The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of information technology, software plays an increasingly important role in the process of social development. However, at the same time, the number of software vulnerabilities is growing, posing a threat to national security and social stability. Therefore, some scholars and research institutions are paying their attention to the study of software vulnerability. In this paper,...
A planetary gearbox (PG) has many advantages and thus it is widely used in industry. It is reported that poor operating conditions and complex loading can lead to the impact on the PG, even the failure of the whole transmission system. Therefore, the dynamics and vibration characteristics of the PG has increasingly attracted attentions for the aim of designing a highly reliable and low-vibration planetary...
A data acquisition and monitoring system of machine tools is designed, which is based on Zigbee and GPRS wireless communication technology. The monitoring and alerting about the safety status of the machine tools operates via the acquisition of such physical parameters as temperature and noise. The hardware such as the CC2530 RF circuit and power module is designed. Based on the CC2530 module and...
Cloud applications on the cloud computing platform are different from traditional applications. In addition to SQL databases, cloud applications usually store their data in NoSQL databases. However, most NoSQL databases do not support join operations. Therefore, the traditional relational data modeling approach is not suitable for NoSQL databases, and it makes data query more complex in NoSQL databases...
With the large-scale distributed system plays an increasingly important role in such fields as national security, critical infrastructure and social life, its vulnerability analysis problem has become a growing focus nowadays. As a vulnerability analysis object, a multi-layer model is put forward firstly, and then a multi-dimension vulnerability analysis framework of large-scale distributed system...
Means for classified documents protection have been developing from simple and traditional ways like identity authentication, file encryption, host supervisory and operation audit to integrated and new style ways, like transparent encryption, intranet integrated supervisory, documents concentrated management and virtual security control. This paper introduces the principles and technologies taken...
At present, application of GIS is in a process of transition from macro space to micro space, such as indoor space, a kind of micro environment that has a smaller scale than outdoor space. There have been some applications for indoor space, covering issues like path finding, emergency planning, object tracking, etc. Behind these applications, indoor spatial models are needed to illustrate how built...
Model-based testing helps test engineers automate their testing tasks so that they can be more cost-effective. When the model is changed due to the evolution of the specification, it is important to maintain the test suites up to date for regression testing. A complete regeneration of the whole test suite from the new model, although inefficient, is still frequently used in practice. To handle specification...
Resonances degrade the product's EMI or immunity performance at resonance frequencies. Near field scanning techniques, like EMI scanning or susceptibility scanning determine the local behaviour, but fail to connect the local behaviour to the system level behaviour. Resonating structures form part of the coupling paths, i.e., identifying them will aid in understanding system level behaviour of products...
Service oriented computing provides a novel approach to building new software applications through the reuse of existing services. In this paper, we present SOARWare, a suite of middleware and tools, for software production and running based on Web services technologies. Basically, SOARWare consists of three major components including SOARBase, Service Oriented Software Production Line and Service...
In this paper, a multi-touch analyzing algorithm is presented to meet the requirements of the educational application. The proposed algorithm is designed for the purpose of multi-camera, high efficiency and low CPU consumption, which includes background image accumulation, blob recognition, blob tracking, multi-camera collaborative process, data fusion and blob track post processing algorithm etc...
Development efficiency is an important factor for the Internet-scale software produced through services composition. In this paper, we aim at improving development efficiency from two aspects. One is to improve services discovery efficiency through recommendation, and the other is to provide a mechanism to reuse an existing composite service. We propose BestRec, a behavior similarity based approach...
The Lagrangian multiplier based rate-distortion optimization (RDO) has been widely employed in single layer video coding. During the development of scalable video coding (SVC) extension of H.264/AVC, it was directly applied in a multilayer scenario. However, such an application is not very efficient since the correlation between layers is not considered in the Lagrange multiplier selection. To improve...
In order to decrease unfair evaluations to service peers in peer-to-peer network, a trust model based on the declaration of preference is proposed in this paper, which considers the similarity between two peers' preferences. The trust model gives the declaration of preference, and proposes algorithms to carry out the computations. Experiments show that our model is better than the trust model without...
The collaboration modeling and simulation with software interfaces based on high level architecture (HLA) is presented. According to the data exchange standard in CAD domain, research the sharing of simulation model, simulation model reuse and simulation model transformation on the collaboration simulation platform. After analyzing the function of the mechatronic systems, the logical structure of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.