The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of Internet, the efficient network management of heterogeneous network devices from different vendors becomes more and more difficult. The Network Configuration Protocol (NETCONF) is presented as a new solution. But it can't be widely used in current networks soon because most devices are based on Simple Network Management Protocol (SNMP) and Command Line Interface (CLI). Therefore...
In order to relieve the conflict between improving service quality and enhancing resource efficiency in Web proxy cache cluster, a new elastic Web proxy cache cluster-EWPCC is presented. Basing on the “on demand” characteristic of cloud computing, EWPCC could acquire resource from cloud when the Web cache system is overloaded and release unnecessary cloud resource after load down. In this way, using...
Because of the complex influencing factors, it is very difficulty to resolve the problem of large scale pillar extraction and goaf disposal in underground mine. Fortunately, with the rapid development of computational mechanics, numerical methods and computer technology, the feasibility of numerical simulation has become an important feature of the current rock mass mechanics. Accordingly, using the...
Water vapor is a highly variable parameter in atmospheric processes and it plays a crucial role in atmospheric motions on a wide range of scales in space and time. GPS technique has been widely used in retrieving precipitable water vapor. Firstly the article has retrieved precipitable water vapor of Qinhuangdao and Shijiazhuang stations by GPS technique. Then it has researched two aspects of precipitable...
This paper presents a novel approach for embedding a binary watermark into video frames based on the temporal difference and discrete wavelet transform (DWT). We embed a binary watermark in the most activity region which is obtained by the temporal difference in the approximate band at the first level of discrete wavelet transform (DWT) decomposition of video frames. Experimental results demonstrate...
Groups in joint operations simulation are extremely complex, and traditional individual-centered entity modeling technology can't meet the needs of joint operations simulation anymore. The development of groups' organizational structure model is the basis for in-depth study. Organizational structure models for multi-agent systems are not suitable for describing the organizational groups in joint operations...
Digitalization is one of the important symbols in the information society. The construction of digital libraries in universities is a product of the information society as well as the inevitable trend of the development of university libraries. After analyzing the developing status of digital libraries at home and abroad, the paper clarifies the significance of constructing digital libraries in universities,...
In today's highly developed academic society, universities have recognized the importance of having websites to be able to have right academic communications. On the other hand, students satisfaction of university websites shows to some extend university web success. The aim of current study is to propose universities website satisfaction model. The survey research was conducted among 270 university...
Using streaming media technology can effectively break the bandwidth bottleneck and make video/audio streaming over Internet smoothly. Based on the campus network facility and multimedia network classroom, this article use streaming media technology to form a network of teaching, analysis of the streaming media architecture, give a description of the system to connected and technical points, and make...
Why are n-player games much more complex than two-player games? Is it much more difficult to cooperate or to compete? n-player Cherries is the n-player version of Cherries, a two-player combinatorial game. Because of queer games, i.e., games where no player has a winning strategy, cooperation is a key-factor in n-player games and, as a consequence, n-player Cherries played on a set of rows is PSPACE-complete.
In this paper, four typical phenomena in the Integration of Information Communication Technology (ICT) into Curriculum were introduced and analyzed based on the specific cases of classroom teaching and the teachers' description. The reasons were deemed to be: the unclear guidelines, the lack of teachers' inner driving force, no form of the integration of ICT into curriculum from system point of view...
This paper proposes a framework for consolidating laboratory data by adopting an Enterprise Service Bus as a backbone for interchanging laboratory data between: medical instruments, the Laboratory Information Management System and the Hospital Information System. A laboratory test result is one of the major components in medical diagnosis and procedures. It can be used to plan a patient's treatment...
In order to improve the performance of the electronical system, pipeline is usually used in satellite microprocessors, Single Event Upset (SEU) is a main reason for abnormal working of computer system in spacecrafts. SEU is prone to induce error in pipeline and cause failure of the whole system. A continuous error correction pipeline scheme is presented in this paper. It can continuously perform fault...
According to the apple's growth distribution space and ecological characteristics, we developed a five-DOF articulated robot manipulator (including robot arm and its end-effector), which had redundancy to avoid obstacles and had metamorphic mechanism to reach targets flexibly. The real-time image is acquired from a camera with the installation method of Eye-in-hand and the apple's position will be...
Computer games that handle realistic environments are becoming more popular in the game market. Games that make use of natural environments such as the spreading of fire or the flow of water need to be very carefully designed. In order to produce a desired effect of fire or water, a designer needs to try and test map properties several times. There has been an effort to use genetic algorithm to find...
With the advent of Facebook and Twitter, people are demanding high-performance high-quality online multimedia systems where a large number of users can collaborate with each other. Incorporating these features usually results in the following issues: high bandwidth usage, lower interactivity, higher latency; and often, only low quality compressed multimedia content can be used. In this paper we present...
The problem of memory leakage in Java applications is researched in this paper. Our purpose is to find out the instances where the memory leak appears and to put forward the solutions to avoid it. Although the Garbage Collection (GC) mechanism can be regarded as the special Java function to release objects automatically by the garbage collector, the problem of memory leakage still exists in Java applications...
In this paper, we statistically analyze the application effect of Siyuan Web-based Instruction Support System, which has been used in Beijing Jiaotong University for more than two years, and point out its advantages in the teaching process as well as some matters need attention during its application. The way to effectively support teaching and learning, improve the information level of education...
With the development of society, more and more emphasis put on community safety, Community Safety Manager plays an important positive role in maintaining social safety and stability and the promotion of social harmony. Therefore, How to implement the innovative model of community management system, strengthening grass-roots development and democratic self-government building and improve the city economic,...
Some problems about the connectivity of wireless sensor networks (WSNs) are always important and difficult topics in research, especially the trade-off between connectivity and energy control. In this paper, we present a novel and effective method to calculate nearest neighbor nodes in three-dimensional WSNs using Poisson point field theory, which enables each node to find the kth nearest neighbor...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.