The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
G-layer of RGPS requirement meta-model is used to refine the general business goals acquired on the basis of the Role layer. A business goal is a high-level and general statement when first proposed. Whether it can be achieved or not depends on the correctness of goal decomposition. Towards these problems, a decomposition model is proposed in this paper. Particularly, with the development of semantic...
Approximate classification and similarity decision handling of literature, is always a hot point. On the basis of analyzing the relevant concept and difficulty, this paper puts forward a method and algorithm of approximate classification and similarity decision of literature, the research idea and application of this difficult problem. The preliminary test indicates this method has high put performance.
In order to integrate existing decontamination equipment simulators of different architectures into a collaborative simulation system and improve their scalability and real-time performance, a High Level Architecture (HLA) and Object-oriented Graphics Rendering Engine (OGRE) based simulation training system is established. A data collector and RTI adaptor are introduced to realize communication among...
Focusing on using Oracle to implement the differentiation of spatial topological relations between lines and regions, an algorithm based on Oracle Spatial Topology Data Model and the 9-intersection model is designed to determine the nine elements of the 9-intersection matrix, which can be used to differentiate the 19 kinds of spatial topological relations between a line and a region. Three elements...
The resource requesters and providers often belong to different security domains in the openning network. It can be achieved through automated trust negotiation to build confidence and to ensure the security of shared resources. Speeding up subsequent negotiations between the same negotiators is a problem worth of research. This paper analyzed the automatic trust negotiation and proposed the role-based...
We present the adaptive simulations of Amrita Learning, a web-based, interactive eLearning program that aims to create a realistic mathematics and science laboratory environment for school students to study equipments, perform simulation experiments interactively, measure or analyze results, and understand their application, It teaches abstract concepts, such as flow of electrons and magnetic fields,...
By recognizing the necessity for preventative and proactive management for today's large scale and fault prone distributed systems, a tendency for these mechanisms has been appeared in recent researchers' efforts. From the birth point of this opinion, event prediction has been known as an effective approach to manage errors preventively. In this work, we attempt to make system performance better by...
This paper, the Multisim and Excel software also applied to study the characteristics of diode, and the diode characteristics and resistance characteristics were analyzed. China Journal Net in search time found no similar research methods and research results appear. Application of Multisim to test the characteristics of the resistor and diode emulation and application of Excel to plot the curve of...
In federated identity management systems identity providers authenticate users of its realm via single sign-on and forward authentication assertion as a response to the service provider's requests. Secure single sign-on authentication is always a challenging task in an open environment such as in Internet. The risk associated with an open environment authentication and authorization are user credentials...
A computer control system is proposed which is based on hardware-in-loop (HWIL) simulation test system. As an important sub-system in simulation test system, the reality is the focus of the simulation system. The construction of the computer control system for laser warning based on HLA Distributed Simulation. By combining the outer clock and time stamp for data frame, data interaction is triggered...
In order to solve the problem with being easily trapped in a local optimum of back propagation neural network (BPNN) and the premature convergence based on standard genetic algorithm (SGA), a dynamic and adaptive model which combines the modified genetic algorithm (MGA) with BPNN is proposed in this paper. By introducing modified genetic operators and dynamic mutation probability measure, the MGA-BP...
Grid computing offers geographically dispatched heterogeneous resources in order to perform complex computations. Besides, issues such as sharing, allocation and integration of resources as well as resource discovery are of high importance in grid computing systems. In regards to resource discovery in such systems with such characteristics, various methods have been presented. Among them are methods...
Traditional parallel computing experiment platforms are made by multiple servers, which are expensive and their maintenance are complicated and cost high. Aiming at these problems, a new experiment platform is proposed in this paper based on KVM and Linux. The platform can run in multi-core personal computer (PC), which is cheap and can be implemented simply. The software is open source Linux based,...
We propose a formal model to verify authentication protocols with timeout strategy. After investigating a state-of-the-art model checker named SATMC, the connotative time involved in the rule labels is revealed and utilized, which allows us to re-evaluate the security of authentication protocols with timeout strategy. We illustrate our model by analyzing the security of NSPK protocol. Finally, the...
High flexibility of publish/Subscribe architecture that is a common architectural style for component based systems make it to be capable of developing and supporting large software systems. But difficult aspect of Publish/Subscribe systems is their validation. Existing efforts for developing formal foundation for specifying and reasoning about these systems are hard to use by practitioners who are...
Differential evolution algorithm as a global optimization method in engineering field has broad applicability. In order to facilitate researchers studying differential evolution algorithm, this paper expounds, comparatives and analyses the differential evolution algorithm and its improved measures based on researching materials of differential evolution algorithm at home and abroad. It shows that...
Emergency and disaster operation require the computing devices in the zone to operate smoothly and uninterruptedly i.e. they must have the capacity to tolerate faults in the disaster. The mobile computing during the disaster faces challenges such as network or service unavailability, mobile device hardware failure and user incapacity to compute. This paper proposes a novel method to address this issue...
Modern cognitive psychology says people are a kind of information processor. Cognition is a whole course of inputting information by transforming, analyzing, processing, memorizing, restoring and using sense. Psychological cognition system of computer simulation could compile computer Procedure and realize simulation in same way by having an approximate and exploring understanding of person's psychology...
The aim of this paper is to present the role of Artificial Intelligence techniques to enhance reflective e-portfolios quality. Some AI techniques such as expert system; scheduling; Data Mining can support us to enhance our reflective e-portfolios quality. To get better result the designed portfolio has been supported by Problem Based Learning as an effective educational method. These tools together...
This article first introduces the basic principle and model of ant colony algorithm which is a kind of swarm intelligence algorithm, then analyzes the defect in large-scale optimization problems of basic ant colony algorithm, and concludes with an improved algorithm to improve execution efficiency and solution quality in solving large-scale problems.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.