The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, due to the low information transfer rate and low recognition accuracy in Brain-Computer Interface (BCI), a four-class motor imagery Brain-Robot Interface based on Repeated Binary Common Spatial Pattern (RB-CSP) and Support Vector Machine (SVM) is proposed. The control strategy is offline training first, online control next-after users finish learning to control their thinking, the system...
With their wide application in the Web 2.0 era, blogs have drawn increasing attention of educators and teachers in educational circle. More and more teachers use them as a pedagogic tool in instruction. This paper describes how a class blog can be integrated into the study of Comprehensive English Course for English majors in China in an attempt to provide an out-of-class space for language practice...
The fast development of ICTs provides great opportunities and challenges as well to pre-service English teacher education in China. With ICTs students can access abundant information in English stored online, communicate and interact with one another quickly, conveniently and synchronously or asynchronously in English both orally and in written form. ICTs have been changing how English is learned...
Basing on the requirements for high capacity and reliability of WMN data transmission, as well as the advantages of global optimization and highly self-organization of ant colony algorithm, we propose a cross-layer routing protocol based on ant colony algorithm, which is load-sensing and efficient. The protocol regards the nodes queue and frame transmission utility as a parameter measuring link quality,...
The development of computer network has accelerated the social information, meanwhile lots of network security issues appeared. Therefore, it seems that much more effort should be made to enhance security and precaution on computer network when conducting network application. This essay mainly introduces features of computer network security and primary threats faced by computer network. Finally,...
Aiming at a series of problem such as low efficiency, a greate deal of maintenance and so on of radio and TV transmission for the current total station. The remote control system of transmitter based on the embed web is designed. The control order of transmitter is sended by the client, and the running state of transmitter is feedbacked by the internet. According to the system functional requirement,...
This paper proposes a solution of filtering garbage information, in order to solve the problem of dynamic delivery of documents. The solution balances the technique of Black and White List Spam Filtering, as well as the advantages and disadvantages of and Bayesian Algorithm. It creates the Bayesian Model based on the analysis of probability distributions of Junk key words, as well as design and implement...
Ordinary network cluster server systems have no ability to defense against any network intrusions and attacks, which reduce the availability of those systems or even result in the whole system completely breaking down. Based on our patented technologies, a high efficient intrusion protection model is proposed, which adopts the zero-copy technology to improve the speed of processing network packets;...
A small size group signature scheme based on RSA cryptosystem is described in this paper. Due to the special algebraic structure of RSA, one public key and two corresponding private keys are available. The two private keys are used as signature keys for group members. The signature operation includes an ordinary RSA signature and a zero knowledge proof about signature key. Compared with most group...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.