The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Today many private phones and household appliances are very popular in the family. When the home appliances bring more convenience to people at the same time people want to control them. The system realized the intelligent control of household appliance by mutual communication of TC35i, MCU and wireless transceiver. The users can control the household appliance open and close at any time any place...
Canonical Correlation Analysis (CCA) is a well-known method for feature extraction and dimension reduction. CCA can simultaneously deal with two sets of data. It makes CCA can be used for feature level fusion. But it suffers the Small Sample Size (SSS) problem. In this paper, a new optimization criterion is presented for overcoming the SSS problem. The optimization problem can be solved analytically...
Grammar rule set is often used in natural language processing. Usually, rule set can only be gained in linguistics materials artificially. In this paper, through study on the using states of grammar rules in natural language processing, we propose a method, with using a typical way of data mining - mining association rules, of exploring Chinese grammar rules in real corpus environment. And we build...
Multicast communication is one of the most significant collective communication operations and is highly demanded in data communications and scalable parallel and distributed computing systems. In this paper, we consider the issue of supporting multicast in the far and wide used well-known three-stage Clos network C(N, n, m; f2). We make use of Hwang??s unifying approach and Pattavina and Tesei??s...
When studying attribute reduction, we need to enumerate all the minimal reductions to prove the correctness of the attribute reduction algorithm. The explosion of attributes combination makes time complexity of the enumeration algorithm pretty high. An algorithm derived from grouping the rows of decision table is put forward to validate if an attribute set is reduction. Based on this algorithm, a...
On dynamic embedded Web server, cgi program is adopted to complete the required workflow. Due to the resource limitation of embedded systems, the performance of embedded Web server is an important issue. To address this problem, we combine cgi with Javascript and make them collaboratively running to satisfy the requirement of embedded application. On embedded server, cgi processes the parameters submitted...
To make function test of Web application based on struts automation, an automated test tool is proposed. The content of form is produced through analyzing Web page by HtmlParser. The test cases are produced by matching the data in test database and the content of form. The test cases are described by XML. Changing the test cases to code of Cactus and running the code to achieve the target of testing...
The continuous increase of spatial data volumes available from many sources raises new challenges for their effective understanding. We propose an intelligent distributed geographic information service platform, which is a profitable infrastructure and has great significance in understanding spatial data. In order to accomplish more complex data mining tasks, simple services are linked together by...
P2P workflow systems meet the development trend of workflow systems. The running path optimization (the path with the minimum running time which consists of the services discovery time and the task execution time) in full-distribution (decentralized) environments has been a bottleneck restricting the performance of P2P workflow systems. Aiming at this problem, this paper proposes a innovative hybrid...
By using DTrace tools in Solaris operating system. The behavior of doors IPC which is developed by Sun Microsystems is traced. Discussing with various kinds of Solaris IPCs, this paper mainly tests the Solaris doors in IPC programming. The test results illustrates that the door IPC in OS is thread safety by using core mutual exclusive in system.
In order to overcome the subjective limitation in existing evaluation methods, based on determination of the evaluation indicator weight by using rough set theory, a new fuzzy synthesized evaluation method of e-business website is proposed. It reduces subjective influence and increases the objectivity of evaluation result. An example shows the effectiveness and practicality of this evaluation method.
Games are attractive and they can improve the critical thinking and problem solving skills. To research their use in education is significant. The course ??the Computer Composing Principles?? is a core course in the computer science engineering degree. To understand the principles of each computer component deeply and expressly, a proposal is represented in the paper that is to play with a computer...
This paper represents the information flow of the system with information flow graph (IFG). If constructing the system IFG based on the source code of the system directly, it may produce a great number of information flow paths not existing because of the transitivity of the information flow. This paper handles the transitivity of the information flow with the program dependence graph (PDG) before...
Code variations are widely believed to impede program analysis. This paper introduces an approach for removing code variations in programs with function calls. Non-recursive programs and recursive programs are handled with different strategies. An inlining algorithm based on system dependence graph is developed to remove the module structure variation in non-recursive programs. Recursive programs...
We present a framework for describing and analyzing security protocols. It simplifies the applied pi calculus of Abadi and Fournet by moving away the infinite processes and the capability of transmitting channels in order to make the framework fit for describing practical protocols. An alternative operational semantics is given to make the framework more efficient when analyzing protocols. The semantics...
Object-oriented framework is increasingly recognized as an efficient reuse mechanism in software development, but for its intrinsic abstract and complex, it is still difficult to develop for framework designer and instantiate for framework user, this is partly due to the lack of formal framework modeling language guiding the framework developer, user and tool builder. We propose a formal way to model...
It is very important to detect singular points (core and delta) accurately and reliably for classification and matching of fingerprint. In this paper, an improved method for singularity detection in fingerprint images, which based on continuous orientation field, is proposed to improve accuracy of the position and reliability of the singularity. Firstly, the blocks which may contain singularities...
The verification of termination is a difficult problem. While most of the recent work on automated termination proofs focuses on the construction of linear ranking functions for unnested loops, we present an algorithm based on region graphs to prove termination of nested loops. The method can prove the termination of terminating nested loops that may not have linear ranking function. For the programs...
According to the agent-oriented design method and the MASIF criteria, a commercial data query system based on the mobile agent is proposed. The system can make it easy for mobile users to query data that they needed. Using the master-slaver agent pattern, we define the role of the agent and design the work flow in the system. In the Aglet platform, we develop a mobile agent??s management and application...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.