The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Operational plan generated by case-based-reasoning (OP-CBR) is based on reusing past successful plans for solving new problems. OP-CBR is particularly useful in environments where the large amount of time required to traverse extensive search spaces makes traditional planning techniques unsuitable. In particular, in real-time domains, past plans need to be retrieved and adapted in real time and efficient...
The question database similarity detection is a test that can quickly in the huge, find the similarity is very high, which questions repeated also need screening. General use Excel API JAVA program with the distance editing algorithm, to achieve a direct access to the excel question bank. In designing a question bank repeated questions detection algorithm, we have found that based on the Levenshtein...
Building real lofting system by matting technology and video fusion technology, using a portable computer 3D modeling and digital camera field uptake of the background video real-time fusion, can real-time display building modeling and scene scenery fusion effect, which is more convenient for evaluation and revised styling design.
This paper reveals the design of link in the course of teaching. The "circuit analysis foundation" course is treated as a continuous 5 door of the castle. From simple to difficult, Content analysis is carried out. The experimental examples show that the learner's ability to change, So as to explain the importance of basic experiment.
With the development of Internet technology and the explosive increase of network information, how to extract specific and useful information in an automatic or semi-automatic way become a problem. There is a large number of different forms of bilingual corpus and different quality on the Internet. How to extract a large number of high quality corpus from the Internet has become a more and more important...
Cluster head selection has always been the key to enhance the whole network performance. However, it is hard to decide which node should be selected. In addition, in some cases there would be multiple choices for a cluster head selection. As a solution to the problem above mentioned, a Cluster head selection Optimization with electrical Voting (COV) is proposed in this paper. COV would provide the...
In this paper, based on actuality of internal full automatic ammunition storage technology and requirement, multiple schemes of full automatic ammunition storage is brought forward. Combining the requirement of some naval vessel about ammunition storage, The best ammunition storage scheme is got using analytic hierarchy process. The scheme on automatic magazine of some naval gun is formed through...
Resource allocation in cooperative networks is an efficient way to improve maximum attainable rate, to decrease power usage, and to prolong networks lifetime. In this paper, we study the lifetime maximization problem for multi-source multi-relay multi-destination cooperative orthogonal frequency division multiplexing(OFDM) networks with decode-and-forward protocol. It is a mixed-integer programming...
Web data mining technology can effectively improve the network information security, and gradually it has become a core technology to strengthen network information security. Based on the author's work and learning experience, this paper firstly analyzed the value of Web data mining technology in network information security, and then discussed a network information security model based on Web data...
This paper presents the basic principle and application of ARIMA model, and this model is used to analyze crude oil price time series and obtain the second order linear regression model. The model is used to predict the price of crude oil. On this basis, according to the residual error after fitting the existing nonlinear ARIMA model, the fitting residual error is analyzed by using the artificial...
Recent years, the stylized draw technology is attracted eyes in Non-Photorealistic Rendering. In this paper, a generation method of an image with Chinese ink-wash effect based on blur and edge detection was provided, and implemented in programming on MATLAB SDK platform. Using this method on the platform, a given color image could converse to the picture stylized with Chinese ink-wash effect automatically...
The virtual filter system based on the concept of modularization is designed and implemented on the LabVIEW development platform in this paper. The design includes signal generator, window function and filter processer. The signal generator generated candidate waveform signals added by Gaussian white noise and delivered to the window function and filter processer to process and analysis the signal...
Generally, the performance of endpoint detection is affected by the noise. In this paper, we propose a novel two-layer decision model based on noise classification to detect the activity voice robustly. The training processing mainly contains two steps: firstly, we employ the noisex-92 database, which consists of different types of pure noise, to train a BP neural network in order to classify the...
With the rapid development of information technology, cloud computing has become an important part of the new generation of information industry which is a major change in the information field. Cloud security is a key factor restricting further development of the cloud. The current cloud security issues drew much attention. Security access control resource is a necessary condition for the purpose...
Insulation wall crack can decrease the wall quality, such as integrity, heat preservation, durability, anti-seismic performance. Therefore, in order to strengthen heat preservation wall structural safety study, mainly in material selection sets selected, on the construction technology of first to ensure the working environment and meet the requirements of regulation, according to the operation rules...
In the process of drying, uneven drying rate will lead to the decline of grain quality, including the increase of crackle ratio, the destruction of the edible quality. In this paper, based on PAGE model the numerical simulation method suitable for circulated rice drying process of constant rate was developed and circulated rice drying process of constant rate was built. The simulation software of...
With the development of the Internet network, the decision makers in different places can solve the problem effectively and reasonably at the same time. Based on social data analysis, the decision making system of rural entrepreneurial economy is designed. The whole system is designed with reference to the Microsoft.NET framework. The modules, such as the project decision-making, interactive decision...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.