The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Traditional Chinese text chunking approach is to identify many phrases using only one model, and the same features are used to identify these phrases too. So the helpful features of each phrase are ignored. In fact, different phrases have different helpful features. In this paper, the concept of “sensitive feature” is proposed, and the sensitive features of seven Chinese types of phrases are selected...
Because of the complex influencing factors, it is very difficulty to resolve the problem of large scale pillar extraction and goaf disposal in underground mine. Fortunately, with the rapid development of computational mechanics, numerical methods and computer technology, the feasibility of numerical simulation has become an important feature of the current rock mass mechanics. Accordingly, using the...
Iris recognition, a relatively new biometric technology, has great advantages, such as variability, stability and security, thus it is the most promising for high security environments. Hence numbers of IRIS recognition algorithms are proposed, such as ICA (independent component analysis), SVD (singular value decomposition), Characterizing key local variation etc. which extracts iris features and...
Semantic Web applications meet a serious problem in practice: the shortage of semantic data (ontologies). Since the vast majority of data are still stored in relational databases, they are unavailable for the most next generation Web applications, such as Semantic Digital Libraries. Therefore, it becomes one of core challenges of Semantic Web whether applications can automatically retrieve semantic...
This paper discusses the security protection mechanisms of digital content, including digital encryption, copying detection, information hiding and digital watermarking, etc. Comparative analyzes the affiliation and difference among them. And take text for example, introduces the current research situation of various mechanisms in the security protection on digital text, explores the application and...
For multi-signal separation and frequency tracking problems, this paper conducted a study and simulation of PAST and Root-MUSIC algorithm, and then pointed out that: due to the signal noise and subspace approach method of PAST algorithm, the solutions may contain many disturbance items. The original Root-MUSIC algorithm can not effectively eliminate the disturbance. This paper presents an improved...
Water vapor is a highly variable parameter in atmospheric processes and it plays a crucial role in atmospheric motions on a wide range of scales in space and time. GPS technique has been widely used in retrieving precipitable water vapor. Firstly the article has retrieved precipitable water vapor of Qinhuangdao and Shijiazhuang stations by GPS technique. Then it has researched two aspects of precipitable...
The deterioration of worm propagation on internet in recent years has pushed the research in the field of worm defense, as a result there are coming up plenty of worm defense strategies. This paper refers to make the systematic study of the complete worm defense strategies and provide taxonomy of worm defense system strategies according to the key factors of each defense category. As guideline for...
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering privacy and confidentiality, etc. To describe the uncertainty in data, probabilistic approaches are widely used among other approaches. This paper gives a survey study on some probabilistic...
With the popularity of Extensible Markup Language (XML) as the new standard of data exchange on the web, a large number of data sources are represented or encoded in XML format. Therefore, querying and searching XML data on the web has attracted much attention in the database literature. The new emerging Peer-to-Peer (P2P) computing model has fueled the autonomous data sharing over the Internet in...
The applications of three dimensional WebGIS systems are currently receiving growing interest from researchers with various backgrounds. In this paper, we will discuss about some new trends as well as prospects of these applications in the future. We also exemplify one operation attached to the spatial analysis- oriented WebGIS-3D system which is considered to be one of the most striking trends above...
Wireless sensor networks consist of various sensor nodes which operate in a memory, energy and bandwidth constrained environment. Target tracking is an important application in wireless sensor networks and in this paper we propose an energy aware target tracking (EATT) algorithm. Energy efficiency is obtained due to the novel concept of tracking being performed in a collaborative manner by different...
With the rapid development of virtualization technology, virtual machine (VM) is widely used by cloud computing - the more and more popular computing paradigm. Thus, in order to guarantee the security of cloud computing, it is necessary to securely identify the kernel of VM, the software stack running on VM and the hardware platform which VM relies on. This paper designs a system of trusted connection...
Software quality is evolving beyond static measurement to a wider scope of quality definition. Previous studies have indicated the importance of human aspect in software quality. But the quality models have not included comprehensively this aspect together with the behavioural aspect of software quality. This research has proposed a Pragmatic Quality Factors (or PQF) as a software quality measurement...
This paper presents an improved LSB matching steganography, which complementarily modifies the pairs of pixels with adjacent intensity to embed secrete message. In LSB matching steganography, when adding or subtracting one from the cover image pixel, two adjacent bins of the histogram will be altered-the bin value of the modified pixel's intensity increased by one, and one of its adjacent bin's value...
We propose the ontology-based inference rule for an experience media authoring system. The experience media lets people feel realistic while satisfying the five senses. The experience media means the media recreating more realistic situation by utilizing various peripheral devices in addition to audio-visual contents. The proposed ontology has advantages in producing the experience media by defining...
The statement of Multi-Agent technology is to solve the complex distributional real world problems, and develop the large-scale smart software system, which is in the dynamic and indefinite environment, vigorous and healthy. The intellectualized management experiment platform is an effective tool to enhance the organization's decision scientific nature, the accuracy and highly effectiveness, save...
Image can be parsed into two main categories of representation: structure shape and region texture. In this paper, the parallel multi-regions image restoration system is proposed in order to ensure the real-time application. This system is implemented on a dedicated cluster. With different number of regions, PMR system is executed on the same original image in order to obtain the best restoration...
Webpage keyword is widely used in personalized search and recommendations. The accuracy of keyword is significant to the quality of search and recommendation result. Current keyword extraction methods' accuracy is not high. In order to make up for the shortage of present technology, a new keyword weight adjusting schema based on Domain Repository has been proposed in this paper. Three steps: 1) Extract...
This paper proposes an efficient ubiquitous teaching and learning model in Economics and Management Specialty of the University. Recent educational environment is growing to ubiquitous learning (u-Learning).This paper analysis the current condition of the u-learning model applied with modern information technology that used in the field of economics and management experimental teaching, and points...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.