The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
On the basis of analyzing the disadvantages and requirements of material supply of hydroelectric project, develops a material dispatching management information and decision support system based on both C/S model and B/S model. The three-hierarchy model and algorithm of material dispatching and the structure and function of the system are discussed in detail. The system is put into service and it...
Network Management Systems have played a great important role in information systems. Management is very important and essential in any fields. There are many managements such as configuration management, fault management, performance management, security management, accounting management and etc. Among them, performance management is more important than others. Because it is very essential and useful...
As the machine vision finds application in the present industry widely, this paper proposes the dynamic tracing automatic screening (DTAS) algorithm. Aiming to detect the electronic button's surface, this DTAS algorithm can judge whether this key is damaged or not. Detection uses the image adaptive angle rotation algorithm, the threshold value law, variance law, and the region boundary law in the...
Based on the importance of earthquake alarm system for high-speed railway, this paper introduces a traditional seismic alarm algorithm based on the earthquake alarm system for the algorithm and describes its principle and the method to realize it.
Islam and science are the two most powerful forces in the lives of more than one billion Muslims now living on planet earth. Islam is the foundation of their spiritual life; it is the spring which nourishes the spirit, a moral code that guides actions and a repository of rites and rituals that regulate individual and social life. The `Five Pillars' of Islam are the foundation of Muslim life: Faith...
Improvements in context modelling and reasoning techniques have facilitated the development of context-aware applications, where these applications need to accommodate and respond autonomously to changing context information. Context is often used to refer to any piece of information regarding the surrounding environment, where human activities and computing tasks take place. In this paper, we propose...
The process of retrieving desired images from a large collection of images on the web pages on the basis of features is referred as Content Based Image Retrieval (CBIR) Search Engine. In this paper, a new CBIR search engine is proposed using combined of two features and weighted similarity. Some experimental simulations have been presented to show the efficiency of the proposed search engine.
It usually takes a long time or huge amount of test cases to do software reliability demonstration testing (SRDT) on a very high reliability software by conventional methods, which leads to the fact that the conventional SRDT methods cannot be put into use for accurately predicting failure rate of a very high reliability software. By means of importance sampling, for high reliability software systems,...
This paper describes how learning styles relate to visual attention in eLearning environments. In this study, eye gaze of participants was recorded as they interacted with an eLearning module and their comprehension was examined as well as their individual learning style. Findings suggest that learners differ in their visual attention distribution according to their learning style. Verbal learners...
The advances in VLSI technology have made many changes not only in the architecture of computer and digital systems, but also in the amount of hardware that can be implemented in a single chip which makes it possible to include the entire system in single chip. But as the scale of integration has increased so also has the occurrence of intermittent faults. The detection of intermittent faults requires...
This paper presents FORN, the first automatic realization of mapping a first order rule based logic program onto a neural network. The work is based on Funahashi's theorem and is of special interest to all applications where science advance necessitates the integration of new knowledge to existing systems. The proposal has been designed, implemented and successfully tested. Results are promising and...
It is of great importance to the organisational strategy of the energy utility as well as to the society at large the activities involving the utility and the energy consumer's communication activities. However, we discovered that such communication activities in the poor third world countries with poor infrastructures are wholly undeveloped. This article will propose a framework to define the strategy...
Nowadays, the development of technology is affecting the educational sector. Courseware is one of the approaches that can be used in teaching and learning process so that it becomes more effective and interesting. This paper demonstrates the process of development of multimedia courseware that can be used for teaching and learning of KAFA subjects. Development of the courseware is to deal with some...
The enormous development in digital technologies has necessitated the owners to pay great attention in protecting their digital contents. Watermarking is used for content authentication and ownership protection. Biometric traits provide unique means for individual identification. Biometric watermarking refers to the incorporation of biometric in watermarking technology. By embedding biometrics in...
It is an important and stimulating issue to discover the inconsistency and incompleteness of the large software system through the UML diagrams. However, the use of temporal logic and model checking techniques to address the problem of UML consistency for developing software systems has received much attention. It is still not applicable and hard mission to specify the different consistency issues...
This paper refines and introduces a modification to the Marriage in Honey Bee Optimisation algorithm (MBO). The modified algorithm was applied to predict the structure of Met-enkphaline using torsion angles representation and ECEPP/3 energy function. The results showed the significance of the modification. The algorithm was able to find the lowest reported free energy conformation of value -12.43...
This project study is divided into 2 steps. The first is to design and create a video with multimedia technology: The content is the story of “Teng”, a famous puppet shadow character, who travels to meet his granddaughter in Bangkok. The story is a part of writing class in Thai skill for the seven grade students. Second, The multimedia is tried out with a simple group, 36 students of Bankurod School...
This study was aimed to analyze the quality and to study the satisfaction of users towards the personal information system. The sampling group in this study consisted of administrators, human resource staff and personnel in the Faculty of Industrial Education and Technology, totaling 64 persons, chosen out of the population through the sample size method by Krejcie & Morgan. The statistics used...
This study aims to develop the supply management information system of Department of Computer and Technology. The system associates with all parcel-related items in order to reduce the processing steps and increase the effectiveness of parcel management. To accomplish this study, the logical procedure has been utilized. We firstly survey and collect data, identify objectives and scopes of this study...
In the GNSS navigation system, the acquisition speed of the pseudorandom code will impact the overall performance of the receiving system seriously. A rapid acquisition method of pseudo-random noise (PN) code is proposed, which is based on the segmented match filters (SMFs) with FFT algorithm. In this paper, the received signal sequence is averaged after wiping off the carrier, simultaneously several...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.