question analysis is one of the important components in Question-Answering system. Since the existence of events, complex question analysis becomes extremely difficult. Using semantic role labeling based on CRFs, even...
详细信息
In the research of hot drug perfusion machine, temperature control is very important. Hot drugs acting on the lesion is a direct impact on the efficacy of the patience. So the application of Intelligent control which ...
详细信息
This article bases on the view of complex adaptive systems theory to give the methodological analysis to the wireless sensor network (WSN)'s Self- configuration, Self-healing and Agent characteristics. Wireless Se...
详细信息
Multimedia Security has been an important part of digital information protection. And secret sharing schemes are used for multimedia encryption in this paper. The algorithms proposed are computationally secure, effect...
详细信息
Cylindrically helical spring is a wide used mechanical part in the modern industry, but conventional examine method has some limitations. The newly designed spring's computer controlling examinable system examines...
详细信息
On the basis of study of Gnutella search arithmetic, this paper analyzes the latency of unblance of loads. This paper gives a arithmetic that use some hints of replication Resources to enhance search effect and load-b...
详细信息
This paper infers an intrusion detection way based on clone including the overall detection algorithms modules and susceptibility, memory test cells and mature cell detection algorithms, algorithm can be to dynamicall...
详细信息
When making authorization decision, previous trust management only considers the properties of entities while ignores the states of platforms on which entities are operating. An "irresponsible" platform may ...
详细信息
In this paper, design and implementation of a radar signal simulation system is introduced. It is based on standard CPCI bus and follow the design principle of standardized, modular and extendable in design process. T...
详细信息
In view of the potential security risk existing in mobile education wireless network terminal access and information transmission, the author proposes a security model which uses the speech recognition technology and ...
详细信息
暂无评论