The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Comprehensive information and contradiction of the curse of dimensionality is biggest hiden problem of the big data era. Discrete cosine transform (DCT) digital watermarking has always been the mainstream watermarking method, but the existing algorithms do not work well for high-dimensional nonlinear data; the indepth digital watermarkbelongs to nonlinear digital watermarking method, is has better...
This paper introduces the testing method of surface design and quality of Alias software for automobile AB column and roof. Based on the first analysis of the concept car surface, the basic conditions of the automobile a surface design, and then introduces the surface modeling method of automobile AB column and roof, modeling method according to the three view cast graphs or real photos, Bezier curve...
In order to guarantee the high level of network security and improve the user experience of the network, in this paper, we propose an effective network anomaly traffic detection algorithm. Firstly, six types of network features are used in our work, such as 1) Number of source IP address, 2) Number of source port number, 3) Number of destination IP address, 4) Number of destination port number, 5)...
The elastic component transmission belt was taken as research object, and forming process parameters was optimized based on response surface method and DYNAFORM. The method of central composite design was used to select process parameters of numerical simulation, the response value of forming height for transmission belt was obtained by numerical simulation, and the second-order response surface model...
By expanding and improving powerful open source crawler framework Heritrix, this paper directionally captures electronic product information and largely improves crawler's efficiency. Then, specialized vocabulary such as electronic product brand expands theme lexicon by JE word segmentation tool so as to become a characteristically specialized lexicon and improve query accuracy to a large extent....
In order to prevent campus theft incidents, campus intelligent security was put forward to solve campus security problems. At present, most security systems in campus are mainly video surveillance. In most cases, some measures are just as later view tool. In view of the above problems, campus intelligent security is selected as the main research object. On the basis of in-depth analysis of the Internet...
An enhanced VPN gateway is designed employing the architecture of dual ARM hosts + FPGA isolator in this paper. The ARM hosts routed IP packets. The FPGA isolator ferried packets between inner and outer networks of two ARM hosts, authenticated the input packets and signed the output packets, thus the non-confidential packets was isolated. The private protocol is used to build the mutual authentication...
It is a common problem for the every property sales enterprise that how to improve customer service satisfaction and enterprise sales performance by the information means. We design a kind of sale management system based on B/S architecture, which includes the estate management, building management, customer management, and sales management. In addition, least squares support vector machine is used...
In view of the current situation of the incomplete construction of the reliability of the entrepreneurial education ecosystem in colleges, and lack of the analyzing and evaluating methods on some of the reliable attributes of the college entrepreneurial education ecosystem from the theoretical level, it first clarifies the specific content of construction of the college entrepreneurial education ecosystem...
According to pattern design of western-style clothes, the related body data of 3D human scanner acquisition is adpoted to establish BP neural network model for intelligent design of clothin gdesign. The selection, input variable and data preprocessing of sample data in the model are regulated, and the number of hidden layer neurons in the model is determined through experiments. By training and simulation...
At present, rapid reconstruction of amounts of point cloud data is still scarce, so is for the time complexity and space complexity in current methods. This article puts forward an adaptive rasterizing-based triangular mesh reconstruction towards amounts of data simplification reconstruction for storage and transmission. Our measure improves the region expansion: first, macro-estimation method with...
This paper analyzes the processing principle of complex parts, explains the principle of the process route of the parts, the compensation of the tool radius and the processing method. The automatic programming method of the parts is put forward, and then the CAXA manufacturing engineer software is used for simulation processing and CNC automatic Programming, selection and optimization of parameters,...
This article integrates virtual reality technique with environmental artistic design, and applies computer technology to realize basic functions and some advanced functions in virtual reality system through constructing virtual reality simulation system of nationality. The cases are combined to illustrate specific steps and methods of artistic design in virtual reality. Through user's request analysis...
This article intensively discusses and studies related theories and problems of shopping APP interaction design from user's experience perspective. Through classical cases and practical design projects, it further proves functional easy-use and effectiveness centered by user's experience and based on interactive model. Then, with related theories in design psychology, behavior, design aesthetics and...
By using generalized regression neural network clustering analysis, effective clustering of five kinds of network intrusion behavior modes is carried out. First of all, intrusion data is divided into five categories by making use of fuzzy C means clustering algorithm. Then, the samples that are closet to the center of each class in the clustering results are taken as the clustering training samples...
With constant development in spatial information technology and intensive implementation in humanity science, related research results about the protection of urban cultural landscape heritage are deficient, so the digital protection has not been effectively realized. By means of analyzing status and contradiction in cultural heritage protection, this paper introduces definition and characteristics...
Aiming at the problems existing in the analysis system of Chinese and American gymnastics, this paper establishes a SPSS differentiation analysis model based on the difference of Chinese and American gymnastics analysis system. Deriving a new difference analysis function based on the minimum message length and with an estimation method of expected maximizing the parameters, the analysis model realizes...
Aiming at the situation that the cable trench of the pumped storage power station is easy to be struck by lightning, using ATP-EMTP electromagnetic simulation software, established high-voltage cable and secondary cable distributed parameter model, focus on the analysis of lightning strikes the high-voltage cables in the cable trenches, the electromagnetic coupling between the high-voltage cable core...
This study was carried out within the scope of an undergraduate thesis. To produce an Arduino based two dimensional plotter mechanical parts were collected, assembled and targeted mechanism was created. After the integration of the stabilizers into the mechanism that was created and the project framework is revealed in a healthy way, the hardware structure is completed by adding the necessary electronic...
The generation of robot task planning is a challenging issue in uncertain and dynamic real world. Semantic knowledge can be used to support the task planning of robots as a source of implied knowledge. At present, many literatures elaborate semantic networks, which integrate spatial information and semantic information, and use semantic knowledge to carry out robot task planning. Aiming at the demand...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.