The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this work, large Web applications are modeled using hierarchical profile use-case diagrams called UCTMs (use case transition models) with the concept of LC (logical component). Based on proposed UCTM, a system-level testing method is implemented through transferring the textual description of use cases into CDDs (constraint directed diagrams). The CSC (constraint scenario coverage) criterion is...
The short term flicker severity Pst is an important index of power quality in the standards of IEC. Usually Discrete Fourier Transform (DFT) is used to calculate Pst, due to the inherent spectral leakage and barrier effect of DFT lead to low accuracy of Pst, therefore a method to improve the accuracy of Pst is proposed in this paper, the corn of this method is that, using DFT and Discrete Fourier...
Sudoku, a simple and fun game of logic, has been used for steganography to conceal messages into a digital image recently. Chang et al. adapted the idea of smallest Manhattan distance, embedding secret messages into the neighbors of the located element according to a given Sudoku solution. Hong et al. improved Chang et al.psilas technique by introducing additional set of candidate elements to reduce...
Classification of intrusion attacks and normal network traffic is a challenging and critical problem in network security. Many classification methods for intrusion detection have been proposed, but there are few algorithms that are capable of distinguishing among the various attacks and normal connections effectively. This paper presents an effective intrusion detection algorithm based on conscientious...
Without explicit and formal semantic approach, data element is restricted in automatic data modeling and other application. The precise semantics for data element is supplied with ontology. Semantics factors of data element are analyzed at first. The concepts from domain ontology are considered as atomic concepts and are considered as semantic element concepts of data element. A structure called semantic...
Based on Discovery Feature Sub-space Model (DFSSM), this paper proposes a new web text clustering algorithm which characterizes self-stability and powerful antinoise ability. The definitions of cluster and distance measures in the concept space being given. It can distinguishes the most meaningful features from the Concept Space without the evaluation function. The application in the modern long-distance...
Service interface description is one of the most important problems in services-oriented software architecture, and formal description methods are considered to be a promising approach for service interface. Presently the typical Web service description language (WSDL) only provided the syntax level information that needed by the service interaction without containing the dynamic behavioral protocol...
Evaluation of water environment quality plays an important role in environment science. By analyzing the factors influencing multi-reach water quality, a RBF neural network model with water quality is developed using neural network theory and method. It is integrated into a software package using VB program. The software has a friend interactive interface, and someone not knowing artificial neural...
The contour precision of the micro-milling machine tool directly influences machining precision of workpieces. This article introduced the cross-coupling control approach applied in micro-milling servo control. Based on a novel miniaturized three-axis NC micro-milling machine tool, the cross-coupling controller was designed and used successfully. The simulation and micro-milling experiment results...
On the basis of the analysis of human visual system characteristics, combined with Watson visual model, an improved information hiding algorithm based on image DCT (discrete cosine transform) domain is proposed. By experiments and comparisons, the improved algorithm can enhance the imperceptibility of hidden information. In order to improve the anti-JPEG compression property of stego image, according...
Due to their dynamic topologies, providing quality of service (QoS) in wireless ad hoc networks introduces major new challenges to the research community. Now, the commercially available ad-hoc network products are those based on the IEEE802.11 Distributed Coordination Function (DCF). Cooperative communications fully leverages the broadcast nature of the wireless channel and spatial diversity, thereby...
In the real world concepts are often not stable but change with time. The underlying data distribution may change as well. The model built on old data will be necessarily updated. This problem is known as concept drift. Mining concept drifts is one of the most important fields in mining data stream. The paper presents a totally new gradual forgetting approach for mining concept-drift data stream....
Intrusion detection has become the important component of the network security. Many intelligent intrusion detection models are proposed, but the performance and efficiency are not satisfied to real computer network system. This paper extends these works by applying a new high efficient technique, named twin support vector machines (TWSVM), to intrusion detection. Using the KDD'99 data set collected...
One of the key problems for wireless sensor networks (WSNs) is how to make the best of limited energy. The conventional clustering method has the unique potential to be the framework for energy-conserving wireless sensor networks .In this paper, a novel dynamic clustering algorithm based on geographical location information(GL-DC)is proposed for WSNs. Comparing with other algorithms, GL-DC has two...
Through researching the patterns and mechanism of life behavior of some animals, a knowledge processing system with biologic action feature was suggested by this paper, and the autonomic and creative features of the system were described. Following the thought of artificial life, the system was based on the rules and features that come from investigating the intelligent actives and behaviors of some...
In this paper, a novel image fusion method based on steerable filter bank is proposed. The registered images are first decomposed using steerable pyramid. The EM algorithm is used to fuse the image components in the low frequency band. The selection method involving the informative importance measure is applied to those in the high frequency band. The final fused image is then computed by taking the...
To generate test cases for the unit testing of business process written in BPEL, developers have to prepare input data for the BPEL process under test (PUT) and verification conditions for output data from the PUT. It could be a tedious task due to the complexity of the PUT which describes the Web flow of a distributed collaboration of individual service providers executing concurrently. This paper...
XML has become a de facto standard for data representation and exchange over the Internet. With the emergence of more and more XML documents, the clustering of XML documents has become an active research area. XML documents lie between structured data and unstructured data which describe both content and structure, so how to effectively cluster XML documents is a huge challenge. However, most of existing...
The face is a complex multidimensional visual model and it is difficult for face recognition to develop a computational model. This paper, a novel approach is presented to face recognition, which combines Fast independent component analysis (FastICA) and Radial Basis Function neural networks. Firstly, in order to reduce the image data, low-frequency subband images are extracted from original face...
This paper presents an ERP system development platform ERP_DSS (Develop Support System) which is based on service components and can be reconstructed. It introduces the design and the implementation of the platformpsilas service process for editing environment in detail. The model resolver of service process is designed for the platform, and the automatic creating process was achieved from service...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.