Studying on the series resonance, we would establish a frequency Tracking model of first-order phase-locked loop and describe the realization of the model by the theory of phase-locked loop. With this model in the res...
详细信息
作者:
Chen, WanzhiComputer Department
Electronic Information Engineering College Liaoning Technical University HuLuDao Liaoning Province 125105 China
Based on the contradiction between supply and demand for engineering application-oriented talents, put forward the cultivation system of application innovative talents training in electrical and information science an...
详细信息
Sophisticated computer description based on interrelated object models are advanced stores of information to be collected and applied during various fields of activities. The authors of this paper studied some advance...
详细信息
ISBN:
(纸本)9781424441112
Sophisticated computer description based on interrelated object models are advanced stores of information to be collected and applied during various fields of activities. The authors of this paper studied some advancements in object models for the description of course related groups of objects. They discuss several issues from this area that are considered to be important for the future development of highly integrated course models in higher education. In this paper, an introduction to high level application of Internet technology for virtual computer based teaching and learning is given. Following this an integrated concept for virtual classroom is cited and evaluated. The main part of the paper discusses three issues, namely resources, possibilities for storage of results, and entities for flexible model description.
The rapid economical development as well as the economic globalization put forward new requests for the application-orientated talent cultivation. Zhejiang University of Science and technology deepen teaching reform o...
详细信息
This paper analyzes the computer network security features and the main threat, synthesis the firewall technology of current domestic and international, on the basis of various firewalls' principles, advantages an...
详细信息
A new method of fingerprint minutiae extraction was proposed. After acquired binary image, the ridges of fingerprint image were thinned, then ridge bifurcations were extracted as the key minutiae for recognition. The ...
详细信息
Based on probability, the paper recommends a new inference method for validating the trusted forensics. Using graph theory, the original data is formalized to abstract data, and is shown as some nodes in the graph. Th...
详细信息
Omni-directional and PTZ (Pan-Tilt-Zoom) cameras are useful for vision systems of various robots. However, these cameras have several disadvantages, including low resolution for target distance and dead angle of camer...
详细信息
With information technology and computertechnology becoming popular, they are more frequently used in various disciplines. Through research on system dynamics in systems science, this paper thinks that they can defin...
详细信息
engineering Project evaluation of bids issues are discussed in this paper, and in which the use of genetic algorithms are used in evaluation of excellences. This paper focus on the genetic algorithm in two important t...
详细信息
暂无评论