Course of algorithm is a specialized course of computerscience with both strong abstract nature and practicality, for which needs of algorithm visualization technique in CAI is prominent. This paper develops a visual...
详细信息
Course of algorithm is a specialized course of computerscience with both strong abstract nature and practicality, for which needs of algorithm visualization technique in CAI is prominent. This paper develops a visualized CAI aiming at the characteristics of the course of algorithm, which provides users with the functions like responding, changing, constructing and presenting, conforming to the engagement taxonomy defined by working group on "Improving the Educational Impact of Algorithm Visualization".
Human-computer Interaction has always been an important part in software's design and development, especially for CAI, how to make sure that learners can master the knowledge faster and better is what the designer...
详细信息
In order to solve practical problems in network teaching data analysis ,the web-based instruction data of mathematical models and model framework was build .In the core process that data scoop out, the main adoption t...
详细信息
This paper deals with the problem of H∞ filter design for nonlinear discrete-time systems with time-varying delays via T-S fuzzy model approach. Some delay-dependent conditions for fuzzy H∞ filter design are propose...
详细信息
This paper deals with the problem of H∞ filter design for nonlinear discrete-time systems with time-varying delays via T-S fuzzy model approach. Some delay-dependent conditions for fuzzy H∞ filter design are proposed in terms of linear matrix inequalities(LMIs), which produce a less conservative result. Finally, one numerical example is given to demonstrate the effectiveness and the benefits of the proposed method.
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. The most challenging work is to prevent attacks of this kind of networks. This paper labors the security mechanism of...
详细信息
Ad Hoc is one sort of multi-hop, self-organization wireless network without the fixed base-station. The most challenging work is to prevent attacks of this kind of networks. This paper labors the security mechanism of a typical protocol of Ad Hoc network AODV. And a security enhanced routing mechanism is advanced which includes Credibility Management and Routing test
Nationally only 40% of the incoming freshmen STEM majors are successful in earning a STEM degree [1]. The University of Central Florida (UCF) EXCEL program is an NSF funded STEP (science, Technology, Engineering and M...
详细信息
Layer velocity modeling is not enough for high accuracy pre-stack imaging. But block velocity modeling may accurately describe complex subsurface geological structure. Through the research of seismic exploration block...
详细信息
Layer velocity modeling is not enough for high accuracy pre-stack imaging. But block velocity modeling may accurately describe complex subsurface geological structure. Through the research of seismic exploration block modeling method, this paper proposes a new practical workflow about block modeling, researches Delaunay triangulation algorithm, achieves surface structure geometrical modeling, and keeps the geometry and topology relationship, such as geologic horizon and fault. On the basis of surface structure triangulation meshes, this paper also researches the algorithms of curved surfaces intersection, subdivision, suture, united output and 3D Delaunay triangulation, realizes block geometric surface modeling and complicated geologic solid modeling, and overcomes the technology puzzle of the complicated structure block modeling.
Solving algorithmic problems and implementing them in code is a major theme in introductory computerscience courses. Problems related to string manipulation are common and of great importance in various domains. In t...
详细信息
Solving algorithmic problems and implementing them in code is a major theme in introductory computerscience courses. Problems related to string manipulation are common and of great importance in various domains. In the context of computerscience education, solving algorithmic problems of this type may be very challenging for novices, even for the more competent students. Analysis of novice students' solutions to a specific class of problems dealing with string manipulation revealed that a widespread intuitive and non-linear approach was used to solve these problems, which led to cumbersome and erroneous solutions. On the other hand, a straightforward linear approach that leads to shorter and more elegant solutions is uncommon. Uncovering students' common and unsatisfactory approaches in problem solving have significant implications on instruction.
When the body is intruded, there is a congenital immune process to find and reduce the damage as quickly as possible. This is an important recovery character for the biology immune system. A model that simulates the b...
详细信息
When the body is intruded, there is a congenital immune process to find and reduce the damage as quickly as possible. This is an important recovery character for the biology immune system. A model that simulates the biology's congenital immunity is introduced in the computer immune system. It has two basal agents, Damage Detector Agent and Congenital Response Agent. Damage Detector Agent finds intrusion and releases dangerous signal to excited Congenital Response Agent. And it uses a Dynamic Semi-Active Replication technology to ensure the system can work. All this work can improve the system's robustness that it can supply the basic services when it's intruded.
It is deficiency to use accuracy as a measurement to evaluate model classifying ability. This paper proposes a measurement method which uses the area under the ROC curve, or AUC value, to evaluate the performance of t...
详细信息
ISBN:
(纸本)9781424471591
It is deficiency to use accuracy as a measurement to evaluate model classifying ability. This paper proposes a measurement method which uses the area under the ROC curve, or AUC value, to evaluate the performance of the model. Furthermore, applying cross validation and grid-search methods, through designed algorithms, to build an optimization of support vector machines medical prediction model. The model was applied to diagnosis of predicting of coronary heart disease. The results show that the model has the characteristics of global optimization and easy to implement.
暂无评论