The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we proposed the computer vision and behavior imaging science and technology into the field of treatment of children with special needs, aiming to use computer algorithms to automatically analyze children's gaze, and further investigate children's behavior patterns and distinguish whether children are with autism characteristics in our CSBS video. We perform a series of image processing...
To reduce network energy consumption without losing system performance is a key technique in 5th generation wireless communication systems. The on-off control in multi base stations scenario is proved a mixed dynamic integer programming problem and is hard to be solved. In this work, we provide a novel energy aware dynamic on-off control method in multi-base station scenario to tackle this problem...
In this paper, we consider the termination problems about uninitialized and initialized two variable homogeneous linear loops. Through analysing the properties of the boundaries of the set NT composed of all points on which a given uninitialized two variable homogeneous linear loop does not terminate, we reconstruct a group of simpler and complete quantified formulas to check whether a given uninitialized...
Serious games have been recognized in many application areas such as heath, education and training. Designing interactive games responsive to user emotions improves their effectiveness and user acceptances. A major factor in user interaction is the emotional reaction to game scenarios, which has motivated us to analyze immersive games using biofeedback. In this article, a graph-based model is presented...
File encryption is an effective way for an enterprise to prevent its data from being lost. However, the data may still be deliberately or inadvertently leaked out by the insiders or customers. When the sensitive data are leaked, it often results in huge monetary damages and credit loss. In this paper, we propose a novel group file encryption/decryption method, named the Group File Encryption Method...
Tiwari gave the quantified formulas to check whether the two variable homogeneous linear loop terminates in 2004. But we find that a certain quantified formula is neglected in Tiwari's result, which corresponds to a possible case of the set NT of nonterminating points. In this paper, through analysing all possible cases of NT, we reconstruct a group of complete quantified formulas to determine if...
In ITS model (Intelligent Tutoring System), student model plays a significant role and its intelligence mostly decides the quality of the whole system. Various theories have been put forward to implement student modelling. On the basis of previous experiments' results, this article introduces a new quantifiable model to record and reflect students' learning processes and results. It is named the CMA...
The objective of this paper is to explore the priority of the improvement in respect of the users' requirements of digital game and to identify the engineering characteristics of Human-Computer Interface that can be better improved. Focused on the two most popular games (Massively Multiplayer Online Role Play Game and Action Game), this paper applies Quality Function Deployment to find out the priority...
Bullet mark comparison is one of the key techniques in the discovery of evidences in gun related cases. A bullet mark comparison method base on statistical method was presented in this paper. First the bullet marks data are gathered according to generally used equipment. Then set up frame for the bullet and analysis some kinds of error types existing in measurement. There are many coarse data that...
By using DS18B20 as temperature sensor, MOC3041 and BTA16 as executive elements, the system can control the power of electric stove to regulate water temperature through the PID algorithm. Then the temperature information of the points is transformed to the host computer system by wireless communication module. The host computer system is used to monitor and adjust the temperature and the liquid level...
To detect the residue of polycyclic aromatic hydrocarbons (PAHs) in the environment quickly by immune method, preparation of high quality antibody against PAHs is the most critical step of the project As the first step toward developing sensitive enzyme linked immunosorbent assays (ELISAs) for selective detection of anthracene in environment, a new hapten was synthesized by the Friedel-Crafts acylation...
We present a method for the synthesis of non-linear ranking function of a program loop. Based on the region-based search, it reduces the non-linear ranking function discovering to the inequality checking. The inequality prover BOTTEMA then can be utilized to check validity for inequalities. In contrast to other approaches, the new approach can also discover the ranking function with the radicals due...
Logic is a very important part of discrete mathematics, which is fundamental to computer science. It now has wide applications in many areas and plays more and more important role in computer science. Soundness, completeness,and compactness theorem are added into typical discrete mathematics. Specially, It adopts tableau proof system instead of traditional axiomatic proof system. This can simplify...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.