Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The paper presents a method to reconstruct a controllable 3D head and face model for a specific person. The 3D grid-muscle head and face model of the certain person is created after selecting key feature points from a front face photo and a left side face photo of the person, deforming the grid points and muscle vectors of a basic model. Then after texture mapping, we reconstruct the special person's...
In order to realize the industrialization production of software, people have carried out research on and analysis the software product line architecture of the growing maturity, component technology and development methods for product line. In this paper, a novel software engineering process model is proposed based on the modern industrial production systems and automated production method: that...
Model-based approach alleviates the discrepancies between software functional models and the implementation by automatically transforming models. Constructing runtime real-time tasks, or operating system-level processes/threads, from the components of software design models is crucial to the model-based development of embedded control software. The model of data consistency presented here uses temporal...
The existent models aiming at information security risk analysis primary startle the problem from a technical view. Although the knowledge based approaches are studied for information security risk analysis, they are limited in rule presentation and assessing management. The bottom-up approaches fails to effectively support the security decision and control. The purpose of this study is to study a...
This paper proposed a new algorithm of Coupling from the Past (CFTP) with directional threshold. CFTP, also called Exact Sampling, established in 1996 by Propp and Wilson, aimed that it would eliminate the need to compute Markov chain convergence rate for the quality control. CFTP was used in mixture models of Monte Carlo and worked well in low computation complexity problems. The Coupling from the...
With the development of uncertain theory, fuzzy multi attribute decision making has been applicated in more and more areas. This paper established optimization model based on fuzzy ideal points for uncertain multi-attribute decision making problem in which the attribute values are given in the forms of triangular fuzzy number and the information on attribute weights is unknown completely or partly...
The Catmull-Clark subdivision surface was designed to generalize the bi-cubic B-spline surface to the meshes of arbitrary topology. In this paper, the error bound of Catmull-Clark subdivision surface is estimated. By using the first-order difference of control points, we define the distance between two control meshes and derive an error estimation formula for Catmull-Clark subdivision surface. Meanwhile,...
Autonomic computing is expected to solve system management complexity and cost problems in IT environment by enabling systems to be self-managing. The autonomic computing collaborative work based on policy-driven is studied, including competition and collaboration. The autonomic elements should work collaboratively to implement the complex self-management tasks of autonomic computing system. The competition...
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
In order to improve the negotiation efficiency of electronic marketplace, this paper proposes a model of game agent for auction-based negotiation and a framework of game-based electronic marketplace. In a game-based electronic marketplace, buyer game agents can determine price more accurately and bid more rationally for buyers. As buyer game agents bid in a more rational way, auction agents and buyer...
Multicast communication is one of the most significant collective communication operations and is highly demanded in data communications and scalable parallel and distributed computing systems. In this paper, we consider the issue of supporting multicast in the far and wide used well-known three-stage Clos network C(N, n, m; f2). We make use of Hwang??s unifying approach and Pattavina and Tesei??s...
This paper studies the realizing progress of data mining in psychological evaluation. Based on the matrix of evaluation data and the actual evaluation work, we propose a kind of generalized linear regression model with convex constraint, named as evaluation model, in which the dependent variable and regression coefficients all are unknown. We analyze the algorithm of the model with linear regression...
Government business model (GBM) is used to depict business processes of governments. It includes three basic models, which are process model, organization model and resource model. But these three models can not depict the collaboration relation between the infrastructure elements (including organization model elements and resource model elements) or the information flow in a government business process...
This paper presents an efficient method to reduce the circuit scale of cell-based logic block for hierarchical transient analysis of VLSI power ground network. The method built logic block circuit model with considering inductance characteristics of power ground network in low metal layers and statistical distribution of active logic cells. It transformed circuit model into a simple one with only...
Based on virtual reality technology, the paper does some researches and developments for virtual grinding system. A friendly human-computer interaction interface and virtual machining environment are programmed with Visual C++ and OpenGL, and their characters of interaction and immersion are embodied completely. Physical model of virtual grinding wheel and mathematical model of contact between abrasive...
It??s very significative to get the numerical prediction of the biomechanical response of eyeball to increased IOP. In this study, a geometry model of eyeball with 3-layers wall and optic nerve was built firstly; then, meshing and physical property was applied on it to get physical model; finally, the increase of IOP was simulated on it. The results of simulation experiment validate this model and...
The 3D standard k - ?? model coupled with the volume of fluid (VOF) method of water-air two-phase flow is established in long-distance diversion tunnel with free flow. The method of wall functions which considers the roughness of the walls is utilized near the walls, and the method of pressure-implicit with splitting of operators (PISO) is applied to solve the unsteady water-air two-phase flow field...
Concept lattice was creatively used in mining correlated policy rules in this study. It takes much time for a conflict detection routine to search every policy in policy repository with conventional policy storage models to see if conflict occurs before a new dynamic policy is added to the policy repository. A novel storage model for dynamic policies was proposed to address this problem. Dynamic policies...
In order to make full use of resources in distributed parallel computing system, and reduce general time cost for performing the algorithm, task scheduling and resource management model and low-layer resource supervision-control model are designed and implemented. The unpredictable system behavior is resolved, which is caused by dynamic change resources. The dynamic join-in of resources is allowed...
Recently, Abdalla and Pointcheval proposed an efficient three-party password-authenticated key exchange protocoland provided a proof of security in the Bellare, Pointcheval, and Rogaway (BPR2000) model. Despite the claim of provable security, the protocol was subsequently shown insecure in them presence of an active adversary by Kim-Kwang et al. But they declaimed the flaws stemmed from the weakness...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.