The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Operation and operator technologies used in new generation Geometrical Product Specifications (GPS) provide the necessary knowledge basis for digitization and standardization in verification process of geometrical products. This paper presents a framework of predicate-based operations which obtain features or values of characteristics, their nominal values and their limits. The knowledge about operations,...
Video is one of the most popular services in Internet. How to support large scale of streaming media transfer over the Internet has been studied in both academic communities and industry fields. VQM (Video Quality Monitoring) at the end point or in the network is necessary to improve customer's Quality of Experience (QoE). This paper first analyzes the requirements of VQM over the Internet. Then,...
High technology industry, a strategic leading industry in the national economy, has become commanding heights of today's world competition in comprehensive national strength. With the deepening extent of China's reform and opening up, the control of foreign investment on China's high technology industry has been also increasing gradually. It is used related statistical data of high technology industry...
Internet-supported creative learning is highly autonomous and has special demands for the sufficiency of the way of obtaining information. As an important way of creative learning, network media permits the learners to obtain information they need conveniently and immediately, promotes the personalized interaction of learners who conduct the creative learning and that of learners with their instructors,...
This paper studies the design of hardware system and implementation of program algorithm for emotion robot, then focuses on the specific of wireless communication subsystem and related key technique.
From the auto-start behavior of rootkit, this paper presented a rootkit detection mechanism based on the hidden registry information, and designed a Windows rootkit detection method based on cross-view. This method by comparing from the kernel mode and user mode enumeration of the registry information found the registry hidden items by rootkit, and then detected the rootkit. Finally, a representative...
As the rapid development of computer science technology, programs play an important role in our daily life. Given a loop program, whether it can finally terminate is crucial for software safety. However, its terminability is normally considered to be undecidable. In this paper, a particular type of program - univariate monotonic loop program is discussed, and by "Backward-Iteration approach",...
This paper presents comparison of the time specification performance between two controllers for an inverted pendulum system. The objective is to determine the control strategy that delivers better performance with respect to pendulum's angle and cart's position. The inverted pendulum represents a challenging control problem, which continually moves toward an uncontrolled state. The problem is to...
A wireless tracking and controlling the mobile robot using video capturing feature (VCF) for unmanned applications is presented. It is a wheel-based and Radio frequency (RF wireless communicated) is used for communication between controller and the robot. The available motions of the robot are forward, backward, right, left and the combination of these movements. Besides, a camera is built in the...
Formal method is an important approach for constructing the trustworthy software. Koch curve is one of the typical fractals graph. A non-recursive algorithm of Koch curve is proposed by employing PAR method and the strategy of developing loop invariant. This algorithm is verified formally. This paper achieves loop invariant of Koch curve with readable, efficient and reliable non-recursive algorithm...
In this paper, the classical fractal graph - Koch curve was generated with unitary regulation of L system in visual C++, and the regular fractal graphs, fractal trees and handkerchief curves which have typical fractal characteristics were generated by changing the elements of generation. The unitary regulation of L system is intuitively expressed by computer language, it can not only help to understand...
C language programming is most one of important basic curriculums for computer curriculum teaching in science and engineering college. The traditional paper test is used in this curriculum examination. In order to meeting reformation needs of C language programming teaching, a paperless examination system based on WEB has been designed, The functions of the examination management and the curriculum...
The complexity of graph homomorphism problems has been the subject of intense study. It is a long standing open problem to give a (decidable) complexity dichotomy theorem for the partition function of directed graph homomorphisms. In this paper, we prove a decidable complexity dichotomy theorem for this problem and our theorem applies to all non-negative weighted form of the problem: given any fixed...
Aims at some problems that exist in the current C language experimental problems in teaching, research and design of the C/S mode on the C language programming curriculum tests to the secondary system, better implementation of straightening out experimental teaching process, highlighting the main points of the experiment, it is able to effectively resolve problems of the experimental teaching.
The inter-language studies on the textual semantic accessibility scale (SAS) are a new branch of the computational linguistics and the present paper tries to statistically probe into the SASes in English, French and Japanese literature works sampled from the corresponding corpora. Firstly, six control groups are formed by the equidistant texts extracted every 10 pages, 5 pages, 4 pages, 3 pages, 2...
Pocket Data Mining (PDM) is our new term describing collaborative mining of streaming data in mobile and distributed computing environments. With sheer amounts of data streams are now available for subscription on our smart mobile phones, the potential of using this data for decision making using data stream mining techniques has now been achievable owing to the increasing power of these handheld...
Face to the actual demand of current society on applicational personnel training, according to the characteristics of the non-computer major students in private colleges and the personnel training objectives, we analyze in depth the problem in the teaching of current private colleges non-computer professional database course. Combined with years of teaching reform and a detailed study of the syllabus,...
With modern computer network technology as the primary means of financial information systems, financial management and development. The author believes that the network environment of financial system faces numerous risks on information technology and modern management level high demands. This article discusses the network security of the financial system, offers a range of preventive strategies.
Sealed storage and access control are the characteristics of USB KEY integrated with smart card, a kind of USB KEY-based approach for virtual assets protection is presented. Virtual assets of users are stored in the hidden partition of USB KEY which is not able to read out, it would be displayed on the screen of USB KEY after user's PIN verified. If a PIN is blocked, it must be reloaded, it is designed...
After the analysis of the working principle of WAPI, its security weaknesses are pointed out: it does not securely realize the goal of identity authentication and key agreement. According to the security weaknesses, the key agreement part is improved without changing the framework of WAPI. The improved protocol is not only SK-secure but also UC-secure, thus realizing identity authentication and key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.