The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
To simplify distributed application development, based on the principles and norms of SOA (Service-Oriented Architecture), the workflow engine is designed to manage the system's business flow. Finite state automaton is used as the theoretical foundation of workflow's definition, defining a process as a task, giving the task determinate states, and deciding the state of the task according by the states...
Data synchronization provides a feasible solution for improving data accessibility and consistency in mobile database systems. Flexible and efficient data synchronization, however, remains a challenging problem in mobile database applications over mobile ad-hoc networks (MANET). This paper proposes a novel object-oriented data synchronization (OODS) schema in mobile database systems, for providing...
In digital photogrammetry, single stereo image matching models, which may obtain multiple solutions, have low matching reliability and successful rate. Therefore, subsequent productions are greatly constrained. Based on object-space-based ADS40 multiple-image matching models, image-space-based AMMGC multiple-image matching model is proposed. AMMGC model is appropriate for the matching of three-line-array...
In this paper we experiment the capabilities of Hidden Markov Models (HMM) to model the time-variant signal produced by the movement of a pen when drawing a sketch such as an electrical circuit diagram. We consider that the sketches have been generated by a two-level stochastic process. The underlying process governs the stroke production from a neuro-motor control point of view: go straight, change...
Measurements of network traffic have shown that self-similarity is a ubiquitous phenomenon spanning across diverse network environments. Previously, the researchers designed network traffic simulation system with sequential methods to generate a small number of network traffics in a short time scale. But there is one difficulty in simulating network traffics using parallel methods with high accuracy...
With the development of Internet and information technology, the agent technology has been widely applied in various applications. E-learning is the product of the emerging technology and has become the new way of learning. It proposes a high efficiency e-learning system based on intelligent agents. The design concept is focused on developing E-learning systems by extending and enhancing functions...
A blind watermarking algorithm based on DCT for digital image is proposed, in which a 2-bit image embeds in a 8-bit gray image. Preprocess of image watermark, watermark embedding and extraction are the main parts of the algorithm. In the preprocess of image watermark Arnold scrambling is used to reduce the relevance of the watermark and also to improve the robustness of the image embedded watermark...
Material service safety is very important for public security. Researchers and engineers have devoted themselves to establishing models for material service behavior. Utilizing these models to predict material service behavior and assess service safety is an efficient and idealized way. However, material service behavior is quite complicated. Only simple material behavior models have been established...
Human detection is the task of finding presence and position of human beings in images, In this paper, we apply scale space theory to detection human in still images. By integrating scale space theory with histogram of oriented gradients(HOG), we designed a new feature descriptor called scale space histogam of oriented gradients (SS-HOG). SS-HOG focus on the multiple scale property of describe an...
For Wireless Sensor Networks (WSN), target tracking is a canonical problem that collaborates signal and information processing to dynamically manage sensor resources and efficiently process distributed sensor measurements. This paper proposes an adaptive sensor scheduling strategy that jointly sets up distribute dynamic clustering, selects the tasking sensor, and determines the sampling interval....
Efficiency is a crucial metric to evaluate the performance of routing protocols in MANETs. A ratio of average number of control and data packets transmitted to data packets delivered, proposed by S. Corson and J. Macker, is utilized to evaluate the efficiency of routing protocols in this paper. The efficiency evaluation and comparison of AODV, DSDV are carried out based on the simulations in different...
Test system plays more and more important part during testing process. In this paper, the architecture of a distributed conformance test system is designed. The main function of each part is introduced. The core part of this test system, called IMU-TNGIP, is designed and implemented from editor to executor in many details. It includes at least three parts, expression of test suite, execution of test...
From 1990s, with the genesis and rapid develop-ments of Kansei Engineering and Affective computing, affective information processing methods have been used to analyze and process images to extract affective features contained by images. Image retrieval by affective features attracts more and more attentions in recent years. Colorful natural scenes are a kind of images with remarkable characteristic...
Workflow management systems have been applied in enterprises for many years in collaborative environment to assist individuals or organizations to carry out tasks automatically and effectively. As market requirements are developing rapidly, the enterprises now find the traditional workflow management system under such rapid circumstances difficult to copy with changes in the market both promptly and...
It is desirable to work on different machines with the uniform consistent desktop computing environment when outside the familiar work place. This paper proposes a system called VirtHome, which aims to present users with such a consistent environment, including customized software, personal data and other abilities on any computer attached to a TCP/IP network, enabling users to work anywhere as if...
Managing multiple projects is a challenge within many organizations because of current practices that ignore the basics of project standards and applications. Lack of standards and applications complicates the startup and initiation of projects especially in a multiple project environment. Knowledge is a critical asset to start and execute projects in many organizations. However, knowledge is separated...
How much service performance of searching and transmitting is provided by P2P network for a concrete resource? How much success ratio and recall ratio of resourcepsilas searching of existing P2P network is? Rare research is deepened about those questions. This paper, for unstructured P2P network, construct P2P network queuing model, provide calculating method of service performance of concrete resource,...
To achieve efficient image retrieval, this paper applied the five texture edge directions, including 0deg, 45deg, 90deg, 135degand nondirection, recommended by MPEG-7 standards to generalized co-occurrence matrix method. The new method firstly constructs five generalized co-occurrence matrices by computing the neighboring average of pixels in a fixed window in five directions respectively. And then...
Performance predictions from wireless networking laboratory experiments seem to dismatch what is really deployed. To generate realistic traffic is one of the major factors hampering researcherspsila ability to make reliable forecasts. This paper reports on the results of a multiscale analysis of traffic traces captured at an infrastructure 802.11g wireless network. The analyzed traffic is characterized...
Intrusion detection plays an important part in network security today. BP algorithm which is an algorithm in artificial intelligences can also be used in IDS. This paper make use of improved BP algorithm compared to the traditional one, the new algorithm brings us higher speed in constringency and more precise in detection .The new algorithm solves the difficulties of real-time system.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.