The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Christmas and new year 2016 are coming, in order to stimulate the future development, explore novel applications, and exchange ideas for developing robust solutions, the 12th International Computer Conference on Wavelet Active Media Technology and Information Processing 2015 (ICCWAMTIP 2015) is held at University of Electronic Science and Technology of China (UESTC) in Chengdu on December 2015...
Optimized Link State Routing is well-suited to large-scale mobile network on account of that all the nodes exchange information of all networks periodically. Instead of typing words to chat with others, video and voice streaming increasingly become frequently-used ways for their convenience. In this paper, we have put forward a way to guarantee a high quality of video and voice services. Some quality...
Multirate multicast improves user quality but complicates network optimization. This paper introduces a novel control scheme to dynamically optimize multirate multicast. We present MMT, an adaptive policy which combines differential backlog scheduling and intelligent packet dropping, both based on local information. MMT is shown to maximize network throughput by adapting to changing conditions such...
The linearization of the differential equations is always the important work in the study of partial differential equations. In this paper, a necessary and sufficient condition is established for the existence of a 1-1 transformation of a system of nonlinear differential equations to a system of linear equations is shown with some examples including Burgers' equation and the Liouville equation.
Along with the progress of the demonstration centre of construction projects, using the application in place of funds to purchase a lot of network equipment, in order to solve the network equipment unified management and maintenance problem, an method of network VTP domain for computer experimental teaching demonstration center is presented. First, the VTP concept, function and characteristics are...
National experimental teaching demonstration center construction project is a turning point, promoting the practice teaching reform. First, the experimental teaching idea and reform ideas are presented. Secondly, the teaching system and teaching content are analyzed. Finally, the teaching methods and teaching means are discussed, and the corresponding methods are given, which ensure the implementation...
Serv-U is a widely used FTP server software. This article analyzed the problems of Serv-U and introduced an ASP.NET based solution for FTP remote management system, which is aimed to solve the existing problems and make Serv-U easier to be used and managed.
We study two convex optimization problems in a multi-class M/G/1 queue with adjustable service rates: minimizing convex functions of the average delay vector, and minimizing average service cost, both subject to per-class delay constraints. Using virtual queue techniques, we solve the two problems with variants of dynamic cμ rules. These algorithms adaptively choose a strict priority policy, in response...
ZigBee is emerging in recent years, a network capacity, node, small size, simple structure, low rate, low power wireless communications technology. Based on the ZigBee protocol stack, appropriately streamlined and improved, with integrated VF-06-322 CC2430 node serial camera module, based on non-embedded operating system support for wireless sensor networks to achieve the image data fast and reliable...
Designed and implemented drivers for TSic506 high-precision temperature sensor and TSL2561T light intensity sensor in wireless sensor network using CC2430 as the core chip, put forward the dynamic pre-emptive priority scheduling mechanism for low-level tasks, and based on this, developed environmental data collection system in the wireless sensor network. Experimental results show that the scheme...
As a basis subject of computer, Computer software engineering has been increasingly used in various fields, Games management system has been pre-designed on the basis of application of software engineering theory and method. The actual games management system software has been developed from using software engineering methods, in the actual design and development, it has been proved that a practical...
Avionics system is the critical equipment for autonomous helicopter. In this paper, the detailed design scheme of avionics system for mini autonomous helicopter was proposed. Firstly, the overall structure of the proposed avionics system was introduced, the system is composed of airborne sensors, flight control computer, power system, wireless communications link and remote control link. Then the...
It is obvious that internet has become a key media to share resources and exchange information. As a special category of social activities, the behavior from network users normally shows its complexity and diversity, which makes people pay an increased attention to study and manage it. Based upon the formation mechanism of ant colony, this paper proposes an ant colony algorithm to do cluster analysis...
Traditional data collection methods for geological investigation, profile measurement, and other field survey in the research community of geosciences are generally based on the manual measuring and recording by the investigators. The most popular “instruments” used in the traditional survey are pencils as well as printed hard copy charts. The methods are obviously complicated and inefficient, at...
In view of the electromagnetic information leakage of information security implication, this paper analyses the time-frequency characteristics of radiation signal from LCD display with a resolution of 1280×1024 through simulation. The design and measurement of the shielding box is given. A USA military standard testing is made, which shows that the designed shielding box is less than the overall emission...
For it has so many advantages multimedia supplementary teaching has been widely used nowadays. This paper introduces how to conform the multimedia and the environmental teaching on the basis of the practice of the environmental teaching. It also reveals several problems needing attention about the multimedia teaching process. In addition, it put forward that we should combine the multimedia teaching...
This paper summarizes progress to date on the professional skill-Oriented (PSO) model for computer applied mathematics education, a curriculum reform initiative at Beijing Union University (BUU). The PSO model seeks to increase student retention, motivation and success in computer science through application-driven, just-in-time computer professional skill instruction. This paper provides an overview...
QQ, a kind of common IM (instant messaging) software, is becoming more and more popular in China. Although it has many advantages (such as convenience and security), there are many flaws as well, e.g. someone may use it to spread rumors, even do some illegal things. The aim of this paper is to record the QQ chats of all computers in the LAN, and monitor abnormal or illegal activities via QQ immediately...
Remote user authentication scheme is a mechanism which allows a server to authenticate a remote user over insecure channel. Recently, Goriparthi et al. made an enhancement based on Das et al.'s remote user authentication scheme using bilinear pairings. The scheme has the merits of no verification table, freely changing password and preventing the forgery attack and the replay attack. This paper, however,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.