The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The precision of tile image edge detection has great influence on the dimension detection and defect detection of tile. A parallel model of Back-Propagation (BP) neural network for edge detection of binary image was proposed in this paper, and it was applied to edge detection of gray image. It solved the problem that the convergence speed was too slow to meet the need of training if the BP neural...
In this paper the traffic congestion recognition method is studied deeply based on the pattern recognition technology which is well integrates the fuzziness and randomness of linguistic concepts in a unified way, and makes the transforms between qualitative concepts and their quantitative expressions much easier and interchangeable. Moreover, the feasibility and effectiveness of that new method which...
During the development of programming languages, there always have some problems such as the AOP in the procedure-oriented languages and object-oriented languages. These problems appear frequently in software and are difficult to be coped with. Many problems are due to the limitation of theoretical foundations of these programming languages, thus they cannot be solved by simply applying some specific...
With the development of Web application, network traffic is constantly increasing. In order to do the performance testing of Web applications, a precise simulation of network traffic is necessary. However, traditional traffic model based on Poisson process can not characterize the behavior of real network traffic. Measurements of network traffic show that the property of the self-similarity is ubiquitous...
Analytical models for fully adaptive wormhole routing in k-ary n-cubes interconnection networks have been widely reported in the literature. However, there are few performance models for 2D-mesh network-on-chip. Most current models assume Poisson traffic, but studies reveal that network traffic shows peculiar types of behavior, such as long-range dependence and self-similarity. An analytical model...
Denial-of-Service (DoS) and Distributed Denial-of-Service (DDoS) Attacks make great impacts on various applications of the Internet. It disrupts the service provided by the target through consuming the target's CPU, memory or network bandwidth. In this paper, we give a brief summary on traditional DoS, DDoS attacks and defense schemes first. Then, we point out the possibility of DoS, DDoS attacks...
Virtual machines with advances in software and architectural support have emerged as the basis for enterprises to allocate resources recently. One main benefit of virtual machine is server consolidation. However, flexible and complex consolidation results in some unpredictable performance problems and introduces new requirements, such as proper configurations for scheduler and reasonable arrangements...
Among attempts to extract test scenarios from UML activity diagrams (ADs), little work has focused on dealing with some more complex structures in UML ADs, such as exception handlers, expansion and interruptible activity regions. A novel testing approach proposed in this paper presents some improvements and extensions upon the previous work in the derivation of test scenarios (TSs) from ADs and makes...
Network calculus is a new theory of network QoS which is developed recently, it is the application of the Min-Plus Algebra and Max- Plus Algebra in network analysis. With the aim to resolve the transmitting of the real-time dataflow and get a good performance in dataflow waving ,the network calculus theory is applied to the real-time industrial Ethernet. In the paper ,we gained the real-time arrives...
The explosive demands of multimedia services have been grown up to support delay-sensitive applications, e.g., VoIP and streaming using codec. When a mobile node (MN) moves across different types of networks, the codec should be effectively adapted according to the significant change of network condition, i.e., throughput and delay. Therefore, in this paper, we propose a codec adaptation for vertical...
Effectual siRNA design is a pivotal question in RNAi research. However existing siRNA design guidelines are not very consistent with each other, and many have the limitation of universality, that is, many guidelines usually present poor predicting capability on independent siRNA datasets. In order to explore high universal siRNA design rules, first we collected as many siRNA valid data on various...
At the post 911 era, biometrics is employed to deter possible future terrorist's attacks. Also, it has been used in the area of surveillance, access control, and remote monitoring intensively. However, to build a useful biometrics system is difficult, due to the complex nature of such system. Biometrics is an ever-changing variable, and the most challenging issue is the unpredictability of the working...
Internet Service Provider (ISP) needs to evaluate change of network congestion level, accordingly takes measures of congestion control to mitigate network congestion and guarantees to provide definite quality of service (QoS) for users. After autonomous system (AS) performance matrix model was introduced, a new path performance metric RL was defined firstly, and then four kinds of scalar quantity...
Web applications are the legacy software of the future. The Web application reverse-engineering process becomes necessary in order to facilitate the maintenance and evolution. This paper presents an approach to recover the architecture of web applications. The approach generates UML models from existing web applications through static and dynamic techniques. UML diagrams are extracted to depict the...
At present, Web applications and HTTP requests on the Internet are so explosively increasing that a large number of hot Web sites frequently confront with problems of server overloading. And how to provide various web services with high-level quality and satisfactory performance for Web clients has become one of the most urgent points we concern. In order to smoothly solve these problems, we proposed...
How to find suitable geospatial information in an open and distributed environment of geospatial Web services (GWS) is a crucial task. However, semantic heterogeneity came to us as a growing hard problem which impedes the deep applications of GWS. For solving this problem, an ontology-based framework for GWS is provided in this paper. This framework can help us finish the following tasks: (1) supplying...
Pulse diagnosis is one of the most important examinations in Traditional Chinese Medicine (TCM). In response to the subjectivity and fuzziness of pulse diagnosis in TCM, quantitative systems or methods are needed to modernize pulse diagnosis. In pulse diagnosis, strength is one of the most difficult factors to recognize. To explore the quantitative recognition of pulse strength, a novel method based...
Pervasive computing technology plays a key role for providing context information and offering context-aware services, which allows users to obtain digitized contents and services from wired and wireless networks virtually anywhere at any time via different handheld mobile devices. In this paper, we propose an agent-based context-aware middleware for pervasive computing environment, which is implemented...
The PoYang Lake is the largest fresh lake in China, also a national famous place of commodity grain. But on the other hand, flooding disaster happens frequently, and the economic loss caused by flood is extremely huge. In order to reduce the loss caused by the flooding disaster, it is necessary to monitor the flood disaster situation in PoYang Lake area. But so far, the disaster information monitoring...
Data and information sharing is the basic project in the national scientific and technological communication platform construction, and traffic monitoring data sharing platform is a very important content in this and it plays a unique role in roads network management and control. Communication platform design and construction has achieved more and more attention in China since most of traffic monitoring...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.