The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Computer aided language teaching model for College English is considered and demonstrated in this paper. Based on the 5-year teaching reform experiment, the experience and data are mentioned and analyzed to confirm the effects of computer-based teaching model. The results of the teaching reform indicate that the new model is acceptable, feasible and effective in the process of College English teaching...
With China's continuous improvement in the degree of informatization, regions of the country have been covered by network, and a great deal of information network security issues have also been brought about. In this paper, firstly, the information security emergency response procedures and disposal system are proposed according to the comprehensive analysis of weak links in information security defense...
The liveness of Petri net models of parallel programs is a very important property. The existing analysis techniques take Petri net models as a whole to study properties, which is subject to the state explosion problem. In this study, we decompose a parallel program's Petri net model into multiple process subnets to study liveness preservation instead of taking it as a whole, which thus mitigates...
The modularization immunity neural network model is an intelligent solution to network security, but the function relationships among the neural network, immune algorithm and genetic algorithm in the model. By following biological mechanism, this paper builds up interaction functions and function systems among all the parts in the model, which leads to the organic combination among the neural network,...
Our study focused on the relative impact of faculty members' personal characteristics, computer self-efficacy, and attitudes toward the Internet on integration of electronic communication in teaching. By using survey methodology, data collected from 133 faculty members, who are from four different faculties at Istanbul Technical University. This study shows that computer self-efficacy in using the...
Cyber-Individual, with a short term 'Cyber-I', is a real individual's counterpart in cyberspace. It is closely related to human-centric computing ideology which focuses on placing human in the center of computing. The study on Cyber-I tries to re-examine and analyze human essence in the digital era. Cyber-I's vision is to create a unique, digital, comprehensive description for every real person being...
Information filtration is a kind of classical application of large-scale network content processing. It carries out filtration operation to successively coming information, remaining those information that meets users' demands and deleting those information that falls short of users' demands. Vector space model is one of its common classical models. This thesis made research and improvement on Vector...
Recently the reinforcement learning method is actively used in multi-agent systems. Because of this method played a significant role by handling the inherent complexity of such systems. Robotic soccer is a multi-agent system in which agents play in real-time, dynamic, complex and unknown environment. Since the main purpose of a soccer game is to score goals, it is important for a robotic soccer agent...
Strict Integrity Policy (SIP) of Biba model can maintain the integrity of data in computer systems, but it might deny some non-malicious access requests of subjects and hence decreases the compatibility of applications. An improved SIP with dynamic characteristics is presented, which can increase the compatibility of the software while keeping the integrity as well as SIP can. And the proof is also...
Parametric studies have been carried out for the quartic-polynomial regression problem demonstrated in the Genetic Programming (GP) v3 toolbox of Matlab. Many classification schemes and modeling issues are polynomial based. Every possible combination originating from all available options between the two genetic parameters namely ?elitism? and ?sampling? has been analyzed while keeping all other parameters...
As important access control policy on confidentiality, original BLP model was investigated in this paper. Its characteristic in lattice and shortcoming are analyzed. Then an extended BLP model with integrity is presented. The linear order trust level is used as integrity component with compound policy. The extension deals tranquility in BLP and dynamics in BIBA.
Recent technological developments made available various many-core hardware platforms. For example, a SIMD-like hardware architecture became easily accessible for many users who have their computers equipped with modern NVIDIA GPU cards with CUDA technology. In this paper we redesign the maximal accepting predecessors algorithm for LTL model checking in terms of matrix-vector product in order to accelerate...
In order to inspect the internal and external environment of software efficiently, more and more autonomic computing elements (AEs) are deployed in the autonomic computing architecture software, autonomic software for shorted, which usually causes a great resources waste. Based upon the queuing theory, this paper proposes a new model to process the software internal and external information, which...
With the advancement in computing and communication technologies, more tasks are accomplished effectively and efficiently using information technology as tools. Learning is one of such tasks. The research on how information technology assists an individual in performing tasks evolves to the theories of task-technology fit and technology-to-performance chain, as well as technology acceptance model...
Design of experiments is often used to better understand or improve the output measures of a simulation model. Traditional cuboidal and spherical designs have been effective when the factor input regions are known. However, often in practice, simulation models have additional stochastic constraints causing the input factor space to be restricted and irregularly shaped. This paper looks into several...
This paper presents a fuzzy multiple criteria group decision-making (FMCGDM) problem with the Technique for Order Performance by Similarity to Ideal Solution (TOPSIS) based on the new concept of positive and negative ideal solution. Triangular fuzzy numbers (TFN) among decision-making process are used to evaluate the weighted different alternatives versus various. Additionally, in this paper we compared...
In the field of natural language processing (NPL), sentence similarity computation has a wide application. The key of sentence similarity computation is to grasp the characteristics and the meaning of the sentence quickly and accurately. In this paper, we present a new and advanced sentence similarity computation model based on the enhanced Petri net, which is mainly for the Chinese sentence. The...
Diabetes is a common disease, and one in which the patient has to undergo many lifestyle changes. In this paper we propose a model in which fuzzy logic can be used to determine the amount of insulin to be dosed to a diabetic, without the person having to calculate the same every half hour. Such systems have already been proposed, and we have worked based on already existing papers. This system uses...
Emergency and crisis response such as appearing in large traffic accident management involves coordination of emergency and rescue services and police. The management of information is a complex task where decision support on site and distance management requires a well-founded understanding of the underlying processes. The Business Process Modeling Notation (BPMN) is used for encoding processes related...
Nowadays, intelligent interaction and multi-devices interaction have attracted great attention from researchers and industry, yet there are still no framework combining these two interactions together. We study this problem and present a feasible framework to solve it. This framework is based on multi-devices, and it combines interaction-data collecting, data managing and user modeling together. Furthermore,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.