Petri Nets is a powerful mathematical modeling tool for system description and analysis, with which we can describe the relationship among entities efficiently. The present thesis puts forward the basic modeling of the distributed computer network - DNMPN based on Petri Nets. DNMPN implements the basic function of distributed computer network, and DNMPNT modifies DNMPN's repetitive forward problem...
Most of the incremental association rule mining methods must rerun through processed data and have not made the best of the given rules. In this paper we propose an incremental association rules algorithm, this algorithm applies artificial immune theory and takes advantage of the given rules produced by original data set. Based on the quickly response during the memory cell recognizing the antigen,...
In this paper, a new BP learning algorithm based on extended BFGS method is presented in order to get the solutions for some learning problems of traditional BP Neural Network, such as the slow rate of convergence and poor stabilization. Introduce the modified Newton descent method to the BFGS method which is used to obtain good variables. The single variable search, which the ordinary BFGS arithmetic...
A reverse engineering innovative design method is proposed in this paper. The core of this method is mesh editing, namely, blending the features from multiple objects together to construct a new model. Firstly, the parts of interest to users are divided from the existing meshes, then mesh fusion, and finally local deformation of the fused mesh is implemented according to some constraints. This method...
To measure semantic similarity between terms is an important issue in many research fields. In this paper, a new semantic similarity approach, which combines the intrinsic information content of the term and the location of the term in the directed acyclic graph, is presented. The approach first calculates the sub graphs of two terms based the directed acyclic graph, and then calculates the intersection...
In order to solve the rapidity and accuracy problems of Iris Location, a new Iris Location algorithm is proposed in this paper. Firstly, the algorithm uses the rectangular area where the pupil is to locate the centre and the radius according to the gray information of sclera, iris and pupil. Focusing on the boundary of Iris and sclera under complex noise, an edge detection threshold analysis method...
The design process of on-vehicle radio node is described in this paper which supports connections to MOST network and takes use of MOST intelligent network interface controller chip. The design process includes system design, hardware architecture and software architecture, and is verified feasible by real experiment. The innovations of the work described in this article are the use of a new generation...
The K-Nearest Neighbor Algorithm (K-NN) is an important approach for automatic text classification. In this paper, cluster was applied In order to overcome the disadvantages of the traditional K-NN algorithm. First Clustering was utilized in training set through an improved K-mean approach to select the most representative samples as cluster center. Then we compute the comparability between the testing...
To compare the difference between Zernike annular polynomial and Zernike circular polynomial, an approximate mathematic relationship between Zernike annular polynomial coefficients and SEIDEL coefficients is proposed. A new method is applied in comparing experiment. For real interferometric data of annular wave front, the SEIDEL aberration calculated in different ways is removed from the original...
This paper focuses on an interval parameter estimation of Bayesian Networks (BNs). Contrast to the point estimation used in most parameter learning algorithms, interval estimation algorithm (IEA) estimates the output nodes parameter of BNs with an interval estimation based on confidence level, it can raise BNs inference accuracy slightly as the prior knowledge is absence.
GPRS is one of contents GSM Phase2.1 standard realizing, it supports the IP protocol and the X.25 protocol, and therefore it can provide one complete correspondence solution based on the TCP/IP protocol. By discussing remote monitoring system of prefabricated substation based on GPRS, we achieve the technology solution of prefabricated substation remote monitoring system and develop at remote monitoring...
This paper presents a mixed H2/H∞ linear parameter varying state feedback control approach for a bank-to-turn missile autopilot design. A mixed H2/H∞ linear parameter varying state feedback control is proposed firstly. In a polytopic domain, linear matrix inequality conditions that depend only on the vertices of polytope are presented to make sure that the prescribed H2 attenuation level, H∞ attenuation...
This paper introduces the UML modeling, and then gives the basic steps of UML for software process modeling with regarding sales management of the modeling process as an example and then using UML visual modeling to approach realization process.
Due to the limitation of the firewall and intrusion detection system in the information security domain, intrusion prevention system (IPS) appeared. It is a new generation information security technology following the firewall and intrusion detection technique. It is also a secure product that protects the network and system in real time from attacking, and now becomes a hotspot of research in network...
At present, most studies on the communication are based on simulation, but any theory needs to stand the test of the physical environment. This paper implements the embedding of PID AQM algorithm in software router-IPCop in the communication test network. And the comparison of results from NS2 simulation and the communication test network proved that the embedding method was correct. The method of...
This paper researches on how to deal with the contents of the packets via the technology of netfilter on the router device. And this page mainly introduced the architecture of netfilter, the firmware of router, the method of netfilter programming and transplanting as well as the realization of the TCP packet's addition, deletion, modification, detection function. Finally, list an example of installing...
Software runtime state provides rich information to do various analysis of the system. However, the current runtime monitoring techniques entangle state fetching logic and corresponding processing logic, which limits the use of the state information and doesn't support information synthesizing either. In this paper, we proposed a runtime state fetching method which separates them. We designed a State...
In this paper, a selection sort method of test cases is presented that is according to historical datum from the test cases pools, statistical analysis of test cases based on defect severities and choose the order of test cases and then measure the efficiency by the formula to find the choice of test cases in testing process in order. Finally, the test case is given overall selection method in regression...
An effective method to generate integration system testing scenarios is proposes, which can solve the problem of concurrency. The method combined the state of integration system testing scenarios and the technology of computer support cooperative work, based on system analysis gives the use case diagram and the logical relations between different cases. Firstly construct the case active diagram (CADAG)...
Most of current researches about 3D model retrieval, one important part of multimedia information retrieval, are mainly in the shape-based way. However, their effects are not satisfactory. This paper proposes a semantic-based 3D model retrieval method which uses the semantic correlations among 3D models to assist automatic annotation and semantic classification. Firstly we measure each model's semantic...