Through the analysis of Chinese undergraduate practice innovative ability training mode based on off-campus high-end practice teaching environments, the existing problems in innovative talents training process in Chin...
详细信息
Despite (i) the recognized benefits of using ontologies in semantic EAI initiatives, (ii) the benefits of using foundational ontologies for promoting meaning negotiation and common understanding, and (iii) the importa...
详细信息
It is important to discover common movement sequences and uncommon behaviors during the migration of wild birds. In this paper, we propose a new approach to analyze the GPS location history data of migratory birds. Th...
详细信息
With the fast development of logistics industry, logistic tracking services has drawn more and more attention around the world. However, conventional logistics systems are difficult to provide efficient and whole-rang...
详细信息
ISBN:
(纸本)9781629932170
With the fast development of logistics industry, logistic tracking services has drawn more and more attention around the world. However, conventional logistics systems are difficult to provide efficient and whole-ranged logistic tracking services for customers. In this paper, we design and implement a cloud computing supported logistics tracking information management system to support whole-ranged and real-time logistics tracking services. The proposed solution is based on technologies related to cloud computing and a few Internet of Things technologies such as two-dimensional code scanning and identification, GPS location and image recognition. The main technical issues in our proposed system model include security management, logistics vehicle management, user management and location information management. Through the implementation and evaluation, we show the feasibility and efficiency of our proposed solution.
Security issues like service misuse and fraud are emerging problems of SIP-based networks. To devise effective countermeasures it is important to know how these attacks are launched in reality. Multi-stage attacks to ...
详细信息
ISBN:
(纸本)9781479914449
Security issues like service misuse and fraud are emerging problems of SIP-based networks. To devise effective countermeasures it is important to know how these attacks are launched in reality. Multi-stage attacks to commit Toll Fraud are already known in principle. We have identified different variations in these attack patterns by analyzing over 25 GByte of SIP attack traffic collected in our SIP Honeynet over a period of three years i.e., from December 2009 to November 2012. Based on this analysis, we have developed a Generic Attack Replay tool (GART) which allows replaying samples of the major attack variants in arbitrary network setups. This tool can be used for evaluation of detection and mitigation components where realistic and reproducible attack traffic is needed. The tool described here and the sample database will be made available to interested groups.
Cu2Pt core-shell nanoparticles with different Cu/Pt ratios were supported on multi-walled carbon nanotubes(MWCNTs),and used as electrocatalysts for *** morphology of the electrocatalysts samples were characterized b...
详细信息
Cu2Pt core-shell nanoparticles with different Cu/Pt ratios were supported on multi-walled carbon nanotubes(MWCNTs),and used as electrocatalysts for *** morphology of the electrocatalysts samples were characterized by XRD and *** was found that the Cu2Pt/MWCNTs catalyst exhibits a core-shell *** CV and LSV results demonstrated that such core-shell materials exhibited attractive electrocatalytic *** specific electrochemically active surface area(A) of the Cu2Pt/MWCNTs catalyst was 66.5m·g which is higher than the reported values in the literature.
This paper introduced a method of background subtraction model for detecting vehicles in video,the model was based on the framework of the kernel density *** compute the adjacent frame subtraction on the spatio-tempor...
详细信息
This paper introduced a method of background subtraction model for detecting vehicles in video,the model was based on the framework of the kernel density *** compute the adjacent frame subtraction on the spatio-temporal by the median filter,when the median value is 0,keep the background pixel value of the point stable,and still use the pixel value of the previous frame of the background to speed up the processing,when the value is not 0,using kernel density estimation to compute the probability,and determine whether update the background pixel value or *** histogram to show the statistics of the probability distribution,and find out more accurate threshold of the background *** solve the problem of deadlock,update the background automatically in a certain period of *** experiments show that this method can segment the moving vehicles rapidly and accurately from the video.
Nowadays, the companies must adapt their business processes changing more dynamically in accordance with rapidly changing market conditions and IT systems. This paper extends our previous method, which shows a novel a...
详细信息
Nowadays, the companies must adapt their business processes changing more dynamically in accordance with rapidly changing market conditions and IT systems. This paper extends our previous method, which shows a novel approach to integrate a service system. In this paper, we focus on the integrated problems of the Business Process Management System(BPMS). The service is encapsulated as a SCA service component,which is extended to be a service surrogate. Meanwhile, the XML-based process template is used to define the composition process. An interactive access control strategy based on service components is also proposed. At the end of this paper, it is applied in the textile-order process management system(TPMS) as a case study.
In order to enhance the guide of project development for students in practice of teaching, and to make software development more scientific and effective, this paper, in combination with the research orientation - the...
详细信息
ISBN:
(纸本)9783642112751
In order to enhance the guide of project development for students in practice of teaching, and to make software development more scientific and effective, this paper, in combination with the research orientation - the practice of computer software development, uses the dialectical perspective to discuss the historical change of object, subject and technology of software developmenttechnology. It concludes that software models are changing from mechanical theory to organic theory, main body of technological from machine-centered to human's activity-centered and that humanized human-machine interfaces of software development are becoming a trend. So we summarize that the education of computer science and technology should keep up with the pace of software technologydevelopment, and emphasis on professional development.
Relying on a professional group of traffic safety and intelligent control, to use real project as the carrier in computer curriculum development. The paper described the process of project carrier selection, cutting a...
详细信息
ISBN:
(纸本)9783642112751
Relying on a professional group of traffic safety and intelligent control, to use real project as the carrier in computer curriculum development. The paper described the process of project carrier selection, cutting and transformation. Then we elaborated on different professional teachers in the same professional group how to jointly develop courses. Finally, the learning scenarios of the course are determined. This curriculum development approach promotes the professional group development, helping to train computer science students that not only understand technology and familiar business.
暂无评论