In this research we conducted a systematic reviewon Global software Development (GSD) literature andperformed a survey to gather challenges associated with GSD projects as well as their mitigation strategies. We revie...
详细信息
Contourlet transform is the combination of the multi-scale analysis and multi-directional analysis in processing high-dimensional signals and has better approximation precision and better sparse description. Firstly, ...
详细信息
Standard backprojection technique is used in typical through-wall synthetic aperture radar (TWSAR) image, it implicitly assumes infinite beamwidth, whereby the entire target area is illuminated and returns are collect...
详细信息
The finite difference time domain (FDTD) is a powerful method in electromagnetic simulation and also widely used in research of the metamaterials recently. In this paper a novel FDTD method based on split operator is ...
详细信息
Chinese language has been generally regarded as a Subject-Verb -Object (SVO) language and the basic semantic unit is the Chinese word that is usually consisted by two or more Chinese characters. However, word-centered...
详细信息
In the paper, the authors derive the method of splitting plane wave FDTD (SP-FDTD) method for initiation of plane wave sources in the total-field and scattered-field (TF/SF) formulation of 3D FDTD (2, 4) scheme. By sp...
详细信息
In this paper, we propose a semantic negotiation based service framework for the extraction of optimized service information without user intervention in intelligent Machine to Machine (M2M) environment. Proposed sema...
详细信息
In order to improve the mobile services under the banner of the Internet of Things, we propose and design a new kind of Web-based method of media seamless migration. The method can ensure the media seamless migration ...
详细信息
Spike sorting is the essential step in analyzing recording spike signals for studying information processing mechanisms within the nervous system. Overlapping is one of the most serious problems in the spike sorting f...
详细信息
With the convenient connection to network, more and more individual information including sensitive information, such as contact list in Mobile Phone or PDA, can be delegated to the professional third service provider...
详细信息
暂无评论