The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The paper proposes the framework, modules, design and implementation of thesis management system based on specific thesis management mode. The system uses ASP.NET as front development tool, SQL Server 2005 as the background database tool, and based on B/S structure. The system includes these features, teachers submitting topics online, students selecting topics online, exchanges of teachers and students...
To ensure the normal production, it is necessary to have a safety inventory as a buffer. Safety inventory is mainly affected by the following factors: the expected customer service, the mean value and standard deviation of the lead time, the mean value and standard deviation of demand. We build a system dynamics model to analyze impacts of the several factors above on the safety inventory. We design...
The school network as the important infrastructure plays many roles such as school teaching, research, management and foreign exchange, and so on. School network directly affects the security situation in the school's teaching activities. In the early stages of the network, security may not be prominent. With the deeply application, various data online in the school network will increase sharply,...
One key idea in software reuse is domain engineering. As the high development of software, it makes integration of knowledge and sharing more difficult among departments within a domain. This paper we research on ontology-based domain engineering and extend it to emergency, and then we model Emergency Event Ontology as the top-level ontology. The application in Earthquake system proves the efficient...
In this paper, Fuzzy probability of Ordinary events in ordinary conditions and Fuzzy conditions and Fuzzy probability of Fuzzy events in ordinary conditions and Fuzzy conditions were given, and by researching Complete Probability Formula of ordinary events, Complete Probability Formula of Ordinary events and Fuzzy events in ordinary partition and Fuzzy partition were also given.
In this paper, operation rules and conception of fuzzy numbers and a conception of fuzzy-valued function and integral are given. Based on which it define are given a cut sets and integral of complex fuzzy-valued function, and the property of integral fuzzy-valued function are discussed, some important conclusions are given.
On the basis of comprehensive analysis of existing buy site, it proposes a knowledge library structure of group buying websites, which profit model is based on membership, members' behavior. And providing support to the group buying site decision-making by using data mining technology to analyze the conduct of its members and to predicting further member's behavior. This study is not only extremely...
In the process of generating a surface model from point cloud data, a segmentation that extracts the edges and partitions the three-dimensional (3D) point data is necessary and plays an important role in fitting surface patches and applying the scan data to the manufacturing process. However, it is always difficult to extract the exact edge points because the scan data consist of discrete points and...
CATIA, as the main design software of the flight simulator display system, can complete the structure design of display system; find the rationality of structure design by the virtual assembly; do some appropriate changes to achieve the optimal solution.
Experiment teaching or research can't be carried out on schedule at some schools and research institutions due to the lack of sufficient experiment instruments or other reasons. Virtual experiment technology could resolve the problem effectively, and would play an increasingly prominent role in modern teaching. This project designed and accomplished a series of aerodynamics virtual experiment software...
An analysis methodology to determine heavy metal emission based on the whole product process was developed. In this article, the smelting technology and the raw materials components of the secondary copper smelting were introduced to analyse the amount of lead waste the site create per year. The balance of lead element gave the kinds and quantity of the waste including lead element clearly. The dust...
In order to satisfy the requirements of the government officials of small towns for handling official business on the spot in country area. A small town e-Government system based on Wireless communications technology, Global Positioning System (GPS) technology and Embedded Development Technology was developed. The system can run at the mobile equipments, such as Personal Data Assistant (PDA), intelligent...
Building a self — adaptive framework which based on the policy library implementation, the most basic and important is how to build a reasonable structure policy library model to optimize the performance of the overall framework. We discuss a adaptive policy library construction algorithm FCART which based on the CART-binary decision tree growing algorithm. Against the dynamic characteristics of actual...
According to the vehicle radar antenna pedestal turntable usage, this article analyzes and compares the structure characteristic of welding and casting. We decide to adopt the welding structure and use special welding structural form. Based on the turntable of using conditions, we analyze the deformation and stress of turntable by the finite element analysis software. The maximum deformation is 0...
This paper analyses the deficiency of SVM-RFE feature selection algorithm and puts forward a new feature selection method combined with SVM-RFE and PCA. Firstly, we get the optimal feature subset through the method of cross validation based on SVM-RFE. Then, we use the PCA method to analyse the main component about optimal feature subset and get a lower-dimension and independent data sets which are...
In this paper, the almost periodicity and pseudo almost periodicity are generalized to n-dimensional space, and their properties are considered. Applying the properties we get, and the contraction fixed point theorem, we prove the existence and uniqueness of the pseudo almost periodic solutions to the nonlinear n-dimension heat equation.
Aiming at the current situation of hydrological monitoring, integrating with the application of internet of things in hydrological monitoring area, to realize automation of hydrological monitoring, the system for hydrologie monitoring based on internet of things is designed. This system is constructed with internet of things technology, software technology, evaluated network technology, etc. The system...
Since the present algorithms are on the assumption of correct beacon information, when the network is attacked, especially the beacons are captured by opponents, all algorithms will not work. To address this issue, one attack-resistant nodes localization algorithm we call VDV-Hop(Voting DV-Hop) which is on the basis of DV-Hop algorithm and based on the voting mechanism is presented. This algorithm...
Given non-negative integers r, s, and t, an [r, s, t]-coloring of a graph G = (V (G), E(G)) is a mapping f from V(G) ∪ E(G) to the color set{0, l, 2, · · ·, k − 1} such that |f (Vi) − f(Vi)| ≥ r for every two adjacent vertices Vi, Vj, |f(ei) − f (ej)|≥ S for every two adjacent edges ei, ej, and |f(νi) −f(ej)|≥ t for all pairs of incident vertices and edges, respectively. The [r, s, t]-chromatic number...
The anonymity of the social networking sites makes the spreading of the electronic word of mouth be affected. In this paper, we studied the main effect elements in them, then in this article we do the classification and point out some factors are playing a role through trust based on the ability and goodwill, trust based on the system, trust based on the threat, trust based on the sense of belonging...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.