The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Collaborative learning is a new teaching mode that comes into being under the contemporary teaching circumstances. It is important to improve student's creative ability, cooperative spirit and improvement of utilization of the learning resource. Through the research on the connotation of collaborative learning and SOA methodology, this paper analyses their common characteristics and gives out a model...
Finite State Machine is an effective method commonly used in software designing and developing. It is also of great value in the process of software testing. As interactive activities with users are more primary for up to date software applications, the implementation of program logic correctness is then the main concern for both the end users and vendors. This issue presents novel automatic software...
In the fault diagnosis based on support vector machine (SVM), SVM parameters are mostly selected artificially or obtained through experiment time after time, a certain and effective method has not been found. Aiming at this problem, a method optimizing the SVM parameters with Monkey-King genetic algorithm (MKSVM) is presented. In the built model the optimized parameters are used, and the superiority...
State monitoring and diagnosis system of the large rotary sets usually needs acquiring and processing huge amounts of data from sensor. This paper develops a rapid data acquisition and storage system based on virtual instrument LabVIEW and describes the system principle, composition structure and development progress in detail. The system acquires data from data acquisition card PCI-6255, writes data...
The improved algorithm of WNN based on BP was proposed in this paper. Theoretical analysis and simulation result show it avoids both the blindness of framework designs for BP neural networks and the problem of nonlinear optimizations, such as local optimization. So it can simplify the training of neural networks. It has better abilities in function learning and generalization. This algorithm was successfully...
Given a large and complex network, we would like to find the best partition of this network into a small number of clusters. This question has been addressed in many different ways. Here we utilize the simulated annealing strategy to maximize the modularity of a network with our previous hard partitioning formulation for the community structure, which is based on the optimal prediction of a random...
The Web information which influences the topic relevance of URL is analyzed based on the research of the search strategy about the crawler. On this basis, a new URL search algorithm based on the content and link analysis is supplied to us. The experimental results show that the algorithm not only can solve the problem of topic isolated island to increase recall, but also can avoid the phenomenon of...
According to the foreign classical models of the trust development, the paper firstly explores the dynamic development model of the trust between the entrepreneur and the venture capitalist; secondly, the paper proposes two kinds of the trust using way: the exploiting and the exploratory; finally, the paper empirically examines the positive impact of the trust's development and the using way on entrepreneurial...
Gun's vibration during its shooting makes projectile impact bore much more fiercely, which cause projectile's initial disturbance and affect gun's firing accuracy. Among gun's multiform vibrations, lateral vibration has the maximal influence to firing accuracy. The paper builds simulation model of gun barrel's lateral vibration based on finite element method and ascertain the equations of gun barrel's...
Robotics is a compelling topic for students of all ages, and it is an excellent tool for teaching science and engineering. The paper has considered what makes robotics motivating to students, and it has shown how context, need, and the desire to 'make it work' draw them to that learning so naturally that they hardly notice the intellectual strides they are making. The potential of robotics to educate...
Grid is the next generation information infrastructure of Internet and software running support platform. At present, there are many resource discovery mechanisms in Grid, which can find probably useful resources, including software component. Furthermore, this paper solves the problem of searching trusty component by providing a trust evaluation and component selection mechanism. The simulation experiment...
Rice leaf diseases have occurred all over the world, including china. They have had a significant impact on rice quality and yield. Now, the control method rely mainly on artificial means.In this study, BP neural network classifiers were designed for classifying the healthy and diseased parts of rice leaves. This paper select rice brown spot as study object, the training and testing samples of the...
GUI test case definition is the core issue in automatic or semi-automatic GUI testing. We use TTCN-3 language to define GUI test cases. The test specifications under this definition are easy to maintain, evaluate and assess. The time related test specifications are covered; few of current works cover this kind of testing. It's easy and flexible to create test oracles by this approach thanks to TTCN-3...
Facial aging synthesis is one of the main topics in computer graphics. This paper proposes a synthetic approach to 3D aging faces by using color Gabor wavelet and texture transplant techniques. Based on 3D aging templates, the color Gabor wavelet transform is carried out first to extract the high-frequency sub-images from the texture maps, in which is contained the texture feature of aging skin. Then...
Cloud theory has been proved to be an excellent mathematical tool for dealing with uncertain and vague description of objects, and it can realize the transforms between qualitative concepts and quantitative expression. Combining rough sets to cloud theory, a comprehensive assessment method is offered, which absorbs the merit of the both. Finally an assessment example is given.
The context in intelligent domotic home (IDH) is very complicated. In this paper, in order to achieve the context-aware ability based on the DOG (domotic OSGi gateway) which is desiged for IDH, not only the information about the domotic devices and the building components, but also the characteristics and behaviors of users are concerned as the context. According to the context, a new context ontology...
Energy consumption forecast is an essential component in making energy plan. In the light of the complexity and nonlinearity of energy consumption system, the gray forecast model and neural network model are respectively established by using the energy consumption historical data of certain province. Then their advantages and disadvantages are analyzed. Lastly, the method of optimal combination is...
Most of existing inlining algorithms are used in optimizing compilers and are not suitable for program analysis. Therefore, an inlining algorithm based on program dependence graph is proposed. It uses simple function call tree to determine the sequence of inlining and adopts program dependence graph as the intermediate representation for a program. Inline expansion is performed on program dependence...
CLEFIA is a 128-bit block cipher designed newly by Sony Corporation. In this paper, a differential power analysis attack method on every byte of CLEFIA round keys is presented. Through this attack, the round keys can be obtained, and then the 128-bit encryption key can be calculated out. The results of simulation experiments indicate that this attack is effective and practical on the CLEFIA cipher.
It is very important for generating an orthonormal multiwavelet system to construct a conjugate quadrature filter (CQF). In this paper, a general method of deriving a length-J + 1 conjugate quadrature filter with multiplicity r and scale a from a length-J conjugate quadrature filter is obtained. As a special case, we study generally the construction of a length-J + 1 conjugate quadrature filter which...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.