This article describes and analyses the current situation about data integration of isomerous data platform, and puts forward isomerous data integration plan based on the adapter. In the article, I adopted the adapter technology to realize isomerous data exchange model, and enveloped the adapter function in Web service in order to dispose the adapter by the distributed computing way. The goal of isomerous...
Emotion recognition is one of the most important issues in advanced human-computer interaction today. This paper proposes The Simulated Annealing Genetic Algorithm to recognizing four emotional states from four physiological signals. The experiment shows that based on physiological signals, SAGA is feasible and effective.
This paper raises base-on wavelet neural network algorithm for ECG data compress, as to ECG data compression problem. The method achieved a high compression ratio of ECG data. The algorithm has generalization capability, fast convergence, having multiresolution and adaptive features, special ability to really extract. The results show: wavelet neural network compression algorithm adapts to ECG signal...
This paper introduces the the application on macro language of optical design software in special optical system, and designs the laser beam shaping system by Zemax programming language (ZPL). Firstly, the principle of Gaussian beam shaping is studied theoretically. And based on the law of conservation of energy, the relationship of coordinate transformation of an arbitrary ray in incident plane and...
For the heterogeneous database management system, the common method is used the XML document as the virtual Intermediary when realizing the information sharing. The disadvantage of this method is that the data is limited, the details of the implementation is complicated, and the information security is too low. By researching the Caché database technology, designed a new database management system...
For wireless mesh networks has no support infrastructure and shows a highly dynamic feature, routing becomes a key problem to be solved. Data packets are transmitted on a path that had least hops in AODV protocol. It couldn't consider the path stability. When the node of wireless mesh networks moved quickly and the path had short lifetime, the path recovery and routing again is caused. It is a lot...
Wireless sensor network (WSN) is a novel technology about acquiring and processing information. Data transmission can not work without routing protocol which is the base of network. Since WSN is a resource-constrained network, and particularly the energy is limited, the routing protocol must be energy efficient in order to prolong the lifetime of network. LEACH is researched and improved in the paper...
In this paper, the superiority of plug-ins on Eclipse platform is analyzed firstly. Based on the characteristics of Web Service, the JMS plug-in on Eclipse is then designed and implemented. The only need for developers is to configure some basic information about the plug-in. The plug-in can generate both the server and client code of Web Service afterwards. Then the developers are free from writing...
Existing collaborative filtering algorithms do not consider the change of user interests. For this reason, the systems may recommend unsatisfactory items when user's interest has changed. To solve this problem, by analysising and collecting user's information and behavior, proposed and established “user-page” matrix as a collaborative filtering algorithm interest matrix, and take the initiative to...
Wireless sensor networks are appealing to researchers due to their wide range of application. This paper proposes Variable Grid-quorum Pattern MAC protocol (VGP-MAC), an adaptive, asynchronous and low-latency MAC protocol designed for wireless sensor networks. VGP-MAC improves the pattern and timeslot schedule, which make nodes save energy by the proper sleep mechanism according to the nodes' own...
In this paper, a polymorphic viruses detection method based on neural network ensemble in the Windows platform is proposed. Our approach rests on an analysis using the Windows API calling sequence that reflects the behavior of a particular piece of code. Firstly, the system calling sequence of a program is extracted as eigenvector, and then bootstrap sampling is employed to generate several training...
Service Robot which includes all kinds of robots which can serve the human directly or indirectly is a new domain of the Robotics Investigation which appears in recent years. The Cleaning Robot depicted by this paper which gets illumination from the Bee forage not only expands the application scope of the wasp colony algorithm but also make the robot clean dunghill at different time and different...
Spatial database contains a great deal of topological and directional semantics. But traditional spatial data query methods didn't make good use of these high level semantics. To overcome this conceptual gap, this paper proposes a spatial data query method based on sketch using 9-intersection model and Deep-Direction-Relation Matrix. This method integrates direction relations and topological relations...
In order to overcome the shortage that RTEMS lacks effective software fault-tolerant mechanism, this paper proposes an approach to add a task fault-tolerant module into application service layer. Based on the task scheduling algorithm of RTEMS, the proposed approach achieves fault-tolerant function by arranging the rescheduling time of fault tasks, which can recover the tasks from transient faults...
A knowledge map is a vital tool for better knowledge management. While application of searching the content which user concerned in the website remains in the initial stages of development, website content management is a process of knowledge management and therefore suited to knowledge maps. This paper presents a knowledge map for the intelligentized content website. And in this work it constructs...
Aiming at the fact that the current method of designing elastic constrained mechanism in swashplate engine is deficient and the vibration noise is very large, a new method for optimization design of constrained mechanism is put forward based on back propagation (BP) artificial neural network and genetic algorithm (GA). Firstly the dynamics model of constrained mechanism-shafting in swashplate engine...
Based on the problem that the storage of data flow lacks structure and the data retrieval speed is slow in some disaster tolerance systems, a structured data storage and high efficient data retrieval model is proposed in this paper. In this model, the circular queue structure is used in the dynamic shared memory buffer pool, which has improved the storage efficiency of real-time data flow; the circular...
P2P is lack of immunity to several kinds of attacks because of his own characteristics of open and dynamic. So it is important to construct a safe and reliable trust model. In this Paper, the advantage of basing on JXTA to design and realize Peer Trust Service in P2P Network is firstly analyzed. Then, the method and approach to realize the service is illustrated in particular. Finally, a system prototype...
In view of special needs with novelty search; build novelty search retrieval with XOR operation. This retrieval technique can identify the novel of the science technical contents automatically, and give preliminary conclusions. Results obtained from experiments on experiment demonstrate that the proposed algorithm performs well and fast.
The second-order explicit Runge-Kutta-Chebyshev method(RKC) is an s-stage Runge-Kutta method designed for explicit integration of modestly stiff systems of ordinary differential equations. The method possesses extended real stability interval with a length β proportional to s2. Remarkable properties of the RKC method make it possible to select at each size the most efficient stable formula as well...