The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Finding the isomorphic graph is the problem that have algorithms with the complexity time. For this in general, because of classification for algorithms time complexity, this solution stay in NP-complete group. In this essay tried to show the new style for DNA algorithms, until decrease the solution of the problem in vast. This style heel show to exploit of graphs Adjacency matrix representation,...
This paper discussed the necessity, the possibility and the method of introducing GIS technology into LCA database study, analyzed the database structure and data elements of LCA database that included the data of the three pillars -ecology, economics, and social equity, a more comprehensive LCA database is innovated in this study.
Computer technology plays a significant role in the information management of forest resource and its environment. This paper presented the study on the above-ground biomass of larch forest in the mountainous region of Xigouli Village, Sihai Town, Yanqing County, Beijing, China, adopting computer technology and making use of survey data to perform the fitting of biomass model, based on which the biomass...
Relative growth is defined as the description of the growth relationship between biological and biological part (organ). The relative growth function is a function on variable of growth and non-time variables. In the paper, a system relative growth model which taken Betula costata as an example was constructed based on the projection pursuit regression (PPR) artificial neural network. The system model...
In order to acquire continuous network connectivity for client without considering the physical location of the user, a new structure designing distribution algorithm on the mobile computing network was established. The design distribution algorithm could account for the host mobility and physical constraints. Firstly, the development of mobile network was introduced. Then the system model was established...
The fuzzy neural network technology is one of the hot topics of Data Mining. According to the Max Similarity Rule, this paper sets forth the cross entropy theory with formulae deduction in detail and a new activation function. Compare with the BP algorithm (error back propagation), which based on the error square sum rule and Sigmoid or Hyperbolical function, the classify algorithm based on the cross...
Semantic gap that between the visual features and human semantics has become a bottleneck of content-based image retrieval. The need for improving the retrieval accuracy of image retrieval systems and narrowing down the semantic gap is high in view of the fast growing need of image retrieval. In this paper, we first introduce the image semantic description methods, then we discuss the main technologies...
Visibility graph method is a main method for finding a geodesic path within a polygonal domain. Rotation tree method is a simple and efficient approach to construct visible edges. However, this approach is unable to distinguish whether a visible edge is inside a polygonal domain or not. This paper presents an inside / outside determination algorithm within O(1) time. Based on this algorithm and rotation...
Key Establishment protocol based on passwords or pre-shared security keys was difficulty to share the password or security keys in Coordinated-Control Framework Based on Agent. Through analyzing the working mechanism of CCFBA, one novel session Key Establishment Protocol with sharing no secret was proposed, based on the elliptic curve Diffie-Hellman algorithm. This protocol can provide identity authentication,...
This article first introduces the basic principle and model of ant colony algorithm which is a kind of swarm intelligence algorithm, then analyzes the defect in large-scale optimization problems of basic ant colony algorithm, and concludes with an improved algorithm to improve execution efficiency and solution quality in solving large-scale problems.
Building trust relationships between peers is an important and difficult part in the security needs of P2P networks. Various reputation systems have been presented to solve it. Theory Basics, applications, advantages and disadvantages of those methods has been discussed in this paper, finally we describe research that exemplifies compromises to deliver a useable, implementable reputation system.
Mass for the current space-time multi-source heterogeneous data in the organization, management, integration difficulties, for traditional methods in the data conversion process and other issues caused data loss, Combining the characteristics of ocean space-time data, This paper presents a new seamless integration of massive multi-source heterogeneous space-time data technology (SIMMHS).The technology...
An efficient BRDF(Bidirectional Reflectance Distribution Function) measurement of glossy surface by photometric stereo was proposed. We assume that the surface reflectance can be approximated by the sum of a Lambertian and a specular component. We define the best window in one image and classify the patches into the diffuse points and the mix ones according to their radiance values. The diffuse parameter...
Along with the emergence and development of new applications of network which is represented by P2P network, existing network traffic identification methods do not respond to the environment of network traffic which cannot be identified efficiently and accurately. In order to meet the needs of network traffic, the method of network traffic identification based on support vector machine (SVM) is proposed...
In this paper, we present a novel method for human-computer interaction based on finger motion detection. Image processing is used to get the position, motion direction and movement of the marked figure in the video image, and then associate them with the cursor position, motion direction and mouse function using windows underlying functions. Experimental results show that the method can accurately...
Secure Multi-party Computation (SMC) plays an important role in information security under the circumstance of cooperation calculation, so SMC on privacy-preservation is of great interest. In this paper we discuss an issue which is a special SMC problem. Based on Scalar Product Protocol, Monte Carlo Method and Oblivious Transfer, we give two solutions to the problem about how to decide the areas....
Several new features of Windows 7 may provide new challenges for memory investigation, and also offer opportunities for acquiring more forensically sensitive information which can be recovered and extracted from the memory image file. This paper analyzed the new features in Windows 7 and developed the memory analysis method according to these new features. The method is based on the data structure...
Based on the speech and lip of the signal acquisition, this paper designed a lip line extraction program with 12 key points in outside lip line, and nine key points in inside lip line. A speech and lip database has been built, with which the parameter extraction and statistical analysis can be realized, as well as the correlation models about pronunciation of mandarin and lip shaped. So a synthesis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.