The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We present some 4-point ternary interpolating non-stationary subdivision schemes. These non-stationary schemes reproduce functions spanned by {1, sin(\alpha x), cos(\alphax)} and, in particular, circles, ellipses and so on. Performance of the schemes are demonstrated by examples.
The self-assessment in autonomous computer-assisted language learning has been one of the most talked about issues over the recent years. A review of the literature enabled to generate 10 questions as questionnaire to investigate whether there was any change of opinions and attitudes toward the application of self-assessment in autonomous computer-assisted language learning in Southwest University...
The Team Orienteering Problem with Time Windows (TOPTW) is a combinatorial optimization problem arising both in industrial scheduling and in transportation. Ant Colony System (ACS) is a well-known metaheuristic framework, and many efficient algorithms for different optimization problems - among them the TOPTW - have been derived from this general framework. In this paper some directions for improving...
Debugging EDEVS based components using existing debug frameworks is very time-consuming for the following reasons: Firstly, EDEVS based components are self-contained and are independent of simulation applications, so test case must be designed and implemented beforehand. Secondly, Usually EDEVS based components are hierarchically composed of many subcomponents, so examine the data flow among all these...
This paper analyzed the relative data, compared them with female Nobel Prize winners, research on social characteristics of Chinese female scientific elites. The result shows that the work of geography, background and family are the important social factors of the Chinese female scientific elites.
In practice, introduction of a new service composition to service market will bring expansion of whole market, but also competition to service available of service integrator itself and its competitor in the same market. Therefore, we establish a model with two object, the first is to maximize benefit growth by introduction of new service composition with considerition of equilibrium price, the second...
CA new method of Chinese patent medicine pattern recognition based on Neural Network and prescriptions Expert System is presented. In this method, first, chromatogram experiments are done on a prescriptions preparation at uniform condition and then, peak separation of each group is separated and analyzed. Some possible traditional Chinese medicines are recognized over the use of fuzzy neural network...
Many routing protocols in mobile ad-hoc networks have been developed by many researchers. One of ad-hoc routing protocol types is the on-demand routing that establishes a route to a destination node only when required. However, most of on-demand routing protocols reestablish a new route after a route break. In this paper, we propose a new route maintenance algorithm to avoid route breaks because each...
BP neural network is used to recognize X-ray steel rope cord conveyer belt image with defect in this paper. Firstly, the model of three layers BP neural network is established, and it is made up of 240 input nodes, 20 hidden layer nodes, and 1 output node. Then, the BP neural network is trained and tested in MATLAB. The results show that X-ray steel rope cord conveyer belt image with defect can be...
A (t,n) threshold group signature scheme allows a singer to determine a (t,n) threshold strategy and only t or more signers of the group can sign messages on behalf of the group. Recently, Li et al. proposed a new threshold group signature scheme based on discrete logarithm problem, which is not only threshold-signing but also threshold-verifying. Unfortunately, their scheme are not secure, in their...
Image denoising by using the filter algorithm is a basic problem which we would meet during the image processing. The mean filter is normally used to reduce Gaussian noise, but it is not effective to the impulse noise. While the median filter is good for reducing the impulse noise but is not well-worked for Gaussian noise. Based on the idea of fuzzy logical, this essay proposes a new kind of filter,...
Based on the inherent characteristics of Information theory and Coding course, this paper probes into the existent problems in the process of teaching course, especially aiming at the information and computing sciences professional of our college. We point out some suggestions from teaching content , teaching methods and teaching form. Stimulate student's interest in learning to improve the quality...
With the popularity and development of the internet and computer technology, the types of network information changed, from text, graphics, image development to animation, audio and video. The method of processing network resources also updates. In this paper, we introduce the status of text representation and the representation methods of resource services of text network and multimedia network-JMF...
This selected topic is the sub-topic of the first Ministry of Science and Industrial Technology Innovation Alliance Item and Tianjin Science and Technology Projects. This paper introduces alkali concentration intelligent online detection and automatic control system. Design and implementation of hardware and software systems are also detailedly described. The paper's innovation about the project is...
For the poor condition of accessibility and varied deposition of the tidal beach, the basic information such as topography is hard to be retrieved, and it is difficult to monitor the change of the tidal beach. This paper takes the flat muddy area of the east beach in Chong ming of Shanghai as the typical research area, and takes Land sat TM image and the relevant data as the primary data source. Based...
With the development of China computer technology and social economy, the requirement to the quality, the fitness and individuation is higher and higher, and the present two-dimensional garment CAD technology has not fulfilled the requirement of CAD application in the garment industry, so the garment CAD urgently needs to be developed from the present panel design to the 3D design. Therefore, in recent...
In this study, a design methodology is introduced that blends the neural predictive and fuzzy logic controllers in an intelligent way developing a new intelligent hybrid controller has been achieved. In this design methodology, the fuzzy logic controller works in parallel with neural predictive controller and adjusts the output of the predictive controller in order to enhance system predicted input...
This paper describes the working principle of OPC technology, combined with incentive-type simulator working mechanism, and given the development method of OPC asynchronous communication and the concrete realization using Visual C + +6.0. Using memory-mapped file to set up real-time database for system running, through memory-mapped file to open shared memory area and to operate its data. This method...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.