The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Single CPU dual bus architecture is a new kind of architecture aimed at reducing the security vulnerability of Von Neumann architecture, and it has been proved theoretically reasonable. In this paper, a bus bridge is implemented to bridge CPU and dual bus. The experiment is done and the result has proved that the architecture based on single CPU and dual bus is reasonable and effective.
Both software and hardware of computer systems are subject to faults, however, traditional approaches, ignoring the relationship between software faults and hardware faults, are unavailable for analyzing complex software and hardware faults. This paper proposes a systematic framework to analyze correlative software and hardware fault. It includes two associated processes, module level analysis and...
At present, storing XML document in a relational database is a hot topic because relational databases are mature and scale well. In this paper, a novel relational database storage structure that can store XML document is proposed. An algorithm that translates XML document to relational database is given according to the proposed storing structure and algorithms that translate XPath Query to SQL Query...
In order to enhance the utilization rate of the existing magnetic resonance imaging (MRI) experiment instruments and to allocate the existing experimental resources fully and reasonably, we constructed the experiment framework with remote experiment ability for MRI imaging technology by means of the desktop magnetic resonance imaging apparatus which are developed by Shanghai Niumag Cooperation. This...
There are three parts of Digital Educational Resource Platform - Educational Resource, Support system and Learning Environment. The design strategy of Digital Educational Resource Platforms in University is making cleanly what the users need, integrating standardize, efficient architectures, open Stand-point. The procedure of designing the Digital Educational Resource Platforms is analyzing and designing...
As virtual classrooms become more and more popular, companies are focusing on developing collaboration tools that help boost the effectiveness of online learning environments. These tools are referred to as synchronous collaboration tools. However, few virtual classrooms have multi-video function. This paper develops a multi-video based virtual classroom (MVVC) by Java media framework (JMF), a new...
The Catmull-Clark subdivision surface was designed to generalize the bi-cubic B-spline surface to the meshes of arbitrary topology. In this paper, the error bound of Catmull-Clark subdivision surface is estimated. By using the first-order difference of control points, we define the distance between two control meshes and derive an error estimation formula for Catmull-Clark subdivision surface. Meanwhile,...
How to management local area network (LAN) scientifically and effectively is an important question in remote control area. Remote Control to the computers in LAN could relieve the network administrators of some of trivial works and improve the efficiency. An intelligent, real-time controlling management system was designed and implemented. The key control functions of network communication, remote...
Utilize the programming environment at present, it??s effortless for us to design intuitionistic visual program. It only implements the visualization of programming ending. The process of programming is not fully visualization and it??s not visual programming language in its true sense. According to the related research on visual programming languages in the past, the language is designed for special...
Superposition principle of quantum theory is introduced in this paper. The genetic algorithm has been described by quantum superposition theory. It implies genetic algorithm is essentially a kind of quantum algorithm in the classical computer on the reduced order to achieve. It through genetic manipulation to input superposition states data into classical computer. In the evolutionary process, a lot...
When studying attribute reduction, we need to enumerate all the minimal reductions to prove the correctness of the attribute reduction algorithm. The explosion of attributes combination makes time complexity of the enumeration algorithm pretty high. An algorithm derived from grouping the rows of decision table is put forward to validate if an attribute set is reduction. Based on this algorithm, a...
Cache is important for the performance of processor. With the multi-core developed, cache architecture for the performance of multi-core processor has begun to emerge. Through the result of running a test program for parallel computing obtains the phenomenon, this article analyses the reason of it occurred. It summarizes that the L2 cache architecture has an impact the performance of multi-core processor...
Parallel computing is important in modern technology, so is the interconnected network. This paper analyses the architecture of SMP symmetrical multi-processor system, designs a kind of crossbar for small scale multi-processor system basing on the theory of advanced computer architecture. Brings forward the concept of require priority and designs a scheduling algorithm in considering of the priority...
In order to make full use of resources in distributed parallel computing system, and reduce general time cost for performing the algorithm, task scheduling and resource management model and low-layer resource supervision-control model are designed and implemented. The unpredictable system behavior is resolved, which is caused by dynamic change resources. The dynamic join-in of resources is allowed...
Games are attractive and they can improve the critical thinking and problem solving skills. To research their use in education is significant. The course ??the Computer Composing Principles?? is a core course in the computer science engineering degree. To understand the principles of each computer component deeply and expressly, a proposal is represented in the paper that is to play with a computer...
This paper presents the patterns about shifting a computer game to a physical game which is usually the pervasive and social computing based on wireless sensor networks (WSN), RFID, GPS and other mobile devices. These shift patterns, focused on the aspects that most computer games highlight and guidelines for transforming these aspects into physical forms, help people design and implement new physical...
In this paper, the fuzzy concept based on T-implication operators is studied by the axiomatic approach. An operators-oriented characterization of the fuzzy concept is proposed, that is, the fuzzy intent-extent operator and the fuzzy extent-intent operator based on T-implication operators are defined by axioms. The axiom sets of the fuzzy concept operators guarantee the existence of fuzzy relations...
Distributed systems have been used to solve some complicated problems. In order to make better use of resources in distributed systems, people have designed many approaches and developed many systems to manage processes in distributed systems, but most of the management systems are paid little attention on reliability of them. There may be some attacks in complex network environment. Therefore the...
The data security is one of the biggest problems which inhibit the further application of the ASP platform. This paper put forward an ASP-based security system strategy which includes infrastructure security, safeguard security boundary and computing environment protection. An ASP-oriented intrusion detection model was also proposed, and the intrusion detection subsystem function was analyzed in detail...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.