The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper proposes the framework, modules, design and implementation of thesis management system based on specific thesis management mode. The system uses ASP.NET as front development tool, SQL Server 2005 as the background database tool, and based on B/S structure. The system includes these features, teachers submitting topics online, students selecting topics online, exchanges of teachers and students...
The school network as the important infrastructure plays many roles such as school teaching, research, management and foreign exchange, and so on. School network directly affects the security situation in the school's teaching activities. In the early stages of the network, security may not be prominent. With the deeply application, various data online in the school network will increase sharply,...
In this paper, Fuzzy probability of Ordinary events in ordinary conditions and Fuzzy conditions and Fuzzy probability of Fuzzy events in ordinary conditions and Fuzzy conditions were given, and by researching Complete Probability Formula of ordinary events, Complete Probability Formula of Ordinary events and Fuzzy events in ordinary partition and Fuzzy partition were also given.
In this paper, operation rules and conception of fuzzy numbers and a conception of fuzzy-valued function and integral are given. Based on which it define are given a cut sets and integral of complex fuzzy-valued function, and the property of integral fuzzy-valued function are discussed, some important conclusions are given.
On the basis of comprehensive analysis of existing buy site, it proposes a knowledge library structure of group buying websites, which profit model is based on membership, members' behavior. And providing support to the group buying site decision-making by using data mining technology to analyze the conduct of its members and to predicting further member's behavior. This study is not only extremely...
In the process of generating a surface model from point cloud data, a segmentation that extracts the edges and partitions the three-dimensional (3D) point data is necessary and plays an important role in fitting surface patches and applying the scan data to the manufacturing process. However, it is always difficult to extract the exact edge points because the scan data consist of discrete points and...
Experiment teaching or research can't be carried out on schedule at some schools and research institutions due to the lack of sufficient experiment instruments or other reasons. Virtual experiment technology could resolve the problem effectively, and would play an increasingly prominent role in modern teaching. This project designed and accomplished a series of aerodynamics virtual experiment software...
Given non-negative integers r, s, and t, an [r, s, t]-coloring of a graph G = (V (G), E(G)) is a mapping f from V(G) ∪ E(G) to the color set{0, l, 2, · · ·, k − 1} such that |f (Vi) − f(Vi)| ≥ r for every two adjacent vertices Vi, Vj, |f(ei) − f (ej)|≥ S for every two adjacent edges ei, ej, and |f(νi) −f(ej)|≥ t for all pairs of incident vertices and edges, respectively. The [r, s, t]-chromatic number...
The anonymity of the social networking sites makes the spreading of the electronic word of mouth be affected. In this paper, we studied the main effect elements in them, then in this article we do the classification and point out some factors are playing a role through trust based on the ability and goodwill, trust based on the system, trust based on the threat, trust based on the sense of belonging...
Through the profound research of the individual advantage and limit between the MPLS VPN and the IPSec techniques, a kind of safety campus all-in-one-card network solution, which is based on IPSec-based MPLS VPN, has been designed, and the IPSec-based realizing model also has been given. This solution have the advantage such as high-speed exchange, quality of Qos, easily expansibility and traffic...
The paper begins with discussion on Aspect-Oriented programming (AOP), including its concept, thought, development, and advantage in handling crosscutting concerns, followed by description of the theory of constraints. Furthermore, combined AOP with first-order logic language, a new method to detect the business constraints in requirement analysis is presented, which is simple and practicable, thus...
In the paper, we put forward a new concept of reverse characteristic matrix. We give the completion theorems and completion examples when the corresponding graph of the reverse characteristic matrix of the partial matrix is a block-clique.
The article introduces the structures of Information retrieval system and retrieval process, elaborate the classification of Information retrieval, describe the evaluation index of Information retrieval.
As segmenting the images containing the aircraft target, in order to clearly separate the target from the background, Segmentation Algorithm of Improved Adaptative Threshold Region Images has been put forth in this paper. Using the automatic threshold segmentation of images for many times, the part of Higher Grey Value in the images has constantly been stretching, contrast ratio has been enhanced,...
It introduces the association rules correlation theory in detail, and analysis the classical Apriori algorithm performance, makes the improvement to it. Before the natural connection to generate the candidate set, conducting a pruning process based on the concept lattice similarity, to reduce the number of connected set, thus to reduce the generation of candidate item sets size, to reduce the number...
In order to detect the intrusion in the system, the information fusion technology was applied into intrusion detection. First, the audit data based on host and network data based on net were trained all together by using SVM and classification were realized. Then the D-S evidence theory was adopted to complete decision fusion. The performance of intrusion detection system is improved greatly, false...
An advanced threshold secret sharing scheme to identify cheaters is proposed in this paper by using authentication codes. The performance of the scheme is discussed. The results show that in the scheme the valid shareholders not only can identify the impersonation of an adversary, but also are able to detect cheating of some valid shareholders. In particular one honest shareholder is able to detect...
The stability of discrete time systems with single and double state-delay was analyzed in this paper. Lyapunov function was constructed to get the system's stability, where the LMI (Linear Matrix Inequation) was applied to simplify Lyapunov function. And the conclusion was finally extended to the discrete time systems with multiple state time-delay.
The status of the remote monitor system is introduced and the composing and the principle of implement of the system are presented. Based on it, the function and the characteristic and each of modules of software and database design are introduced too. The system improves the performance and stability of supply power and reduces the times of power cut, it can forecast the possible fault through analyze...
In the present work, we provide a type of block extension method base on instruction list and ladder-diagram drawing structure. This new method not only can transform instruction list into corresponding ladder-diagram, but also can give corresponding error message while the ladder-diagram can not be transformed. By programming proving, the algorithm is simple, practical, and universal. Especially,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.