The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
When studying attribute reduction, we need to enumerate all the minimal reductions to prove the correctness of the attribute reduction algorithm. The explosion of attributes combination makes time complexity of the enumeration algorithm pretty high. An algorithm derived from grouping the rows of decision table is put forward to validate if an attribute set is reduction. Based on this algorithm, a...
On dynamic embedded Web server, cgi program is adopted to complete the required workflow. Due to the resource limitation of embedded systems, the performance of embedded Web server is an important issue. To address this problem, we combine cgi with Javascript and make them collaboratively running to satisfy the requirement of embedded application. On embedded server, cgi processes the parameters submitted...
Thin Ca films were deposited directly on Si(100) substrates at the different deposition Ar pressure using radio frequency (R.F.) magnetron sputtering system (MS) and subsequent annealed at 800 Celsius for 2.5 h or 1.5 h in a vacuum furnace, respectively. The double-structure Ca2Si films and Ca5Si3 film are grown directly and individually on Si(100) substrates by an interdiffusion process between the...
To make function test of Web application based on struts automation, an automated test tool is proposed. The content of form is produced through analyzing Web page by HtmlParser. The test cases are produced by matching the data in test database and the content of form. The test cases are described by XML. Changing the test cases to code of Cactus and running the code to achieve the target of testing...
Wearable computers need networking by using wireless ad hoc network in order to utilize them more effectively, routing protocol becomes an important research field for its significance in wireless ad hoc network. In Ad Hoc network, there are mainly two kinds of routing protocols: proactive routing protocol and on-demand routing protocol, to evaluate the performance of two kinds of protocols, we choose...
The continuous increase of spatial data volumes available from many sources raises new challenges for their effective understanding. We propose an intelligent distributed geographic information service platform, which is a profitable infrastructure and has great significance in understanding spatial data. In order to accomplish more complex data mining tasks, simple services are linked together by...
The 3D standard k - ?? model coupled with the volume of fluid (VOF) method of water-air two-phase flow is established in long-distance diversion tunnel with free flow. The method of wall functions which considers the roughness of the walls is utilized near the walls, and the method of pressure-implicit with splitting of operators (PISO) is applied to solve the unsteady water-air two-phase flow field...
Distributed test framework can not only ensure that the quality of software testing but also can improve the automated test efficiency, and so on. The key technologies of the distributed test framework are studies in this paper. First, the main idea of the distributed test framework and its overall structure are given combined with the actual project needs; based on it, the key technologies involved...
Restricted Floating Sensor (RFS) proposed by Yunhao Liu is an important model in offshore data collection. There is a need for highly precise, real-time in many offshore monitoring. In this paper, we propose a Transmission Control (TC) strategy for RFS networks. This strategy can modify the transmission delay adaptively depending on users together with the changeful condition of wireless links. The...
Text categorization is an important research field within text mining. The initial objective of text categorization is to recognize, understand and organize various volumes of texts or documents. The general procedures of categorization are treated as supervised learning, from which the similarity can be inferred from a collection of categorized texts for training purpose. Obviously, the typical approaches...
As the technology of network has been developing, the safety of network is concerned by more and more people. The technology of information security comes about as a new field. The impact of software viruses to information security has been felt by the entire computerized world, through loss of productivity and loss of system resources or data. But the research on hardware vulnerabilities looks far...
We apply the random-matrix approach to undress the noise of the cross correlation matrix constructed from Shanghai Stock Exchange (SSE) for the period 2001-2008. The empirical evidence shows that, about 7.4% of the eigenvalues fall out the RMT bounds, and the eigenvalues within the bounds agree with the universal properties of random matrix, implying a large degree of noise in the correlation matrix...
An anomaly intrusion detection algorithm based on minimal diversity is proposed. It can deal with mixed attributes, so overcomes the deficiencies of most unsupervised learning methods. Based on the minimal diversity measurement, we use a small amount of marked data to guide clustering. When detecting new records, we calculate its diversity from the existing clusters to determine its category. This...
P2P workflow systems meet the development trend of workflow systems. The running path optimization (the path with the minimum running time which consists of the services discovery time and the task execution time) in full-distribution (decentralized) environments has been a bottleneck restricting the performance of P2P workflow systems. Aiming at this problem, this paper proposes a innovative hybrid...
In this paper we propose a method that simultaneously performs image denoising and salient curve extraction among random dot patterns using tensor voting. Given an image containing random dots, the pixels are first converted into a set of tokens to be preprocessed by tensor voting, then the voting results are binarized and thinned by a morphological filter to extract the salient curves. At last the...
In this paper segmentation on both color and spatial space is implemented to compare their influence to the performance of content-based image retrieval (CBIR) system. Firstly, images are converted from RGB color space to HSV space. And then cumulative histograms on H component are extracted from four segmented blocks as one color feature of the image. At the same time, the HSV color space is further...
A finite impulse compensation system is designed with charge coupled devices (CCD). The system can compensate the frequency response of various measuring device of network, such as instrument and sensor, etc. so as to extend their work frequency band. The main advantage of the design is its flexibility, the system can be easily changes in the weighting resistances of CCD, provide that the clock frequency...
Digital factory is a new technology to construct a virtual plant framework to integrate manufacturing process planning with manufacturing execution. Object-Oriented technology is introduced to simulate complicated discrete production system. And a virtual factory is constructed in digital environment. In this paper, manufacturing resource library is built to manage manufacturing equipments and all...
By using DTrace tools in Solaris operating system. The behavior of doors IPC which is developed by Sun Microsystems is traced. Discussing with various kinds of Solaris IPCs, this paper mainly tests the Solaris doors in IPC programming. The test results illustrates that the door IPC in OS is thread safety by using core mutual exclusive in system.
An implementation of data preprocessing system for Web usage mining and the details of algorithm for path completion are presented. After user session identification, the missing pages in user access paths are appended by using the referer-based method which is an effective solution to the problems introduced by using proxy servers and local caching. The reference length of pages in complete path...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.