The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Human resources of colleges and universities were the most important resource in higher education resources and important assurance of higher education development, and teachers of colleges and universities were the main force of college and university human resources. In this paper, computer data analysis on need hierarchical structure of part Heilongjiang colleges and universities and difference...
To break through the traditional one-sided qualitative evaluation of English textbook, the authors put forward a new model of evaluation system which includes three parts: teacherpsilas evaluation, studentpsilas evaluation, and the objective evaluation based on the corpus linguistics. By the analysis of evaluation theory of English textbook, 70 evaluation criteria are set out of 127 items using Delphi...
A majority of engineering courses in the university have these characteristics such as much period, extensive content, very strong practice etc. The paper takes auto detecting and maintenance specialty as an example to analyze problems of engineering courses in the university in the practice teaching, and put forward many methods, means and new teaching mode to resolve these problems to improve further...
Firstly, the typical architecture of embedded systems with multiple CPUs is introduced. Then, a method of the message-based inter-process communication (IPC) in the distributed operating system for such multi-CPU embedded systems is presented. At last, it compares this IPC method with other IPC methods in normal distributed operating systems.
Optimization functions are crucial to compiler design. Generally, compiler optimization divides into machine-independent optimization based on the intermediate language and machine-dependent optimization based on the object code. In order to make use of the characteristics of the target machine, this paper presents an optimization scheme about peephole optimization based on extensible template, and...
This paper proposes a new authorization mechanism for keeping the consistency of security attributes of a file and its duplicates in coping or quoting. Like life with same lineage has same characteristics in propagating, security attributes of files with same lineage will be hold consistency in the same way. Learning from the lineage principle in the nature and the function of DNA in living creatures,...
Exploratory data analysis is a data analysis methods to analysis data and find the inherent law based on the actual distribution of data. This article explored the use of data analysis, aiming at a communication operator for a pseudo-family customer to identify customers to focus on customers and achieve targeted marketing.
This paper proposed a video metadata information based method for video retrieval. Extracting key frames and forming video abstract first, and then segmenting the key frames into two parts-background and theme, calculating their gray-scale distribution and probability density, and then making up video metadata, and finally retrieving information through structuring video metadata. Experiment shows...
Text segmentation is important for many natural language processing tasks, such as passage retrieval and summarization. This paper uses suffix tree model for the text representation and introduces a new measure, subsequence-based coherence, to represent the coherence between sentences and utilize the word order information. This paper also introduces a text segmentation algorithm, subsequence-based...
Protein secondary structure prediction is a bridge between amino acid sequence and tertiary prediction. Various methods have been used to improve the prediction accuracy and have been developed greatly. Protein classification is a multi-class classification problem. For traditional method, the three structure are predicted in the same time. But it can be degraded to a set of binary classification...
Transmission of compressed video over error prone channels may result in packet losses or errors, which can significantly degrade the image quality. Error concealment is an effective approach to reduce the influence. In this paper, a new temporal error concealment algorithm for the H.264 is presented, which efficiently utilize the motion vectors of top/bottom macro blocks adjacent to the lost macro...
Attention will be focused on education investment on the background of financial crisis. There are theoretical divergences in the studies on the relationship between Chinapsilas education investment and economic growth all along. This paper is based on the time series data from 1978-2007 and Granger causality test is applied to analysis the relationship. The results show that there is a unidirectional...
The execution of course program and timetables in distance learning systems is more strict in military school, it imposes necessity for teachers to guarantee the progress of students according with a set of course program by monitoring the studentspsila behaviors and giving the alert when the predefined schedules are violated in such an e-learning situation. An active monitor system is designed to...
Higher education computer fundamental course reform faced the 21st century has already been started in an all-round way. Innovation of teaching material's design philosophy is one of important contents that can't be ignored.The design and writing philosophy of university computer fundamental teaching material is summarized and reviewed leaded by the theory of self-directory learning, and an example...
On the basis of studying the status of data structure in the courses for computer science and technology specialty and its knowledge structure,teaching method based on knowledge structure is proposed to raise studentspsila motivation, to organize teaching contents reasonably, to select topic scientifically,and so forth. Some statistic data of teaching practice are shown to prove this.
Classification basing on Privacy-preserving is one of the hottest spots in the field of data mining in recent years. This paper studies how to identify suspicious financial transactions under the privacy-preserving of classification algorithm. The research is studied on multi-data that from several parts by using Scalar Product Protocol under the privacy-preserving. The experimental results show that...
This paper demonstrates the linkage between logistics system simulation and teaching mode, and explores new teaching methods and teaching ideas. It puts emphasis on analyzing the application of logistics simulation technology in the logistics system and exploring appropriate teaching modes of logistics system simulation. We make a point of the application of logistics system theory knowledge and the...
Along with the development of the information technology, the multimedia technology, as an advanced teaching of instrument, was widely applied into the teaching. In this paper, according to characteristic of environmental science, the advantage and mistake of multimedia technology in teaching were discussed in details. At last, in order to improve the teaching quality of environmental science, how...
The classical Knaster-Kuratowski-Mazurkiewicz (in short, KKM) theorem is a basic result for combinatorial mathematics; it is equivalent to many basic theorems such as Brouwer's fixed point theorem, Sperner's lemma, and Fan's minimax inequality. In 1961, Ky Fan generalized the classical KKM theorem from finite dimensional spaces to infinite dimensional spaces, and since then, this theorem has become...
Based on the comparison of the current coding method, PSB-a new coding method was proposed, which can rapidly and accurately judge the parent-child ancestor/descendant and sibling relationships between any two nodes of the XML document tree. Based on prime and sequence number, this coding method was adopted to support the XML update, which can effectively reduce the secondary XML coding rate. Experiments...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.