaying packets for others). However, because wireless nodes are usually constrained by limited power and computational resources, a selfish node may be unwilling to spend its resources in forwarding...
Up to now, the Internet has been growing both in size and technologically. It is also not uncommon to find many types of media within a single web-page such as 3D animations, sound, video clips, online radio and TV services. Streaming is the technology which enables this, by viewing a media while downloading it. An important amount of research has been achieved to improve this bandwidth sensitive...
In recent years, peer-to-peer (P2P) media streaming has generated many interests both in industry and research communities. P2P is an effective way to spread media data to a large amount of viewers and enables the successful deployment of next-generation Internet services such as video on demand (VOD), IPTV video conference and surveillance. As the Internet becomes more and more wireless and mobile,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.