The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to address the unreadable problem of direct unique identification on metal reflective surface during product real-time tracking, in this paper, two different reflective region images are captured for the same identification, the wavelet-based homomorphic filtering is applied to enhance the contrast of reflective region, the zoning Otsu thresholding is used to get the binary image, the characteristic...
To import nearly 1,000 attribute tables of 10 subjects of national oil/gas resourse database of Excel format into the target tables of Oracle database,we developed the intelligent import system which distinguished the simple import system.The system uses Visual Studio 2008 as the development tool, object-oriented language C# as the programming language,Oracle 11g as the background database, WinForm...
Personalized recommendation is an effective method to resolve the current problem of Internet information overload. In the recommendation systems, user modeling is a crucial step. Whether the model can accurately describe the users' interests directly determines the quality of the personalized recommendations. At present in most personalized service systems keywords models or user-item models are...
The existing access control environment relies on the server to solve security problems. The current environment has spawned the need for light-weight access control by clients, which have a resource limited environment. In this paper, an adaptable light-weight access control scheme is proposed for an evolutionary computing environment. Existing studies using role-based prime number labeling are limited...
SOI FinFET transistors have emerged as novel devices having superior controls over short channel effects (SCE) than the conventional MOS transistor devices. However despite these advantages, these also exhibit certain other undesirable characteristics such as corner effects, quantum effects, tunneling etc. Usually, the corner effect deteriorates the performance by increasing the leakage current. In...
Key transport protocols are useful to convey the secrete key or session key from one party to another party. These protocols play an important role in key distribution systems if they do not require any priori key sharing. Shamir's No-key protocol is the best example of it; but it does not provide an authentication. In this paper we propose an authenticated key transport protocol based on Shamir's...
Unified Modelling Language is a set of graphical description techniques for specifying, visualising, implementing and documenting object-oriented systems. The behaviour of military strategy and planning in a typical military organization is dynamic. A military organization has large number of entities(both distinct as well as similar) and the prevalent relationships between them. There are also complex...
According to the great significance of 3D game technology, this paper will do detailed research on main technologies of 3D. Firstly, this paper puts forward to design concept, designs the main frame of 3D game. Secondly, through researching collision detection technologies, the improved collision detection method is proposed based on Aligned Axis Bounding Box according to some disadvantages of collision...
For the increasing demand on campus network, IPv6 (Internet protocol version 6) is going to replace the IPv4 protocol. IPv6 is playing an important role in many fields. Wireless sensor networks (WSNs) are undergoing rapid progress and attracted the attention of both the academic and the industrial research community in the last few years. This paper reports on the development of these protocols at...
Proactive traffic control systems based on short term traffic condition forecasting hold great promise in combating degenerating network congestion in urban areas. However, a gap persists between the theory and practice of traffic condition forecasting hindering the development of such systems and delaying the benefits they will provide. Therefore, a framework is proposed in this paper, for facilitating...
In image denoising on wavelet threshold, the threshold is the key factor to decide the quality of denoised image. Now the Bayesian shrink threshold is a more selective threshold among the all thresholds which have expressions. But the Bayesian shrink threshold does not connect with the value of the wavelet coefficients. To this problem, an improved algorithm is proposed. In the algorithm, the larger...
We took both of the translation invariant wavelet transform and the bivariate mode under the frame of bayes MAP estimate into account and proposed a new algorithm on image de-noising. Not like the traditional threshold shrink algorithms, our threshold based not on the coefficients independently, but on the intra-scale and inter-scale correlations of TIWT coefficients. We used the relationship to create...
This paper presents the text clustering algorithm of the cluster intelligent optimization that uses cluster intelligent optimization algorithms to find the initial focal point to resolve the input sequences of fuzzy clustering and the initial point of sensitive issues; and use the improved fuzzy clustering algorithm to eliminate the sample text is not balance and refine clustering results. The experimental...
Virtualization is a technology that lets you run multiple virtual machines on a single physical machine, by sharing the resources of that single computer across the virtual machines. While CPU, I/O devices and other resources are easily shared among the virtual machines, sharing of physical memory is much more difficult. Memory Management mechanisms such as Ballooning and Hotplug Memory are widely...
Currently, a large number of clustering algorithms are available for data mining. But it will be difficult for people who to a large extent know little about data mining to select an appropriate clustering algorithm. In order to solve this problem, in this paper, we first comprehensively analyze a number of clustering algorithms, then summarize their evaluation criteria and apply the so-called fuzzy...
Chinese Web Automatic Document Classification is one of the core technologies in Chinese information retrieval. Web Spider technology is the key in Chinese WEB document automatic classification. this issue surrounds WEB information explore which is this cutting-edge research, combined with the overall requirements of the Chinese WEB Document Classification System Framework, achieving roaming of the...
On the basis of the analysis of the security demands of the database, this paper proposes a novel method that simultaneously assures the confidentiality and the integrity of data items. The basic concept of this method is adding a verification table to existing database tables to the existing database tables, and the verification items for each original data item are stored in the verification table...
In this paper, based on a web page to determine similarity is proposed which is based on semantic web similarity judgments. First on the web page of text extraction, is text segmentation, also taking stop words to go out, Similarity judgments for the Web page provides a basis. Then based on Vector Space Model using TF-IDF method similar to the Chinese website text judgment, In the process of judging,...
QoS-aware service composition is to compose a composite service by selecting atomic services from service providers to maximize QoS while satisfying all the QoS constraints imposed by user requests. Many proposed schemes for service composition are atomic task oriented (ATO). Due to the possible large number of tasks contained in a composite service and the wide range of candidate services capable...
The grid index is an important class of indexing technique in the spatial database. Grid index is widely used in the K - nearest neighbor algorithm, the algorithm proposed in this paper is based on the grid index, find the data objects intersecting with the given circle area or contained in the given circle area and cluster the grids which these data objects are in, the remaining grids will be used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.