The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper provides one damage identification method for stiffness mutation position of tower structure based on dynamic response information truncation. On the basis of obtaining dynamic response information of tower structure under environment excitation, wavelet transform is adopted for structure damage location identification. When there is mutation point in integral stiffness of tower structure,...
Nowadays, the number of Web databases has experienced an increase at a surprising rate. Data in the Web databases are hidden behind query forms. As the general reptiles are difficult to search these data, massive resources have been wasted. In order to integrate Web databases and provide a convenience to users' query, one of important problems in this research area is to understand what a query form...
A number of logics have been proposed to analyze the cryptographic protocols, but most of them cannot explicitly express time factor which plays an important role in protocols. In this paper, we present a logic to model the time in cryptographic protocols. Our logic is based on the predicate modal logic, so, the time factor can be expressed by invoking a time variable as a parameter of predicate and...
The key issue for parallel cluster computing is the stability of load balancing method, the unstable behavior such as oscillatory action which caused by delay can intensely influence the performance of load balancing algorithm. In such a case, a linear dynamic load balancing model is proposed in this paper. By analyzing the stability of this linear model, we can not only obtain the relation between...
Based on virtual reality technology, the paper does some researches and developments for virtual grinding system. A friendly human-computer interaction interface and virtual machining environment are programmed with Visual C++ and OpenGL, and their characters of interaction and immersion are embodied completely. Physical model of virtual grinding wheel and mathematical model of contact between abrasive...
It??s very significative to get the numerical prediction of the biomechanical response of eyeball to increased IOP. In this study, a geometry model of eyeball with 3-layers wall and optic nerve was built firstly; then, meshing and physical property was applied on it to get physical model; finally, the increase of IOP was simulated on it. The results of simulation experiment validate this model and...
In the IT project development process, project change is inevitable throughout the entire life cycle. Change in the project has become the most prominent source of risk in the development of the project: a direct impact on the time, cost and quality of the software developing project. Project change is one of the most important causes of the failure of many projects. This paper analyses the reasons...
The accession of China to the World Trade Organization should provide greater access to an erstwhile-untapped market. Trade and foreign investments are expected to increase rapidly. Under this setting, an enormous challenge is posed to the logistics industry as it endeavours to meet the increased demands of the market. Based on the secondary data, this paper described logistics development in the...
In the paper, we propose phase type (PH) distribution service time working vacation scheme cyclic polling system for WDM. This system consists of multi-queues (terminals). Using the decomposition approach, each queue is analyzed as a single server queue with PH distribution service time working vacation scheme which works at a different rate rather than completely stops during the vacation polling...
The technology of the reliability theory and its application is a new technology. It has important effect to ensure and improve the quality of the products of electrical engineering. In the reliability test of the products of electrical engineering, assume F(t,??) is the distribution function of the lifetime T of the product, where ?? ?? ?? is an unknown parameter, and ?? is the space of the parameters...
A dynamic policy based network management scheme is presented for the problem that traditional policies can??t preferably adapt to change of network state. It defined dynamic policy form and appended new module PMA to IETF policy frame to improves the adaptability of policie. Then the application of dynamic policy to allocate resource is presented. By experiment and analysis, it is shown that this...
Based on the analysis of the heterogeneous data environment, the system integration platform is built to resolve the heterogeneous data sharing and mutual visit in view of the status quo of the heterogeneous data and integration demand in the coal enterprise. The system chooses the integration project based on the middleware, constructs the heterogeneous data integration frame based on the XML, gives...
This article had a formalizing description to the structure of logic compound sentences (LCS) in the course of decompilation. It applied the Logic diagram to the recognition of LCS which belongs to graph theory. The recognition arithmetic overcame the shortcomings of some typical current approaches. Furthermore, this article introduced logical correlation matrices in the solution to the Logic diagrams,...
A threshold secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Threshold secret sharing is useful in management of cryptographic keys. Based on Birkhoff interpolation, Tassa has proposed an ideal hierarchical threshold secret sharing scheme. Then based on Sure interpolation and participants' identity,...
As a common language in the Web sites, JavaScript helps to make various dynamic Web pages. But it??s more difficult to protect JavaScript source codes than to protect Java or C/C++ programs, because JavaScript codes can??t be compiled into byte or binary codes. This paper discusses the obfuscation method to protect source codes of script languages like JavaScript, and provides a algorithm by using...
In view of importance of teaching quality evaluation, the process and results are fully concentrated on considering entirety and dynamics. A method of teaching quality evaluation calculation is proposed on the basis of grey relation analysis and implemented by way of VB program. The no-strictness and no-accuracy results of conventional calculating methods are analyzed. Discusses how to calculate the...
The paper discussed significance of assuring pork security with traceability information system, the actual study state of traceability information system in the advancing countries of the world and the contents of pork traceability information system. In accordance with business flow of pork production in China, the paper analyzed animal identification technologies, function model of pork production,...
Superposition principle of quantum theory is introduced in this paper. The genetic algorithm has been described by quantum superposition theory. It implies genetic algorithm is essentially a kind of quantum algorithm in the classical computer on the reduced order to achieve. It through genetic manipulation to input superposition states data into classical computer. In the evolutionary process, a lot...
In this paper we present a uniform negotiation and delivery framework for TCP-based data collaboration applications over IP network. With this framework rich innovative collaboration services can be developed conveniently and provide users with novel communication experience. The framework adopts the offer/answer model with extended Session Description Protocol as session description and negotiation...
With the wide application of global navigation and location technology, people have growing demands of solving the shortest path problem. In the real traffic network, all kinds of traffic information have greatly influenced path searching, such as traffic jams. So existing algorithms just remove the congested road and recompute the path. So the traveler needs to wait for a period of time. In order...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.