The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an approach to find solution to the Bounded Knapsack Problem (BKP). BKP is a generalization of 0/1 knapsack problem in which multiple instances of distinct items but a single knapsack is considered. This problem occurs in many ways in real-life, such as cryptography, finance, etc. A genetic algorithm using greedy approach is proposed to solve this problem. The experiments prove...
Faulty components in a wireless sensor network need to be localized and repaired to sustain the normal operation of the network. Due to the inherent stringent bandwidth and energy constraints, we consider only use end-to-end measurement to infer lossy links in sensor network. In this paper, we formulate the problem of lossy links localization as a Bayesian inference problem, and use max-product algorithm...
This paper proposes a framework for consolidating laboratory data by adopting an Enterprise Service Bus as a backbone for interchanging laboratory data between: medical instruments, the Laboratory Information Management System and the Hospital Information System. A laboratory test result is one of the major components in medical diagnosis and procedures. It can be used to plan a patient's treatment...
The purpose of this design was to provide information consultation and diagnosis, decision support and technical services functions on sustainable management of rural collective forests for farmers. The expert system was designed and built by applying expert system's basic principles in the Web environment. The general structure of system, knowledge base management and inference engine were designed,...
This paper proposes a stereoscopic vision algorithm to calculate the disparity map using One-Bit transform (1BT). There are two advantages of the proposed algorithm over the conventional stereoscopic vision algorithms. First, the use of the 1BT reduces the computational complexity of the disparity map calculation. Second, for implementation in private spaces such as homes and communities, the use...
Embedded systems have become more and more important in our lives. However almost the security protections dedicates in the PC system defense, and there is little effort in the research of the embedded systems security. Embedded systems are in danger. What is more, there are varied kinds of embedded systems platforms, which exacerbate the protection in the embedded systems. This paper is going to...
This research paper discussed the usage of watermarking in medical images to ensure the authenticity and integrity of the image and reviewed some watermarking schemes that had been developed. A design of a reversible tamper detection and recovery watermarking scheme was then proposed. The watermarking scheme uses a 640×480×8 bits ultrasound grayscale image as a sample. The concept of ROI (Region Of...
In recent years, the effect of globalization environment, and the aging of engineers and skill workers have tremendously changed the manufacture industry, therefore, transfer of technology and skill has become a very important issue. Parallel with the advancement of the Internet, e-learning systems stress on the learning of knowledge, skill transfer is rarely mentioned. In this paper, we propose a...
Database is a part of the information systems (IS) which contains all of the data that the IS should have. In this paper, a database for a football league has been designed by classifying and representing those data in categories and using the Thai football league for a case study. Each category consists of the data which is significantly important and needs some tools to analyze and store as beneficial...
It's a hard task for anti-ship missile (ASM) to select the target ship from multi-objects acquired by terminal guidance radar. In this paper, a method to select the target in a ship formation is presented based on iterated closet point (ICP) algorithm. The principle of this method is described as follows: (1) a ship formation is independently detected by fire-control radar and terminal guidance radar,...
Mobile ad hoc networks are self organizing multi-hop wireless networks with no fixed infrastructure. All the users in these networks are mobile. The mobiles communicate either directly or via other nodes of the network by establishing routes. The mobility of nodes causes the existing links to be break frequently. So if we can predict future movement, the resources reservation can be made before be...
The aim of our research is to find a suitable RE process to be applied in our organisation for the development of software projects. We identified the actor and their roles through the relation practice while implementing the RE process. In order to redefine the RE process, good analysis skill is needed besides having a good understanding of the RE process itself. We believe that our experience can...
This paper presents some research results which assesses the problem of query expansion in search activities. We propose the use of domain ontologies, linguistic processing and validation based on a general dictionary. The work is focused on Learning Object's search in specialized repositories. It includes a review of query expansion methods that can be used in e-learning and a description of a prototype...
Aiming the deficiency of control performance of existing traffic signal controller, we finish whole design of intelligent traffic signal controller based on MPC8245 processor and Hard Hat Linux kernel. After designing minimum system of MPC8245, we extend Compact PCI bus so as to finish video capture, network communication, and serial communication utilizing all kinds of PCI card. In our systems we...
Mobile learning development is, most of the time, the privilege of practitioners with support from a technical team. The deep learning curve involved understanding the native mobile operating systems and developing mobile applications keeps most of the non-technical teachers and researchers away. We explore what innovation mobile technologies and Web 2.0 can bring that allows teachers to author their...
Security is to grant access to a legal user, and to prevent the system from illegal or non authorized person. The so called process of Authentication has five factors in modern era. Something You have (e.g., a hardware token/credit card), Something You are (e.g., a fingerprint, eye print), Something You know (e.g., a password/PIN code), Somebody You know and Something You Process. In this paper, we...
The air-conditioning equipment and other structures attached to railway rolling stock are plate objects joined by a spot or an intermittent welding. The finite element (FE) modeling of such plate objects is very time-consuming due to the large number of spot and intermittent welds that must be modeled. We developed automatic weld modeling technology, with the aim of reducing the procedures for FE...
Service mapping is an important part of Open and Reconfigurable Networks (ORN), which is proposed to solve the network convergence problem of emerging applications from the aspect of “application mapping to service, and service mapping to component”. This work introduces the ORN simply firstly; and then presents a general service model, which has four elements, such as Role, Protocol, Quality, and...
More and more people setup their own blogs due to the popularization of web 2.0 and maturation of Internet techniques. People love to share their thoughts and moods even new products experiences through their blogs. This phenomenon pushes the business models and web technologies forward in a rapid speed. It is also becoming an important research topic of how to improve the search results by using...
Based on Variable Universe fuzzy control technology with good adaptive and robust capability, a new excitation control strategy for DFIG(doubly fed induction generator) without accurate generator mathematical model is proposed in this paper. Full fuzzy excitation control model is established and analyzed in detail. the whole wind generation system model Was established, simulation results indicate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.