The author simulated the transmission of a certain communication protocol in the data link layer, aiming at testing the reliability of the protocol. By simulating the transmission of data and transmission error probab...
详细信息
ISBN:
(纸本)9783642254369
The author simulated the transmission of a certain communication protocol in the data link layer, aiming at testing the reliability of the protocol. By simulating the transmission of data and transmission error probability controlling, the paper implemented the performance testing of reliable data transfer protocol, and improved the performance of the protocol greatly.
Applying bibliometrics and statistics methods to the statistical analysis of virtual reality technology patents, which were applied in the United States and gathered by Derwent Innovation Index, the authors adopt a qu...
详细信息
ISBN:
(数字)9783642254376
ISBN:
(纸本)9783642254369
Applying bibliometrics and statistics methods to the statistical analysis of virtual reality technology patents, which were applied in the United States and gathered by Derwent Innovation Index, the authors adopt a quantitative analysis in the perspectives of time, fields of major technology, leading organizations with high yielding and also draw the knowledge map in the field.
This paper proposed a new closed sequential pattern mining algorithm. The algorithm used a list of positional data to reserve the information of item ordering. By using these positional data, we developed two main pru...
详细信息
ISBN:
(纸本)9783642112751;9783642112768
This paper proposed a new closed sequential pattern mining algorithm. The algorithm used a list of positional data to reserve the information of item ordering. By using these positional data, we developed two main pruning techniques, backward super-pattern condition and same positional data condition. To ensure correct and compact resulted lattice, we also manipulated some special conditions. From the experimental results, our algorithm outperforms CloSpan in the cases of moderately large datasets and low support threshold.
In existing Dictionary-based compression methods, the dictionaries, whether Static or dynamically generated, are all in the local. Lossless data compression Based on Network Dictionary, proposed in this article, store...
详细信息
ISBN:
(纸本)9783642112751;9783642112768
In existing Dictionary-based compression methods, the dictionaries, whether Static or dynamically generated, are all in the local. Lossless data compression Based on Network Dictionary, proposed in this article, stores various types of dictionaries in the dedicated server, and compresses by means of full direct compression or Block Compression. It's ideal compression efficiency close to 100%. Compared with the existing compression algorithms, the time cost for compressing in this method mainly depends on network speed and matching algorithm. With the continuous growth of network speed and the continuous improvement of matching algorithm, this method will bring a revolutionary change in the history of compression.
The data structure course is one of the most important coureses in any computer science. data structure is concerned with data presentation. organization and processing in computers, as well as algorithm design of cor...
详细信息
ISBN:
(数字)9783642254376
ISBN:
(纸本)9783642254369;9783642254376
The data structure course is one of the most important coureses in any computer science. data structure is concerned with data presentation. organization and processing in computers, as well as algorithm design of corresponding structure and also including algorithm performaflce analyssis which make this course to be a difficult one. . The paper explores the problems existing in students of computer major studying this course, and gives out the countermeasures, which could positively promote the teaching reform of this course.
In this paper, a novel fuzzy ARM algorithm called FFI_Stream is presented to tackle quantitative attributes in data streams and some techniques are proposed in the algorithm. Both synthetic and real datasets are used ...
详细信息
ISBN:
(纸本)9783642254369;9783642254376
In this paper, a novel fuzzy ARM algorithm called FFI_Stream is presented to tackle quantitative attributes in data streams and some techniques are proposed in the algorithm. Both synthetic and real datasets are used to evaluate the performance of the proposed algorithm. The experimental results show both the effectiveness and efficiency of the proposed algorithm. In comparison with the discrete method, the proposed algorithm using fuzzy sets and MFB_measure gets a trade-off between the number of interesting rules and efficiency.
This paper based on the traditional model of gray system theory, uses the method which dynamic replacement of equal dimension new information, can improve effectively the accuracy of model, obtain good prediction, is ...
详细信息
ISBN:
(纸本)9783642254369;9783642254376
This paper based on the traditional model of gray system theory, uses the method which dynamic replacement of equal dimension new information, can improve effectively the accuracy of model, obtain good prediction, is a convenient and reliable method of deformation analysis.
A college students39; overall quality evaluation system was designed and developed based on computer and mobile blended networks. Users could do evaluation works anywhere at any time with the use of this system. Mob...
详细信息
ISBN:
(纸本)9783642112751;9783642112768
A college students' overall quality evaluation system was designed and developed based on computer and mobile blended networks. Users could do evaluation works anywhere at any time with the use of this system. Mobile office became a reality and it makes work more convenient and more efficient. HTTP protocol was adopted to transfer data between Mid let and Servlet and it makes the mobile client program to be device independent. In addition, ECDSA (Elliptic Curve Digital Signature Algorithm) was implemented in this system, and it ensures the authenticity and integrity of the data needed by the evaluation. Thus, evaluation work can be carried out objectively, fairly and efficiently by the use of this system. This paper described the data transfer scheme and the data security scheme of this system in detail.
This paper proposes an onboard taxi fee register with GPS/ GPRS and designs a kind of onboard taxi fee resister system. This system is mainly comprised by LPC2114 processor, metering components, empty plates, SD cards...
详细信息
ISBN:
(纸本)9783642112751
This paper proposes an onboard taxi fee register with GPS/ GPRS and designs a kind of onboard taxi fee resister system. This system is mainly comprised by LPC2114 processor, metering components, empty plates, SD cards, real-time clock, printer, keyboard, GPS systems, GPRS wireless data transmission modules, display screen, etc. It realizes the record and storage of stations for passengers to get on or off (longitude and latitude) and vehicle's track, GPS accurate time transmission, regulation of unit prices according to sections and time, display and print relative data and conduct intercommunication of information with service center by GPRS. Compared to existing technology, it prevents cheating of taxi fee register, moreover improves the efficiency, decreases the management costs, and has the advantages of high accuracy and convenience, etc.
In order to broaden the application of HJ-1 data and better protect the nature reserves of our country, according to the theories and approaches of the ecosystem health and the press-state-response model, the study bu...
详细信息
ISBN:
(纸本)9783642254369;9783642254376
In order to broaden the application of HJ-1 data and better protect the nature reserves of our country, according to the theories and approaches of the ecosystem health and the press-state-response model, the study built the indicators of ecosystem health of nature reserve based on the HJ-1 data. At the same time, by using HJ-1 CCD data, we took Xianghai wetland as an example to extract the indicators. The following results were obtained:(1) The health of Xianghai wetland nature reserve is under threatening. The human activity of it is very common and the function is irrational:(2) The main reasons, cause the damage to wetland ecosystem, are attributed to the increase of human activity and the decrease of precipitation per-year.
暂无评论