The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a method to build a real-time distributed operating system. We first discuss the theory of microkernels and their operating system implementations, to find a way to build a real-time distributed operating system that meet the requirements in constructing tightly coupled multi-robot architecture.We choose DROPS as the basis, and do many modifications on real time and distributivity...
Component-based software engineering has increased the quality and the efficiency in software development. But the component adaptation is still a crucial issue in Component-based software engineering. In this paper, we focus on a dynamic analysis on the change of component and a method detecting the impact on both the correlative component and the whole system. Firstly, the component model and adaptation...
Rough sets theory is applied to the service matchmaking algorithm for pervasive computing. The relevant service matchmaking algorithm model and method are presented in the paper. The decision system is built on the basis of the sample data from service resources. The evaluation indexes for service matchmaking are taken as the attributes to find out the important attributes that reflect the essential...
Modelica is a new object-oriented multi-domain modeling and simulation language and used for solving large, complex, and heterogeneous physical systems with differential-algebraic equations (DAEs). Presently there is no simulation support available in Modelica for solving partial differential equations (PDEs) problems. This paper describes how to solve the PDE models in Modelica and provides a preliminary...
This paper presents a new carving method for automatically and effectively carving PDF files from an unstructured digital forensic image. The carving method has five validation algorithms based on the content characters and the internal structure of PDF files. These validation algorithms include header/file length/maximal offset of objects/footer validation, internal structure validation, entropy...
As in traditional relational database, there also exists redundant data dependency in temporal database. Effective elimination of redundant data dependency is the foundation of further normalization for temporal databases. In order to eliminate redundant dependencies, cover of data dependency sets should be investigated. Coexist of multiple time granularities, temporal functional dependencies(TFDs)...
The design adds voice alarm function to ordinary alarm to solve the alarm problems in the market. It not only makes the users understand the reason of alarm more directly and effectively but also can play various voice according to various condition. The design uses 89C52 microcontroller as the core, SPI serial communication to develop and design the alarm system. The users may record voice content...
On the base of NS-IMMC, this paper propose a new method of generating the cause-and-effect of news topic. The new method choose representative sentences for news documents according to the specialty of news structure (NS, News structure), and then utilizes IMMC (Improved Min-Max clustering) to classify these representative sentences to generate multi-documents summary which represents the topic cause-and-effect...
Suppose that x1, y1, x2 and y2 are four integers. For a given Cayley digraph Omega=Cay(G, {a, b}), where G=Z2/K, a=(1, 0)+K, b=(0, 1)+K, K=<alpha, beta>, alpha=(x1, y2), beta=(x2, y2), an algorithm is given to compute the four parameters l, h, m, n of its L-shape tile. Thus the diameter of this Cayley digraph can be calculated by d(Omega)=max{l+h-m-2, l+h-n-2}.
Information systems' centralizing is an inevitable direction. To solve the problem that enterprise users could remotely and securely share software resources in data center, a secure access platform (SAP) based on remote desktop protocol (RDP) was proposed. According to the characteristics of software resources sharing, the software resources sharing model (SRSM) and the secure access platform model...
The Aiming at the lack of an agreed and standard modelling technique of safety workflow management systems, A model of uniform Petri Net for safety workflow management is presented based on Petri Net, in which the four patterns of sub- Petri Net along with algorithms are proposed to model resource allocation and assignment decision, a set of composition rules are proposed to guarantee that the patterns...
This paper puts forward a novel method using dynamic programming and grey relational analysis to find a best seam line because of the grey scale difference in the edges of image in the overlapping region and the relation of neighboring points. The first step is to find an optimal seam line to stitch the images. Then the seam line is removed by a hard correction method based on dynamic width. Finally,...
Sudoku, a simple and fun game of logic, has been used for steganography to conceal messages into a digital image recently. Chang et al. adapted the idea of smallest Manhattan distance, embedding secret messages into the neighbors of the located element according to a given Sudoku solution. Hong et al. improved Chang et al.psilas technique by introducing additional set of candidate elements to reduce...
Evaluation of water environment quality plays an important role in environment science. By analyzing the factors influencing multi-reach water quality, a RBF neural network model with water quality is developed using neural network theory and method. It is integrated into a software package using VB program. The software has a friend interactive interface, and someone not knowing artificial neural...
Due to their dynamic topologies, providing quality of service (QoS) in wireless ad hoc networks introduces major new challenges to the research community. Now, the commercially available ad-hoc network products are those based on the IEEE802.11 Distributed Coordination Function (DCF). Cooperative communications fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby...
Through researching the patterns and mechanism of life behavior of some animals, a knowledge processing system with biologic action feature was suggested by this paper, and the autonomic and creative features of the system were described. Following the thought of artificial life, the system was based on the rules and features that come from investigating the intelligent actives and behaviors of some...
To generate test cases for the unit testing of business process written in BPEL, developers have to prepare input data for the BPEL process under test (PUT) and verification conditions for output data from the PUT. It could be a tedious task due to the complexity of the PUT which describes the Web flow of a distributed collaboration of individual service providers executing concurrently. This paper...
Residuated lattice is an important non-classical logic algebra, and L-fuzzy rough set based on residuated lattice can describe the information with incompleteness, fuzziness and uncomparativity in information system. In this paper, the properties of L-fuzzy rough sets based on residuated lattice are given as the expansion of ref.
This article introduces a new intelligent online test system, whose obvious difference with the traditional test system is that this test system does not based on the question bank, all test questions are produced automatically by questions-providing algorithm, providing explanation process of test question automatically by questions-solving algorithm simultaneously. The test questions that the system...
In a complex system, schemes are affected by lots of factors. The evaluation must take all the factors into account. The nature of the factors are fuzzy and grey, this paper apply grey relational analysis and entropy weights into fuzzy design theory, and solve the problem of three levels structure fuzzy comprehensive evaluation. A practical example of torpedo is showed to prove the validity of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.