A new book-lending system is designed and analyzed based on logic Petri nets in this paper. The batch processing function and indeterminacy of readers are included in the system. Its logic Petri net model is establish...
详细信息
In order to practically examine a new type of class, in which cooperative learning is taken into consideration, we designed and built a classroom. This classroom, in which furniture and a flexible ICT basis are both d...
详细信息
In order to practically examine a new type of class, in which cooperative learning is taken into consideration, we designed and built a classroom. This classroom, in which furniture and a flexible ICT basis are both designed reconfigurable, supports much more complex interactions between learners than in a traditional classroom. Two months' observation of the activities in the classroom shows that many aspects of the reconfigurations have encouraged complex interactions within cooperative learning.
Soft set theory proposed by Molodstov is a general mathematic tool for dealing with uncertainties. Recently, several algorithms had been proposed for decision making using soft set theory. However, these algorithms st...
详细信息
Mining weighted based association rules has received a great attention and consider as one of the important area in data mining. Most of the items in transactional databases are not always carried with the same binary...
详细信息
Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulat...
详细信息
Mobile applications are becoming more and more popular with the prevalence of mobile operating system and mobile Internet. However, the bugs in the mobile application not only results from buggy code but also from unr...
详细信息
Mobile applications are becoming more and more popular with the prevalence of mobile operating system and mobile Internet. However, the bugs in the mobile application not only results from buggy code but also from unreliable context providers. In this paper, we proposed a statistical fault localization framework targeting at the bugs in the mobile application, especially the buggy context provider faults. And we further propose a fault tolerant design to make the mobile application immune to buggy context provider bugs. Our experiment shows our proposed technique is much more effective than existing technique to locate faults in mobile application and the fault tolerant design can effectively prevent the mobile application behave abnormally in spite of buggy context providers.
We show that a Heisenberg type or a Schrödinger type uncertainty relation for Wigner-Yanase-Dyson skew information proved by Yanagi can hold for an arbitrary quantum Fisher information under some conditions. One ...
详细信息
Recent technological advancements in subcutaneous glucose monitoring and subcutaneous insulin delivery systems have stimulated the development of closed-loop systems for maintaining normoglycaemia in Type I diabetes. ...
详细信息
This paper presents a new pipeline inspection robot that has multiple sensors for inspection of 80-100mm pipelines. The special feature of this robot is realization of driving and steering capability by using only two...
详细信息
This paper presents a new pipeline inspection robot that has multiple sensors for inspection of 80-100mm pipelines. The special feature of this robot is realization of driving and steering capability by using only two wheel chains. Compared to popularly employed pipeline robots using three wheel chains, the new design allows simple robot control and easy user interface, specially at T-branch. As another advantage, the flat shape of this robot allows mounting additional sensors on the both sides of the robot. The kinematics and three control modes are described. Finally, the performance of this robot system is verified by experimentation.
In order to set up universal criteria for measuring and evaluating network security and survivability,this paper presents a novel index *** index system was built according to the Protection-Detection-Response (PDR) s...
详细信息
ISBN:
(纸本)9781457713675
In order to set up universal criteria for measuring and evaluating network security and survivability,this paper presents a novel index *** index system was built according to the Protection-Detection-Response (PDR) security model and the Resistance-Recognition-Recovery (R3) survivability principle of network in the presence of attacks,failures,or *** all the 24 metrics in the index system are used to cover the characters of network security and *** index system is organized with threelayer structure like a *** first layer,*** node,is called network security and *** second layer includes three indexes,*** metric,awareness metric,and recovery *** third layer includes 20 indexes abstracted from different network layers,survivability characters,and survivability methods and so *** novel index system is quantifiable,universal,consistent,compatible,and fine-scale,which is suitable for different network *** last,a case for how to using these index system to measure network security and survivability is also given.
暂无评论