The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Aquarium usually provides the visitors with pictures and some description of the fishes in the exhibition tank. In this paper, an intelligent fish recognition system using computer vision is proposed to help aquarium to educate people about the fishes in the tank. The designed system provides a convenient and friendly interface to help the users to retrieve the related fish information they are interested...
Decision-making structures are important building blocks in most of the software; however, it may be difficult to verify them because there are various input conditions and several paths causing them to behave differently. Test oracles are reliable sources of how the software must operate. The aim of the present paper is to study the applications of Artificial Neural Networks as an automated oracle...
This paper focus on continuous K-nearest neighbor (CKNN for short) query and propose a query method based on R-Tree and Quad Tree (QR-Tree) to support continuous K-nearest neighbor query for moving objects, in which the main idea is to use a QR-Tree to divide the static spatial space for the moving objects. In the interested region, it uses the QR-Tree and hash tables as an index to store the moving...
Gait recognition is of increasing interest recently. A gait recognition method using the temporal information of leg angles is proposed, based on the fact that changes of leg angles can reflect main trait of a man's moving. First the pendulum model is referred to for extracting leg parts, and least-square method is used for boundary fitting, to obtain the temporal information of angle about thigh...
The paper shows a working project that organizes a set of jobs to improve the learning of computer networking. It uses virtual machine to create a portable laboratory on which students do hands-on exercises anywhere. It first developed an ability indicator of computer networking. Then an online curriculum material is made and available on the Internet. Students are learning the computer networking...
Multithreading is a promising technique that widely used in general purpose processors to hide long latency events such as cache misses. This paper proposes an embedded processor design with multithreading support based on the OR1200 processor. The multithreaded OR1200 processor supports interleaved execution of four threads in a round-robin way. The hardware design is evaluated through RTL-simulation...
Frequency synthesizer is an important component part of a communication system, whose performance will directly affect the performance of equipment, especially on the sensitivity and selectivity of the receiver. The PLL frequency synthesizing technology, which develops fast recent years, has been the main design scheme of signal source, because of its performance advantage. Frequency synthesizer development...
Topic model is an increasing useful tool to analyze the semantic level meanings and capture the topical features. However, there is few research about the comparative study of the topic models. In this paper, we describe our comparative study of three topic models in the extrinsic application of topic clustering. The topic model distance is defined on the converged parameters of topic models, which...
This article briefly introduces the necessity and the current situation of the teaching of information technology in foreign language and bilingual in China. It mainly elaborates on the feasibility of this type of teaching from several aspects like the teaching staff, the students, the course books and the evaluation system. It is also mentioned that when this teaching is conducted, some problems...
This study proposes to analyze morphological characteristics of electroencephalogram (EEG) signals in order to define a representation of epileptiform events that can distinguish them from other events occurring in the signal. Despite the existence of several studies on parameterization of EEG signals, particularly for automatic detection of paroxysms related to epilepsy, it was necessary to create...
This article provides an overview of the application of certain soft computing tools namely, genetic algorithms (GAs), simulated annealing (SA), and artificial neural networks (ANNs) in certain tasks of RNA secondary structure prediction. Different tasks like prediction of helix, bulge, hairpin curve, internal loop, and multiloop are, first of all, described along with their basic features. The relevance...
Reputation of the entities is very important for other entities to evaluate the trustworthiness of them. This paper analyzes the efficiency of the query in different frameworks using differential methods. In centralized framework, there is a centre to store reputations and provide them to other entities, and the number of queries is only once for every query, so the efficiency is very high, but it...
According to the defects of the XCTD (Expendable Conductivity, Temperature, and Depth) Profiler low data transmission rate and reliability, a modem underwater data transmission system is introduced. The absolute phase-shift demodulated signal of the phase ambiguity problem is overcome by π/4-QDPSK, which is a linear narrow-band digital modulation technique and has high bandwidth efficiency, low bit...
In Service Oriented Architecture, Quality of Service (Qos) represents an important issue which is often considered when selecting and composing services. For receiving up-to-date information, non-functional properties can be continuously monitored using current methods. Because of the occurrence of monitoring at every time of service calling, the current methods imposes some overhead on the SOA. The...
In this paper, we present a machining time estimation algorithm for five-axis high-speed machining. and propose an algorithm based on five-axis machine behavior in order to predict machining time more exactly. first, it is needed to investigate the operational characteristics of five-axis machines. Then, we defined some dominant factors, including feed angle that is an independent variable for machining...
A retrial queue with general retrial times, a modified vacation policy and server breakdowns is investigated in this paper. We study the embedded Markov chain underlying the considered queueing system and its stable condition. By applying the supplementary variable technique, some analytical results for the system size distribution as well as some other performance measures of the system are derived...
In this correspondence, the dimension of tow-point codes on the quotient of Hermitian curves are determined by using an idea of Homma and Kim in reference.
At present, there exists attendance difficulty in universities in our country, which has relied on teachers' supervision of students. It cannot solve the problem completely, and wastes much lesson time of teachers. The subject uses the relatively mature technology to solve this problem, that is, uses RFID and digital image processing technology to track students, collect and compare the data information...
The assembly structure information model of part engineering drawing is proposed in this paper. By using extended entity data, the geometric graph of 2D view is labeled as functional surface. Then the functional surface which is attached topologically is decided according to the fact that whether they are in the common edge, have concurrent or point in the edge. The azimuth relationship and domain...
Chord has been widely used as a routing protocol in structured peer-to-peer overlay networks, but there is a lot of redundant information in the node finger table. This paper proposes a strategy that using the node's counterclockwise node information to replace the redundant information, the strategy uses the space effectively which occupied by the redundant information. This paper also proposes a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.