The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Parallel finite automata is an extended finite status machine and it is suitable for characterizing of concurrent and synchronization task. Based on the workflow modeling, this paper defines some concepts of PFA and describes table and diagram representation of node transition function and state transition function which are the main components of FPA. The former expresses static structure of PFA,...
Z Formal method not only can improve correctness and reliability of software, but also improve development efficiency. Although Z specifications have been widely studied in literatures, very little work is involved in definition and use of variables. This paper discussed on definition and use of variables by an example. Finally, it is applied to data flow analysis and data dependent analysis.
In this paper, we provide the degree reduction algorithm for negative degree Bezier curves. By the uniform parameterization of control polygons and the definition of discrete derivatives of piecewise linear functions, we prove that the degree reduced control polygons and their discrete derivatives converge in the limit to the original negative degree Bezier curve and its continuous derivatives.
A generic e-homework system, PDFeH, was proposed and prototyped to replace traditional paper homework electronically. With pre-created PDF form documents as templates, teachers and students can complete main e-homework phases using free Adobe Reader. That is, composing questions, entering answers, commenting and markup and grading, and viewing finally archived documents. Digital signatures are used...
The notion of sos-convexity has recently been proposed as a tractable sufficient condition for convexity of polynomials based on a sum of squares decomposition of the Hessian matrix. A multivariate polynomial p(x) = p(x1,...,xn)is said to be sos-convex if its Hessian H(x) can be factored as H(x) = MT(x)M(x) with a possibly nonsquare polynomial matrix M(x). The problem of deciding sos-convexity of...
This paper proposes an approach to locate the patched vulnerability by analyzing the differences between two versions of an executable file. The approach comprises two parts: finding the differences and auditing the differences. To find the differences, a heuristically method is presented to compute an isomorphism between two callgraphs, based on the definitions of similarity between functions, and...
This article bases on the transfer function of simulating system, raises a practical way to linear transformation of matrix calculation. The elements in matrix can come out themselves according to the value. It is fast and convenient, it is easy to adjust, it makes a certain contribution in the project of automatic control and signal processing.
In distance education, the elementary function of data management system is to handle the related data in network teaching in filtering, sorting and classification, and make it to be the useful information for management and decision-making. Through the analysis and comparison of the commonly used data management modes that mainly used for calculating the learners' learning information in network...
The construction of the initial structure for preimage attack of MD5 is proposed in this paper. With the help of ??divide-and-rule?? technique, the successful possibility of the construction is higher than 2-32. Our construction is based on the MD5 structure, the message modification technique which is improved from Wang's. Some related techniques such as the extential form of the signed difference...
In this paper we propose a technique to determine the decision thresholds in multi-bit distributed detection. Detection thresholds are required to quantize the acquired information from the environment to send them to a fusion center. In multi-bit detection, decision making is complicated and in most cases, methods based on simulation or Person by Person Optimizations are applied to find the thresholds...
It is the trend that business to business (B2B) has been becoming the mainstream of e-commerce. With more and more concentration on this field, however, recent research has not defined what the B2B Web site user satisfaction is and how to evaluate it clearly. Also, traditional scales, such as user information satisfaction (UIS), end-user computer satisfaction (EUCS) and customer information satisfaction...
In order to avoid free-rider behaviors and reduce the service requesters' malicious accesses in Web services, a kind of trust management based on feedback and time decay in Web services is presented in this paper. According to the service providers' feedback, honest accesses will be rewarded while dishonest ones will get punishment by such mechanism, which would effectively encourage the service requesters...
Ontology mapping has been widely used in ontology application, but the similarity calculation becomes a thorny issue in the process of ontology mapping. In this paper, the different elements of ontology are considered. Semantic similarity and concept similarity are integrated to get the ontology similarity. During the similarity calculation of the concept attributes, filter strategy is used to reduce...
A new algorithm for clipping a line segment in two dimension against a rectangular window is presented in this paper. The algorithm are different to the others of line clipping algorithms. This algorithm use the affine transformations (Shearing transformations) to transform the line segment and the window, which make the process of clipping the line segment very simple and avoid solving the equations...
Ontology definition is the base of ontology engineering, however, ontology definition currently seldom provides the accurate mathematical characteristics, namely, most of the ontology definitions cannot be described in a formal way, and the existing ontology definitions aren't complete enough. In this paper, it reviews and sums up the ontology definitions and the formal descriptions of ontology. And,...
In this paper, successfully we implemented 2-pass mesh warping algorithm by using Bezier curve for warping the images and various video effects that consists two passes. We obtained enchanting results on various images. Mainly its applications are remote sensing, movies and advertisements.
In view of the complexity, ambiguity and multi-factor of teaching evaluation, it is an important topic that classification is applied to the domain. In the field of classification, incomplete data is one of thorny issues. There have been many methods to deal with the problem in many studies. In the paper, the MVCM is introduced particularly. It fills these observations with incomplete data by constructing...
The similarity of E-cash and E-lottery was taken into account to have designed a secure E-cash-lottery scheme by using zero-knowledge proof and blind signature on the basis of applications of the traditional lottery. This E-cash-lottery is characterized with anonymity, double stake resisting, forgery resisting, traceableness and off-line. For lottery players, banks, and lottery delivery to infer the...
From the esthetic aspects of the users,this article mainly proposes the design method of the product form esthetic feeling that is based on the users' aesthetic levels. There are three levels to the users aesthetic feeling: The aesthetic feeling level X conveys the visual order and simplification of form, the Y aesthetic feeling express the product's purpose, function,the thought communication or...
Applying automatic summarization to search engine can make it easier for users to find out the content of the Web page. In this paper, the results of search engine are analyzed. On the basis of query keywords expansion, we propose a new summary approach which calculates the sentence weight utilizing the information of the distance between words. The results of experiment show that this method can...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.