The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article introduced the concept of ontology to knowledge representation of image recognition of stored-grain pests; it focused on the use of ontology to organize and implement the ontology model, and constructed image recognition of stored-grain pests' knowledge base what could be shared by the expert system. Finally, it basically achieved system framework of the knowledge base.
In two player games players are in conflict to each other and coalitions are not allowed but in three-player games two players can join their efforts against the third player. As a result, cooperation is a key-factor that deeply affects the complexity of three-player games. In the game of Shove, cooperation can be much more difficult than competition and, as a consequence, three-player Shove played...
As a new computing paradigm, Cloud computing has been advocated by IT industry and academia. It can provide lots of services, however, how to manage these services and guarantee the quality of service, has become one of the key factors for the development of Cloud computing. This paper proposes a hierarchical architecture model of Cloud services resources management and monitoring by integrating the...
The teaching appraisal must be done every semester in most of the universities. There are large amounts of data accumulated. In order to find out the relevance between individual background of a teacher and his teaching performance, this thesis introduces an algorithm based on multidimensional Association Rules Mining, which has explored teaching defects when there are the individual differences and...
Conductive asphalt concrete has the characteristic of giving off heat after energized, so that the ice and snow could be melted in a short time. Subsidized by National Science & Technology Pillar Program of China (2008BAG10B01), in this paper, carbon fiber and graphite is selected to be conductive material, target proportioning of AC-20 gradation is designed, the optimum asphalt aggregate ratio...
In this paper, a plagiarism detection model based on XML is introduced to detect similarities among programs. Based upon the syntax of a specific programming language, the key structure which can represent the procedural structure is picked out from C program. Then using XML text represent C program. According to different key structure, we design the different similarity comparison algorithm to calculate...
Computer technology plays a significant role in the information management of forest resource and its environment. This paper presented the study on the above-ground biomass of larch forest in the mountainous region of Xigouli Village, Sihai Town, Yanqing County, Beijing, China, adopting computer technology and making use of survey data to perform the fitting of biomass model, based on which the biomass...
Although MVC pattern is widely used in software design and development, bringing us many advantages, it still has weak points. Author puts forward an improved MVC and applies it to stowage plan component design in container terminal management system.
The resource requesters and providers often belong to different security domains in the openning network. It can be achieved through automated trust negotiation to build confidence and to ensure the security of shared resources. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper analyzed the automatic trust negotiation and proposed the role-based...
We present the adaptive simulations of Amrita Learning, a web-based, interactive eLearning program that aims to create a realistic mathematics and science laboratory environment for school students to study equipments, perform simulation experiments interactively, measure or analyze results, and understand their application, It teaches abstract concepts, such as flow of electrons and magnetic fields,...
Heat equation is the model of many real-world simulation problems. This paper presents a method for solving large-scale three-dimensional heat equation on CUDA. The implicit differential method is used to discretize the equation and the preconditioned Conjugate Gradient algorithm is applied to solve the discretized equation. The implementing methods for the sparse matrix-vector multiplication and...
Many researches have focused on aspect-oriented web service composition domain. However, formal specification and analysis for the composition is not well exploited, especially for analyzing conflicts of aspects at shared join points. In this paper, we propose a Petri net-based algebra for modeling aspect composition at shared join point, which is based on the aspect-oriented web service composition...
We present an algorithm for classifying the boundary. The algorithm is based on homology algebra. The basic idea is in fact to use the homology group as a tool to classify the boundary. Through th algorithm, classify the baits of crystal, then get the one bait which is much closer to the real crystal. The corresponding experiment was based on crystal boundary classification and compared with other...
Based on the idea of combining the embedded system with image processing, this paper designs an embedded image acquisition system, and separately designs and implements its hardware, software, WEB management module and the system function modules. The image acquisition system can carry out remote management by the user host through the WEB, capture target image and process in accordance with the relevant...
Distributed intrusion detection system as the supplement of firewall can provide more effective protection means. This article describes the development trend of Distributed Intrusion Detection System, Shortcomings of Distributed Intrusion Detection System, and describes in detail the advantages, the Structure and the Principle of work of Distributed Intrusion Detection System based on multi-agent...
Traditional static RBAC have not could satisfy the open dynamic information environment. Dynamic RBAC is researched more and more. In this paper, the dynamic of RBAC will be considered from a new perspective. A novel FRBAC (flexible role-based access control) model is discussed and analyzed. By bringing forward the concepts of role skeleton and role instance, a role can grow along with environment...
Electro-geometric (EGM) model is now the most popular method for the shielding failure flash-over rate (SFFOR) calculation. In this paper, the Lightning protection theory of the negative angle protective pin is studied on basis of this method, and Installing the negative angle protective pin on the hillside or the peak of the 35 kV transmission line in order to reduce the ground shielding failure...
This paper proposed a modified strategy of group query based on materialized view (GQMV) from the aspect of improving searching capability. This strategy accelerate the searching process in the way of creating materialized view for every classified the actual figures by making full use of the star schema and the materialized view technology, and combining the concerns of group bond and the technology...
The aim of this paper is to present the role of Artificial Intelligence techniques to enhance reflective e-portfolios quality. Some AI techniques such as expert system; scheduling; Data Mining can support us to enhance our reflective e-portfolios quality. To get better result the designed portfolio has been supported by Problem Based Learning as an effective educational method. These tools together...
Based on the analysis of the channels about e-product market in the university city, this paper proposed some ideas about the construction of channels on the electronics market of university city, and give more analyze and describe to the model for building the channel. Finally, this paper reached the conclusion that the channel model can be better used to improve the absence of the channels about...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.