The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The problem of automatic modulation classification in the flat fading HF channel based on Watterson Model is considered in this paper. A novel classification algorithm, based on Feature-vector composed of 9 features of 4 categories, such as, the spectral lines of quadratic and quartic nonlinearities, is proposed. The probabilities of correct classification are provided which can achieve more than...
This paper presents a hybrid clustering algorithm based on density and ant colony algorithm, that to determine the initial cluster centers according to cluster objects distribution density method, and then use the swarm intelligence and randomness of ant colony algorithm to find that arbitrary shape of clusters, to avoid falling into local convergence, to get a relatively stable global optimal solution...
Aiming to redundant candidate itemsets and repeated computing existing in presented mining algorithms, this paper proposes an algorithm of fast mining frequent itemsets based on sequence number. To fast execute double search, the algorithm adopts two methods of generating candidate itemsets, one is down search that generating subsets of non frequent itemsets, another is up search that computing their...
For the existing disadvantage of Word Sense Disambiguation(WSD) research methods, we have analyzed the computability and computational complexity of knowledge Dictionaries with different structure, and chosen ??The Grammatical knowledge-base of Contemporary Chinese?? and ??the Semantic Knowledge-base of Contemporary Chinese?? which written by Institute of Computational Linguistics of Peking University,...
The image fusion is an extensively useful technology. This paper proposes a new image fusion algorithm using m-PCNN, which uses the firing frequency of neurons to process the image fusion in m-PCNN. Aiming at the result of image fusion being affected by neuron parameters, our algorithm is only dependent of the parameters VT and independent of other parameters. At the same time, the relations curves...
A novel detection method based on digital speckle correlation is proposed for the tensile test of sheet metal. Standardized covariance correlation formula is adapted according to the specimen's tensile deformation. Also a new calibration method employing specimen as the calibrate object is presented combination with edge detection techniques. Purposing to improve the accuracy and rates of correlation...
IT service providers face a great need to improve the quality of services by IT service management (ITSM) in highly complex IT Environments. This pressure demands a strong collaboration from both the external service providers and internal service providers. However, providers still lack the necessary support, in methodologies and tools, to achieve efficient collaboration strategies. This paper proposes...
Hospital Information Systems (HIS) based on relational database show more and more shortcomings, such as low response speed, high maintenance charge etc. The post-relational database Cache, using multidimensional array and bitmap index techniques, shows faster response speed, lower hardware costs and routine maintenance than relational databases. In this paper, we compare the performance of relational...
Scenarios are critical for requirement analysis and system design. In this paper, we present a lightweight framework for scenario elicitation from natural language requirements. First, the events are elicited from sentences using event templates. Then the elicited events are associated with event tree to constitute scenarios.
The current Internet era has begun change from "Available" to "Trusted." Building a trusted, secure and stabile Internet, can effectively protect the network information security and interests of users. The main purpose of trusted network is to improve network security and integrity. It is technically improving network security, the right remedy, the cure of the Internet security...
R-calculus is a formal revision calculus system which can formally deduce R-contraction. R-contraction is the axiom system's maximal subset that is consistent with the refutations by facts. In this paper, we prove that computing R-contraction for propositional logic is hard by two steps. Firstly, we prove that computing R-contraction is at least as hard as its decision problem. Secondly, we prove...
By analyzing current situation of digital educational information service system from perspectives of education users' needs and Educational informationization development, this paper proposes to construct theoretical framework model of this system and establish support service model and application path for digital educational information resource service and management, combined with multidisciplinary...
As a dynamic data processing method, Kalman filter is widely applied in deformation monitoring data processing. Kalman filter can effectively remove the noise to extract the real deformation information. It's a process of anticipation and amendment constantly. In the solution, a new state of the system can be got by the use of new observation values, and it is convenient to the real-time processing...
With the rapid development of Internet and Cloud computing, there are more and more network resources. Sharing, management and on-demand allocation of network resources are particularly important in Cloud computing. Platform as a Service (PaaS) is one of the key services in Cloud computing. PaaS is very attractive for schools, research institutions and enterprises which need reducing IT costs, improving...
Syslog audit acts an important role in keeping host secure. This paper studied Host-based syslog, and constructed a secure state model for host performing normally from the angle of anomaly detection. Through deep research on syslog protocol, a log collection tool was created for collecting remote or local host syslog. Because different segments of syslog imply different system information, the model...
By proceeding with the cultural information resources perspective and illustrating principles and techniques in details, this paper tries to reveal the profound relationship between trademark translation and cultural information resources, and to put forward proper solutions to some problems appearing in current trademark translation practice so as to make the best use of the function and the largest...
Based on service oriented infrastructures, there are many services that provide the same functionality but differ in quality parameters. An important issue for web services composition is how to select appreciates services from a set of alternatives with QoS features being considered. We define a Petri net model - WS_QPN to computer the QoS values of composite services. Since finding a solution for...
Under the guidance of the comprehensive RDSS, a new three-satellite high-precision RDSS/RNSS combination positioning method is proposed in this paper, which uses a special designed RDSS/RNSS satellite and the others RNSS satellites to determine user position. The key research focuses on its principle and intending performance and lifesaving application.
Simulation-based training is a cheap, safe and effective method for the learning of psychomotor skills such as flying. But it is still limited by the availability of experienced instructors. The combination of simulation and intelligent tutoring system can be a potential approach to solve this problem. After a brief review on ITSs in skill training, we can see that scenario-based intelligent tutoring...
This paper gives out the framework of active cartography of statistical map, includes the structures of cartography language of statistical map, cartography model base of statistical map and cartography knowledge base of statistical map. In addition to the framework, this paper brings forth the renew mechanism of cartography knowledge and the conversion method from Natural Language to cartography...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.