Classroom teaching behavior coding has received widespread attention from classroom analysis researchers in China in recent years. However, in the context of big data, how to effectively analyze the data of classroom ...
详细信息
The traditional blockchain has the shortcoming that a single-chain can only deal with one or a few specific data types. The research question of how to make blockchain be able to deal with various data types has not b...
详细信息
COTS component evaluation is one of the most important steps in component-based development. Enforcing the coding standard within the coding phase is one important aspect for the quality of safety-critical software. T...
详细信息
COTS component evaluation is one of the most important steps in component-based development. Enforcing the coding standard within the coding phase is one important aspect for the quality of safety-critical software. T...
详细信息
COTS component evaluation is one of the most important steps in component-based development. Enforcing the coding standard within the coding phase is one important aspect for the quality of safety-critical software. This paper addresses the problem of carrying out COTS component evaluation of its compliance to the coding standard in case when only the executables with neither source code nor debugging information are available. The static binary analysis techniques are employed to discuss the feasibilities and possible approaches of checking compliance to coding standard rules for x86 executables. This work is our known first attempt to address this problem. About 27% of the MISRA-C 2004 rules can be checked or partially checked for x86 executables. Experiments are presented to conclude that for the rules related to unstructuredness and pointer cast, violations found from executables can be a reasonable approximation of the extent of compliance to the coding standard of the corresponding source code.
This paper presents a real jumping gene genetic algorithm (RJGGA) as an enhancement of the jumping gene genetic algorithm (JGGA) [T.M. Chan, K.F. Man, K.S. Tang, S. Kwong, A jumping gene algorithm for multiobjective r...
详细信息
This paper presents a real jumping gene genetic algorithm (RJGGA) as an enhancement of the jumping gene genetic algorithm (JGGA) [T.M. Chan, K.F. Man, K.S. Tang, S. Kwong, A jumping gene algorithm for multiobjective resource management in wideband CDMA systems, The Computer Journal 48 (6) (2005) 749-768;T.M. Chan, K.F. Man, K.S. Tang, S. Kwong, Multiobjective optimization of radio-to-fiber repeater placement using a jumping gene algorithm, in: Proceedings of the IEEE internationalconference on Industrial technology (ICIT 2005), Hong Kong, 2005, pp. 291-296;K.F. Man, T.M. Chan, K.S. Tang, S. Kwong, Jumping-genes in evolutionary computing, in: Proceedings of the IEEE IECON'2004, Busan, 2004, pp, 1268-1272]. JGGA is a relatively new multiobjective evolutionary algorithm (MOEA) that imitates a jumping gene phenomenon discovered by Nobel Laureate McClintock during her work on the corn plants. The main feature of JGGA is that it only has a simple operation in which a transposition of gene(s) is induced within the same or another chromosome in the genetic algorithm (GA) framework. In its initial formulation, the search space solutions are binary-coded and it inherits the customary problems of conventional binary-coded GA (BCGA). This issue motivated us to remodel the JGGA into RJGGA. The performance of RJGGA has been compared to other MOEAs using some carefully chosen benchmark test functions. It has been observed that RJGGA is able to generate non-dominated solutions with a wider spread along the Pareto-optimal front and better address the issues regarding convergence and diversity in multiobjective optimization. (C) 2006 Elsevier Inc. All rights reserved.
Here we introduce a new quantum watermarking paradigm by integrating the hash-aided watermarking scheme proposed by Cannons and Moulin (2004) with a communication protocol over a quantum wireless channel, thus gaining...
详细信息
Here we introduce a new quantum watermarking paradigm by integrating the hash-aided watermarking scheme proposed by Cannons and Moulin (2004) with a communication protocol over a quantum wireless channel, thus gaining a significant security improvement.
The proceedings contain 136 papers from the Proceedings itcc 2005 - internationalconference on informationtechnology: coding and computing - Volume 1. The topics discussed include: parallel multiple sequence alignme...
详细信息
ISBN:
(纸本)0769523153
The proceedings contain 136 papers from the Proceedings itcc 2005 - internationalconference on informationtechnology: coding and computing - Volume 1. The topics discussed include: parallel multiple sequence alignment with dynamic scheduling;design and implementation of a unique blood-vessel detection algorithm towards early diagnosis of diabetic retinopathy;an adaptive scalable multiuser-OFDM system for multimedia transmission over fading channels;a scalable generative topographic mapping for sparse data sequences;watermark based digital rights management;multiple description coding using transforms and data fusion;quality-oriented software architecture;and arabic stemming without a root dictionary.
The proceedings contain 156 papers from the Proceedings itcc 2005 - internationalconference on informationtechnology: coding and computing - Volume 2. The topics discussed include: impact of Java compressed heap on ...
详细信息
ISBN:
(纸本)0769523153
The proceedings contain 156 papers from the Proceedings itcc 2005 - internationalconference on informationtechnology: coding and computing - Volume 2. The topics discussed include: impact of Java compressed heap on mobile/wireless communication;a survey on data compression in wireless sensor networks;using dynamic adaptability to protect mobile agents code;using principles of pervasive computing to design m-commerce applications;using facial images to diagnose fetal alcohol syndrome (FAS);a generic shape descriptor using bezier curves;automatic vehicle classification system using range sensor;unsupervised border detection of skin lesion images;and recognition and extraction high precision digital road map.
The following topics are dealt with: bioinformatics; data coding and compression; data mining; database technology; distributed and grid systems; e-commerce; education; e-gaming; embedded cryptographic systems; inform...
The following topics are dealt with: bioinformatics; data coding and compression; data mining; database technology; distributed and grid systems; e-commerce; education; e-gaming; embedded cryptographic systems; information assurance and security and information retrieval.
暂无评论