This paper proposes a method for gathering and extracting users' information based on Micro-blog, which is a new form of media. We design a crawler to gather users' list by Breadth-first traversal for Micro-blog, and gather the user details. At the same time the extracted user details will be storage in database. Finally, after collecting user list we extract the users' relations, so can obtain all...
In order to improve the performance of circuits, a series of benchmark circuits of IMB-PLACE 2.0 are analyzed with complex network theory. The results show that the large scale integrated circuits of IMB-PLACE 2.0 have both scale-free and small-world characteristics. According to the analysis results we proposed the optimization strategies of circuits, which is useful for circuits design.
Recognition of machining features from the solid model of product is the foundation of process planning, manufacturability evaluation and other downstream activities. In this paper, the method of feature recognition from the STEP file is studied. On the basis of analyzing the grammar characteristic, geometric and topological information in STEP file, the lexical analyzer is designed by using the object-oriented...
ART-2 is a self-organized and unsupervised artificial neural network which can recognize complicated inputting patterns. This paper presents a new structure aiming to discard small amplitude information during classifying the data by Standard ART-2 network, especially the time series data. So, we proposed an improved structure based on standard ART-2.Finally, the problem of “discard small amplitude...
Quality is the life of software, and people are paying more and more attention to its importance. This paper discusses the PDCA model theory on how to improve the software quality continuously; with the focus on the realization of the PDCA cycle's continuous improving the software quality, giving the application of PDCA cycle in software development practice by examples.
The rate-monotonic scheduling algorithm is a static scheduling algorithm for periodic tasks, but the classic rate-monotonic scheduling algorithm only determines the task's priority by its period, the deadline of long period and important tasks can not be guaranteed. Here, a new static scheduling algorithm called DPSS. The integrated priority tasks obtained by calculating the two parameters-running...
In order to satisfy the request for precise clock synchronization in industry Ethernet, this paper has conducted the research to the IEEE1588 high-precision time synchronization algorithm, carried on the elaboration to the principle of algorithm, proposed the corresponding improvement algorithm for asymmetric communication paths and got it verified. The results of test show that the improved method...
A path planning method based on hierarchical hybrid algorithm was proposed, which is aimed at the path planning features in urban road traffic. The method by analyzing and transforming the traffic restriction combines the ant colony algorithm and genetic algorithm. The ant colony algorithm employed at the bottom calculates simultaneously in a few of subnets for the local optimization, and the genetic...
A proxy blind signature protocol using quantum entanglement state for signature and verification was proposed, while nonorthogonal quantum state encoded proxy warrant message. The quantum key distribution and one-time pad encryption algorithm guaranteed the unconditional security and the message owner's anonymity.
We solve a class of nonconvex multi-objective programming problem with equality and inequality constrains using the homotopy method. We develop a new shifted cone condition and generate the homotopy equation. Under that conditions, we prove that for almost every point in the feasible region, a smooth and bounded homotopy path can be derived and that the algorithm converges to the K-K-T point of multi-objective...
Fuzzy C-Means is one of the clustering algorithms based on optimizing an objective function. The selection of the initial parameters of the number and the initial cluster centers play an important influence in the performance of the FCM. This paper proposes a new FCM clustering algorithm with two stages. The proposed algorithm not only resolves the problem of the initial choice of the cluster center...
The development of semantic web service depends on the ability of semantic interoperability, and ontology integration is the important means of implementing semantic interoperability, in which concept semantic similarity computation based on ontology is the key problem. In this paper, in view of the problem about the computation accuracy of semantic similarity, a novel approach to computing concept...
With the application of e-government becomes more and more extensive, the security issues become increasingly important. The paper firstly presents a relatively complete e-government security risk evaluation index system basing on comprehensive analysis of risk factors which affects e-government security. Then we conduct orthogonal transformation to the indexes for eliminating duplication between...
This paper proposes a new method to control lapping speed of the lapping machine properly, which may reduce lapping stroke and improve lapping accuracy and quality. In the beginning of lapping, the rotating acceleration of the lapping tool is controlled. It makes the acceleration increase from zero slowly. When lapping speed reaches a certain figure, inflection point of acceleration appears. Then...
According to high speed lapping technology with solid abrasives this paper develops a new high speed lapping machine. The high speed lapping technology and the machine are combined into one system through this lapping machine. By means of this way the high speed lapping technology is used in production widely and a very good result has been got. Comparing traditional lapping, by new machine the machining...
How to filter RSS news effectively and reasonably has become an issue to be considered. To solve the above problem, in this essay, a filtering model that adopts the combination of key phrases and Vector Space Model is proposed. This method preferably realizes personalized demands and does experiments upon the filtering system in detail. The result shows that the new model arithmetic has effectively...
In this paper, we consider a novel Three Hierarchical decomposition approach for Multi-Player Pursuit Evaders (MPPE) game. In multi-player pursuit evasion game, hierarchical framework is applied widely in order to decompose the original complicated multi-player game into multiple small scale games. In this paper, we first study the number of pursuers which necessitates; the capture condition and the...
Array-elements can fail during their operation and this can seriously degrade the pattern of low sidelobe array considerably if not replaced on time. So it will be very important for us to deal with this kind of problem in the application of array signal processing. Based on the estimation of time delay and linear prediction, the output data of failure element are estimated and then the beamforming...
Joint importance refers to the evaluation of the safety of the different combinations in a system. The JFI of pairs of components introduced by Hong & Lie,it is more useful for making this kind of tradeoff, since it indicates how components interact in determining system reliability. While the previous evaluation algorithm just focused on the structure of the system, neglecting the feature of...
In order to alleviate the shortage of maritime education teachers and realize resource sharing to improve education quality, an autonomous learning system based on topic map is designed to realize the organization of heterogeneous knowledge between different maritime disciplines. The system can provide network-based personalized knowledge learning navigation and make recommendations on knowledge learning...