In this paper, a specific online judge for automata is designed. System architecture is developed according to it. Model representations, judging strategies and feasibility of automatic judge are also explored. Differ...
详细信息
In this paper, a specific online judge for automata is designed. System architecture is developed according to it. Model representations, judging strategies and feasibility of automatic judge are also explored. Different judging methods are introduced corresponding to each model, ensures the accuracy and efficiency. The advantages when applied to education are also discussed at the end of this paper.
User awareness has become a popular feature in many social web applications. In classic text-based web-systems, user awareness features show how many users are online in a web application or how many users are accessi...
详细信息
Inspired by the certificateless public key encryption scheme proposed by Jong et al, we present a new certificateless authenticated key agreement protocol (CLAK). It is provably secure in the standard model. CLAK prot...
详细信息
Inspired by the certificateless public key encryption scheme proposed by Jong et al, we present a new certificateless authenticated key agreement protocol (CLAK). It is provably secure in the standard model. CLAK protocol provides perfect forward secrecy. Compared with a certificateless authenticated key agreement protocol which is only provable secure in the random oracle model, the new protocol is improved with respect to the security properties, computation and communication cost.
This work presents a web lecture systems that allows its users to visualize and re-use aggregated actions taken from user's past interaction for enhanced content navigation and multimedia retrieval.
This work presents a web lecture systems that allows its users to visualize and re-use aggregated actions taken from user's past interaction for enhanced content navigation and multimedia retrieval.
This paper presents a method to develop course software aiming at autonomic learning, and introducing The Formal Languages and Automata Course Software as a case to study. Then it lists six patterns in the Finite Auto...
详细信息
ISBN:
(纸本)9781424472352
This paper presents a method to develop course software aiming at autonomic learning, and introducing The Formal Languages and Automata Course Software as a case to study. Then it lists six patterns in the Finite Automata (FA) to Regular Expression (RE) conversion algorithm for learners at different levels. Finally it summarizes the keys in applying the idea of autonomic learning to course software.
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. The most challenging work is to prevent attacks of this kind of networks. This paper labors the security mechanism of...
详细信息
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. The most challenging work is to prevent attacks of this kind of networks. This paper labors the security mechanism of a typical protocol of Ad Hoc network AODV. And a security enhanced routing mechanism is advanced which includes Credibility Management and Routing test
In outcome based learning, learning outcomes (knowledge, skills and competences) to be achieved by learners are in the focal point of the learning process. All educational activities and resources need to be related t...
详细信息
This paper deals with the problem of H∞ filter design for nonlinear discrete-time systems with time-varying delays via T-S fuzzy model approach. Some delay-dependent conditions for fuzzy H∞ filter design are propose...
详细信息
This paper deals with the problem of H∞ filter design for nonlinear discrete-time systems with time-varying delays via T-S fuzzy model approach. Some delay-dependent conditions for fuzzy H∞ filter design are proposed in terms of linear matrix inequalities(LMIs), which produce a less conservative result. Finally, one numerical example is given to demonstrate the effectiveness and the benefits of the proposed method.
Layer velocity modeling is not enough for high accuracy pre-stack imaging. But block velocity modeling may accurately describe complex subsurface geological structure. Through the research of seismic exploration block...
详细信息
Layer velocity modeling is not enough for high accuracy pre-stack imaging. But block velocity modeling may accurately describe complex subsurface geological structure. Through the research of seismic exploration block modeling method, this paper proposes a new practical workflow about block modeling, researches Delaunay triangulation algorithm, achieves surface structure geometrical modeling, and keeps the geometry and topology relationship, such as geologic horizon and fault. On the basis of surface structure triangulation meshes, this paper also researches the algorithms of curved surfaces intersection, subdivision, suture, united output and 3D Delaunay triangulation, realizes block geometric surface modeling and complicated geologic solid modeling, and overcomes the technology puzzle of the complicated structure block modeling.
To remove the redundant features extracted by using 2DPCA methods, a face recognition method is presented based on 2DPCA and fuzzy-rough technique in this paper. The proposed method selects the important features for ...
详细信息
To remove the redundant features extracted by using 2DPCA methods, a face recognition method is presented based on 2DPCA and fuzzy-rough technique in this paper. The proposed method selects the important features for classification by using attribute reduction in fuzzy rough sets theory. The experimental results show the proposed method outperforms the face recognition methods based on 2DPCA.
暂无评论