For many disabled people who are dumb or deaf sign language is a way of communication, to do communication both people need to know sign language or need a translator between them, but everywhere they are not getting ...
详细信息
Extracting valuable information from unstructured text is a significant difficulty in today's culture due to the ever-increasing proliferation of texts, most of which are generated via online social networks in th...
详细信息
To suppress interferences in the airspace and improve the robustness of beam, a robust adaptive beamforming algorithm based on second-order cone programming (RAB_SOCP) is proposed in this paper. Using worst-case optim...
详细信息
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook...
详细信息
ISBN:
(纸本)9798400708305
this article firstly analyses the situation and technology trends of security system, then proposes the conception and structure of the Cloud-based Security System for Critical Site (CSSCS), finally provide an outlook of CSSCS building approach, which is top-down mapping and bottom-up founding. CSSCS virtualized multiple sensors, weapons, facilities and equipment, break the fixed relations between each other, combine them with network, and build up flexible information resources network. the information resources network can recompose dynamically according to the battle situation, which can be combined into an operational structure with a subordinate relationship at any time. the aim of CSSCS is to achieve command-flattening, disposal-quickening, evaluation-automation and perception-precision.
For the task of named entity recognition, this paper proposes a character-level multi-feature fusion named entity recognition method based on the IDCNN model, which can adjust the receptive field range through paramet...
详细信息
At present, withthe rise of cloud computing and the wide application of cloud storage, the security problem of data storage also appears. Reversible data hiding is an emerging research direction of information hiding...
详细信息
BIM execution plan(BEP) is the basic guidance of BIM work. the content of BEP and implementation mode of TUAS Water Reclamation Plant(TWRP) BIM work are explained. the BIM design software and simulation software estab...
详细信息
Search engines aggressively capture user data for targeted advertisements at the cost of user privacy. We present a framework for complete internet anonymity that blocks search engines from tracking user data based on...
详细信息
Withthe increasing of computer crime, instant emergence of new digital product, new computertechnology and computer forensics technology is promoted, developed constantly. this paper described basic information/cont...
详细信息
the emergence of information and communication technology changed the world irreversibly through the penetrance in every facet of our lives. It enables interactive communication in real time with immense number of end...
详细信息
the emergence of information and communication technology changed the world irreversibly through the penetrance in every facet of our lives. It enables interactive communication in real time with immense number of end users across time and space and allows processing of huge number of requests at the same time. In times of continuously growing expectations and requirements from customers' side and challenging global rivalry it is important to respond to customers' impulses to be successful in market competition. the aim of this paper is to propose a concept of dynamic advertisement composition of promotional offer based on interactive customer response. (C) 2017 the Authors. Published by Elsevier B.V.
暂无评论