The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In the last decade, the use of artificial neural networks (ANN) has become widely accepted in medical applications for accuracy for predictive inference, with potential to support and flexible non-linear modelling of large data sets. Feedforward neural network (FNN) is a kind of artificial neural networks, which has a better structure and been widely used. But there are still many drawbacks if we...
Java is one of the most popular programming architectures because of its platform-independence. A Java processor called ??JOP?? accelerates the speed of Java applications by executing Java bytecode instructions directly instead of by software emulation. However, instructions in Java executable file need to be resolved before executed. JOP finishes this resolving procedure in the Java application compiling...
How to management local area network (LAN) scientifically and effectively is an important question in remote control area. Remote Control to the computers in LAN could relieve the network administrators of some of trivial works and improve the efficiency. An intelligent, real-time controlling management system was designed and implemented. The key control functions of network communication, remote...
Types and characteristics of information on examination certificates are analyzed in this paper and then the two-dimensional bar code encoding method based on GB18030 character set of information in text kind, and the method for image kind on the basis of compression using zerotree of wavelet transformation is put forward. A flowgraph for the whole procedure is given and an example of examination...
In the paper, the key technologies of authorized software are introduced. Image preprocessing, the comparative experiment of edge filter, the edge detection, the edge track and extract, data compression and system calibration and so on. Finally, the result of reconstruction is shown.
To solve security problems of E-commerce system, this paper proposed a new trust model APR which is based on anticipative perceived risk. The concept of perceived risk was introduced into APR, many kinds of trust factor were taken to calculate the trust value among nodes, and an origination method was provided to integrate direct trust and recommendation trust. Comparing with other trust models, APR...
This paper presents a Kalman-filter-based method, to track the direction-of-arrival (DOA) of a moving target using antenna array in mobile communications. There are two major new features about the proposed scheme. Firstly, traditional Kalman filter needs measurement transformed. However, it is difficult and costly to be obtained. And our method could work without this message. Secondly, the traditional...
Ant colony optimization (ACO) algorithms have been applied successfully to combinatorial optimization problems. Rough set theory offers a viable approach for feature selection from data sets. In this paper, the basic concepts of rough set theory and ant colony optimization are introduced, and the role of the basic constructs of rough set approach in feature selection, namely attribute reduction is...
Statistical models in which both fixed and random effects enter nonlinearly are becoming increasingly popular. These models have a wide variety of applications in many areas such as agriculture, forestry, biology, ecology, biomedicine, sociology, economics, pharmacokinetics, and other areas. Mixed effect models are flexible models to analyze grouped data including longitudinal data, repeated measures...
The classification for similar features classes is quite difficult task in many existing pattern-recognition systems. When the amount of samples is insufficient, neural networking training is hard. The dimension reduction, classification, clustering etc serial steps in recognition process takes such much time that the practical recognizing application is ease to meet the real time requirement. The...
The issue of page??s form submission has been a troubled big problem for the software developers, and this paper through the analysis of the form submitted by several commonly used methods solves that: using the technology of Ajax for submitting form to prevent repeat submission is a good choice. The technology of Ajax achieves not only implementation the need of the problem, but also greatly improving...
Grammar rule set is often used in natural language processing. Usually, rule set can only be gained in linguistics materials artificially. In this paper, through study on the using states of grammar rules in natural language processing, we propose a method, with using a typical way of data mining - mining association rules, of exploring Chinese grammar rules in real corpus environment. And we build...
In wireless sensor networks, clustering is considered as an effective energy-saving routing technology. In this paper, we proposed an inter-cluster routing schedule for data collection to solve inter-cluster communication problems: make sure the dominating set C produced by clustering algorithm meets the connectivity and constructs a routing pool tree, which can be got by using jump to jump transmission...
We propose an improved fractal image coding algorithm based on oriented wavelet sub-tree. The algorithm couples the wavelet transform with fractal coding, set the scanning manner according to the orientation of wavelet sub-tree. It could improve the matching precision better. In addition to improving compression performance, the proposed algorithm also couples the zero-tree structure, wipes off large...
Car plate recognition is a very important issue in many traffic related applications, and the enhancement process of car plate image is the key step at the very beginning. Its effect relates to the efficiency and precision of car plate localization and recognition directly. This paper brings forward a new car plate image enhancement method based on a simplified PCNN with the parameters determined...
Utilize the programming environment at present, it??s effortless for us to design intuitionistic visual program. It only implements the visualization of programming ending. The process of programming is not fully visualization and it??s not visual programming language in its true sense. According to the related research on visual programming languages in the past, the language is designed for special...
This paper presents a method for expressing color features of images through color hue histograms, according to the distribution characteristics of image color space. In this method, the spatial features of colors are described in terms of three independent components of the HSV color space, with rotation, scaling and translation invariant features. Tests have proved that favorable retrieval effects...
Combining the failure practical example, neural network analysis is used for diagnosis. Using the neural network in MATLAB to simulate the circuit fault system, this is using two different kinds of training functions. For the better analysis of failure diagnosis problems, firstly, using MATLAB software to simulate failure problems such as the emergence of regular power, short circuit and broken circuit...
Electronic voting systems, catering to different requirements, have been widely implemented and used. This paper will overview the concerns to secure electronic voting and tries to give a solution. A simple scheme is designed to show that technical problems as eligibility and privacy can be solved fairly easily.
In order to quickly generate secret key in low-power held-hand devices, Modadugu et al. propose two server-aided RSA key generation protocol, along with Chen et al. sequentially propose four improved protocol. However, one drawback of these protocols is they can??t resist collusion attack. In this paper, we implement a new server-aided RSA key generation protocol, which can resist collusion attack...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.