According to urban managing requirements an urban planning information system is designed using Struts as the presentation layer framework and Hibernate as the data layer framework architecture. This paper implements ...
详细信息
ISBN:
(纸本)9781424445189
According to urban managing requirements an urban planning information system is designed using Struts as the presentation layer framework and Hibernate as the data layer framework architecture. This paper implements the system with flexible component, XML and Java technology. It is introduced that the basic character of two frameworks with Struts, Hibernate and the technology of combination of them in this paper, the design of data persistence layer of the passenger transport information management system is discussed, Besides good practicability and high efficiency, this system is provided with the advantages of definite responsibility and rapid feedback. It is also characterized by its good expansibility and maintainability. Finally, using an example expatiates the implementation of hibernate persistence solution.
The importance of 2D geometrical figures recognition in virtual reality and computational vision was a long motivation for researchers. In this paper the figures recognition using a mobile agents technology is present...
详细信息
ISBN:
(纸本)9781424445189
The importance of 2D geometrical figures recognition in virtual reality and computational vision was a long motivation for researchers. In this paper the figures recognition using a mobile agents technology is presented. The 2D figures are represented with a graphical user interface implemented in Java. The Mobile Agents are used to extract information about geometrical figures drawn in the graphical interface and using this information to clarify what they represent. The users can design the figure on the interface and the application, using mobile agents, return the name of the figure, if there are recognized. A lot of geometrical 2D figures are visualized and recognized using mobile agents application.
Under the fully mechanized coal mining face contains many security features of unascertained, in this pallier, the selection of the most able to face the impact of the safety of people, machines, and environmental fac...
详细信息
ISBN:
(纸本)9781424445189
Under the fully mechanized coal mining face contains many security features of unascertained, in this pallier, the selection of the most able to face the impact of the safety of people, machines, and environmental factors as the evaluation index. Secondly, the definition of the unascertained measure indicators, and indicators of human, machine and environment factors in the security grading of the role of the size of the index's categorization weight. Thirdly, the unascertained security comprehensive assessment system is established based on the man-machine-environment factors. Fourth, the use of information entropy calculation, and machine, of environmental factors on the safety of fully mechanized coal mining face classification attribute weights. Fifth, the establishment of a comprehensive evaluation Unascertained system and the information entropy of combining fully mechanized coal mining face security evaluation model. Finally application of the model shows that the accuracy and applicability.
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireles...
详细信息
ISBN:
(纸本)9781424445196
The popularity of wireless communication networks makes them an attractive target to the creators of worms and other malicious code. Indeed, recently a number of worms designed specifically to spread via these wireless networks have emerged. Based on the epidemic theory, this paper proposes a general model which predicts how a worm propagates through a wireless ad hoc network. Then the differential equations of the model is presented and a necessary condition for worms to spread in these networks is derived, which may be useful in designing a secure wireless ad hoc network. Simulation results show that the process of worm propagation in these wireless networks is sensitive to the deployment density of nodes and the energy consumption of nodes. Therefore, our study can provide insight into deriving a general model to characterize worm propagation in wireless ad hoc networks. & copy;2009ieee.
Value Engineering (VE) is a hotspot both in academic field and in modern business. In order to explore a effective value engineering model for modern enterprises in China, this paper studied VE and its development, an...
详细信息
ISBN:
(纸本)9781424445189
Value Engineering (VE) is a hotspot both in academic field and in modern business. In order to explore a effective value engineering model for modern enterprises in China, this paper studied VE and its development, analyzed the problems existed in VE project as well as the deficiency in implementing VE, and proposed an integrated value engineering system-computer Aided Value Engineering System (abbreviated to CAVE), which was an intelligent system based on function & value analysis. Finally, this paper expounded the process of the system's designing and implementing based on UML and J2EE technology.
Natural Image Matting today, is widely used in various disciplines including media, animation industry, computer simulations for research etc. The process of estimating the foreground and background colors with proper...
详细信息
ISBN:
(纸本)9781424445189
Natural Image Matting today, is widely used in various disciplines including media, animation industry, computer simulations for research etc. The process of estimating the foreground and background colors with proper alpha mattes has been widely studied and satisfactory results have also been obtained. This paper deals with one such method where a rough estimate of alpha matte in RGB (Red, Green, Blue) framework is made and finally it is refined in the HSI (Hue, Saturation, Intensity) framework.
Risk can conduce to failure of software project, and make a loss for the enterprise. It is a focus topic for software engineering researchers. Developer turnover risk is a great risk at the process of software project...
详细信息
ISBN:
(纸本)9781424445189
Risk can conduce to failure of software project, and make a loss for the enterprise. It is a focus topic for software engineering researchers. Developer turnover risk is a great risk at the process of software project, yet, few scholars pay attention to it. We can use information entropy to measure effectively the uniformity of each subsystem. In this paper, we provided a quantitative measure model based on information entropy to measure developer turnover risk on software project. The more uniformly developers influence the project, the smaller the risk is. Otherwise, the core developer turnover will make a huge fluctuation to the project. We not only have analyzed the model rationality, but have provided a model case. And the data required in the model can be got in the company. The model is scientific and reasonable, which has been indicated in practice, and can be used as basis to control the turnover risk.
The concern of the intelligent transportation system rises and many driver support systems have been developed. In this paper, a fast method of detecting a traffic light in a scene image is proposed. By converting the...
详细信息
ISBN:
(纸本)9781424445189
The concern of the intelligent transportation system rises and many driver support systems have been developed. In this paper, a fast method of detecting a traffic light in a scene image is proposed. By converting the color space from RGB to normalized RGB, some regions are selected as candidates of a traffic light. Then a method based on the Hough transform is applied to detect an exact region. Experimental results using images including a traffic light verifies the effectiveness of the proposed method.
In this paper, we study the problem of constructing minimum cost multicast trees and computing multiple multicast paths. Due to the lack of redundancy in multi-path and multicast structures, the multicast routing prot...
详细信息
In recent years active reliable multicast protocols have gained popularity. However, the existing active reliable multicast protocols are based on receiver-initiated approach for loss recovery. Our approach, named DHA...
详细信息
暂无评论