The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existing research of distributed provenance storage is at the preliminary stage. Most of the researchers are endeavor to improve the query efficiency of storage solution, whereas, very few people pay attention to the matching problem of provenance and data and the waste of storage space. Two aspects on the problem of provenance storage were proposed in this paper. First one is the relationship...
We present an innovative scheme for performing pattern recognition in wireless sensor networks. It is based on the concept of a distributed computer that can alter itself to adjust to the user's needs. By emulating the distributed nature of biological computational devices and evenly spreading the computational and communication workload throughout the network, we will reduce energy consumption and...
Personal Software Process (PSP) is a structured framework which aims to improve overall performance of software engineers in an individual level. PSP practitioners need to extensively collect their development data using specially designed tools. However, all currently available tools have limitations such as disruption and unstructured documentation. These unfortunates could subsequently reduce potential...
Basically, computers just deal with numbers. They can store letters and other characters by assigning a number for each one. Before Unicode was designed, there were found hundreds of different encoding systems for assigning these numbers. No single encoding could contain sufficient characters: As for example, the European Union alone requires several different encodings to cover all its languages...
IEEE-754 specifies interchange and arithmetic formats and methods for binary and decimal floating-point arithmetic in computer programming world. The implementation of a floating-point systemusing this standard can be done fully in software, or in hardware, or in any combination of software and hardware. This project propose VHDL implementation of IEEE-754 Floating point unit. In proposed work the...
Ternary number representation and arithmetic, based on the radix-3 digit set {-1, 0, ;1}, has been studied at various times in the history of digital computing. Some such studies concluded that we should abandon ternary in favor of binary computation. Others, demonstrated promise and potential advantages, but, for various reasons, including inertia, did not lead to widespread use. By proposing an...
With the development of the XML technology, it becomes more and more important to find a new method for efficient XML data management. In this paper, we propose a new approach (CCSU) that not only supports XML data update but also compresses the structure of an XML document. CCSU can decompose the path information and avoid the repeated information to reduce the labeling length. Moreover, CCSU supports...
Portable Document Format (PDF) documents are increasingly being used to disseminate files over the web. PDF is a file format that is independent of the application used to create it. In order to make such file format universally accessible, it needs to follow certain standards defined by W3C. Yet, not all PDF files are equally accessible, especially for blind people. Blind people confront many difficulties...
Utilizing Binary Signed-Digit (BSD) number representation in RNS arithmetic is called BSD-RNS. Up to the present, 2's complement BSD-RNS has been proposed. In this work, we utilize 1-out-of-3 encoding to represent residues in BSD-RNS. This paper proposes efficient modular multipliers for the moduli set {2n-1, 2n, 2n+1} based on 1-out-of-3 BSD number system. Compared to efficient 2's complement BSD-RNS...
In this paper, we report on an empirical study exploring the nature of mental models of spreadsheet authors when they are explaining and debugging their own spreadsheets. Study participants were first asked to explain one of their own spreadsheets, and then to find and fix seeded errors in the same spreadsheets. Talk-aloud protocols were collected and analyzed to reveal the nature of participants'...
Unicode font is the universally used coding system that provides a unique number of every character irrespective of the platform, program and language. The benefit of using Unicode fonts over ASCII fonts is that the Unicode fonts are visible in any computer system as well as in the web. ASCII and Unicode play the same role for English character coding system but for many languages including some major...
The elementary technology for video retrieval technique in computing is very sensitive to the user's query not to the contents of video. Every user has perspective to the video in the world of videos. So to identify this is difficult using text based video retrieval as this retrieval is based on text as processing input for video retrieval. The better approach for this video retrieval is content based...
Extract DTD documents rapidly by using pattern extraction method and eliminate the embedded ring in DTD by redefining the duplication name in document to solve the complex situation of which the embedded ring existed in XML document and the optimization scheme based on the interval encoding index can't solve. Map back DTD which eliminate the embedded ring to XML document, analyze XQuery query statement...
In our Operating Systems course we make available in advance the lecture slides and lab sessions material. The slides are built paying attention to present the key ideas and with embedded links to sites in the Web where the topic is covered in greater detail. We also provide the corresponding excerpts of selected textbooks. Following the download activity and paying attention on what our students...
This paper puts forward the function requirements of the tooth code system, and according to them describes a design that based on VC++ 6.0 and Access database. The system software can generate all the code combinations automatically according to the tooth stage head (the depth of the valleys on the key) and the number of teeth (number of the valleys) [1], and it also can remove the codes that you...
This paper considers the problem of secure symmetrical multilevel diversity coding. It is shown that a simple separate encoding scheme known as superposition coding can achieve the entire admissible rate region of the problem. Key to our proof is to establish a nontrivial conditional version of a subset entropy inequality of Yeung and Zhang, which was previously used to prove the optimality of superposition...
For the past few years, we have been developing the Exact Scientific Computational Library (ESCL) using P-adic arithmetic. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking the advantage of fast integer multiplication of modern computer architectures. By properly selecting prime numbers as the bases and practically choosing the length...
This paper deals with design of various controllers such as Proportional Integral Derivative (PID) controller, Internal Model Controller(IMC) and transfer function controller by using Genetic Algorithm(GA) for a non-linear liquid conical tank system. Level control of a conical tank is a complex issue because of the nonlinear nature of the tank. For each stable operating point, a First Order Process...
University examination timetabling problem is a complicated, multi-constraint combinatorial optimization problem. The current grouping genetic algorithm could get a better optimistic solution. Although the block encoding technique was applied in, the probabilities of crossover and mutation operation were still based on simple genetic algorithm. So the universality of this algorithm is not very well...
An infrared based test matching system hardware platform used for group psychoanalysis purpose is introduced in the paper. The platform is composed with more than 30 infrared transmit parts and one receive end, with a Microchip MCU as their processors. An innovative coding and decoding scheme is designed in this system, which shortens the IR code length and the wave circle period comparing to normal...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.