Fuzzy set theory, which is used to deal with imprecise probability by computer. In the article, the fuzzy set theory applied to EMS, and study on fuzzy database selection to make fuzzy problems of the system more prec...
详细信息
ISBN:
(纸本)9781424455379
Fuzzy set theory, which is used to deal with imprecise probability by computer. In the article, the fuzzy set theory applied to EMS, and study on fuzzy database selection to make fuzzy problems of the system more precise, identifY the expression of fuzzy words and fuzzy membership functions, construct fuzzy selection, and to achieve a fuzzy selection.
Though water pollution control and prevention technologies have made a great progress, most polluting enterprises even have never heard of them, not to mention use them. So we design an technologies sharing model base...
详细信息
ISBN:
(纸本)9781424455379
Though water pollution control and prevention technologies have made a great progress, most polluting enterprises even have never heard of them, not to mention use them. So we design an technologies sharing model based on information Grid, and focus our discussion on the process of searching and invoking the wanted technologies with mobile agents.
Electron countermeasure plays an important role in modern military affairs. Especially infrared decoy is one of a popular passive jamming, that visual simulation becomes a hotpot. Having analyzed infrared decoy39;s ...
详细信息
ISBN:
(纸本)9781424455379
Electron countermeasure plays an important role in modern military affairs. Especially infrared decoy is one of a popular passive jamming, that visual simulation becomes a hotpot. Having analyzed infrared decoy's characters, the whole process is divided into four phases to research. For each one, mathematics model is built based on aerodynamics, and visual simulation method is produced based on computer graphics and image technology. The result shows good fidelity and realtime.
the determination of ieee 802.11 protocol behavior against various scenarios is important, Therefore we offer two scenarios that how corrupted frames are effected on inter frame spaces and its adverse effect impact on...
详细信息
ISBN:
(纸本)9781424455379
the determination of ieee 802.11 protocol behavior against various scenarios is important, Therefore we offer two scenarios that how corrupted frames are effected on inter frame spaces and its adverse effect impact on efficiency and fairness are explained. Finally, a simple and efficient solution is provided, which in addition to solving those problems it doesn't show side affects on previous famous scenarios. Results from simulation experiments reveal that the new algorithm achieves higher throughput.
in this paper, based on the in-depth research of existing 3D modeling algorithms, a new graphical 3D modeling visualization algorithm is proposed. This algorithm can use relatively smaller images demand to generate 3D...
详细信息
ISBN:
(纸本)9781424455379
in this paper, based on the in-depth research of existing 3D modeling algorithms, a new graphical 3D modeling visualization algorithm is proposed. This algorithm can use relatively smaller images demand to generate 3D model with higher precision, thus the efficiency of the 3D modeling realization will be greatly improved. Moreover, this algorithm is simple to achieve, easy to operate, and therefore has a high practical value.
This paper describes the workflow management system and its implementation procedures, gives the formal definition of workflow model. It discusses the business process of the circulation of official document combined ...
详细信息
ISBN:
(纸本)9781424455379
This paper describes the workflow management system and its implementation procedures, gives the formal definition of workflow model. It discusses the business process of the circulation of official document combined with the present situation of college Office, builds a Petri net-based workflow model and gives the structure of workflow engine. We present the solutions for college OA system based on Web applications as background, which satisfies the needs of college paperless Office. The schema with good usability and versatility has a certain application value.
An enterprise information integration architecture based on semantic and grid is proposed at the current work. Semantic web technology and grid computing technology are combined together and applied to enterprise info...
详细信息
ISBN:
(纸本)9781424455379
An enterprise information integration architecture based on semantic and grid is proposed at the current work. Semantic web technology and grid computing technology are combined together and applied to enterprise information integration. The remarkable features of this architecture lie in twofold. On one hand, the complexity and heterogeneity of information resources are shielded through grid service package. On the other hand, semantic elements are penetrated into the entire architecture through the semantic description in resource layer and service layer. As a result, information living environment adapting to complexity and heterogeneity is established and the interoperation of information integration architecture is achieved on the level of semantic.
computer-based college Euglish test is oue of the important ingredients in the reform of college English teaching and learning in China, which is based on communicative testing theories and represents the future trend...
详细信息
ISBN:
(纸本)9781424455379
computer-based college Euglish test is oue of the important ingredients in the reform of college English teaching and learning in China, which is based on communicative testing theories and represents the future trend of college English tests. This paper systematically studies the computer-based college English test, compares it with the traditional paper-and-pencil-based test, finding out its advantages and the characteristics of its item bank, and its backwash effects on college English as a foreign language EFL) teaching in China.
With coding stream layered structure and progressive Transmission characteristics in JPEG2000, the paper presents a method research of the hiding fingerprint information. By means of the ranked bit-stream according to...
详细信息
ISBN:
(纸本)9781424455379
With coding stream layered structure and progressive Transmission characteristics in JPEG2000, the paper presents a method research of the hiding fingerprint information. By means of the ranked bit-stream according to the fingerprint feature importance in space bit Planes, the method may adaptively embed hidden fingerprint data into wavelet coefficients from low to high frequency sub-band based on the coefficients redundancy. Experiment results shows, the algorithm achieves higher quality to the hided images, and better tradeoff between invisibility and robustness in various Conditional compression..
Based on the RFID (radio frequency identification) technology features, the paper make a deep analysis of the RFID technology effect on all aspects of the logistics supply chain management to make it achieve synergy a...
详细信息
ISBN:
(纸本)9781424455379
Based on the RFID (radio frequency identification) technology features, the paper make a deep analysis of the RFID technology effect on all aspects of the logistics supply chain management to make it achieve synergy and optimization, and proposed information sharing and security protocols for the exchange of information in the supply chain management process.
暂无评论