The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Network centrality reflects node importance in networks, which is a challenging problem in social network analysis. Based on Fuzzy Set and MYCIN theory, this paper proposes a novel node centrality measuring method and models n-monkeys dataset, where n is 20. Initially, we created monkeys relationship graph and generated relationship matrix based on the monkeys' encountering times in a specific time...
There are some shortcomings in the delay tolerant network (DTN) routing algorithm, such as low message delivery rate, low network efficiency and high cost in the satellite network. In order to solve the problem above, this paper proposes a limited copy algorithm MPWLC based on service probability. In MPWLC, not only is the number of copies limited, but the storage resources of the satellite are also...
In this paper, two methods were considered to estimate the distance, which aims to study the influence of external environmental factors on localization accuracy. The first method is log-normal shadowing model (LNSM), which estimates the distance through the received signal strength indicator (RSSI). The second method is improved algorithm based on RBF neural network (RBFNN). Two different experimental...
Clustering algorithm is one of the fundamental techniques in data mining, which plays a crucial role in various applications, such as pattern recognition, document retrieval, and computer vision. As so far, many effective algorithms have been proposed. Affinity Propagation is an algorithm requires no parameter indicating the number of clusters, which is the most distinguishing advantage compared to...
With two-order Taylor expansion formula and the equivalent transformation of the radical function, the double square rooted slant range history of multiple receiver synthetic aperture sonar (SAS) can be highly approximated. Based on that, system transfer function in two-dimensional frequency domain, which is required for fast imaging algorithms, is derived. Using the derived transfer functions, this...
This paper introduces a novel layout-style with a reasonable generation algorithm for MOS analog modules in order to guarantee complete routing and perfect matching of devices. The introduced layout-style is applicable to a variety of essential MOS analog circuits. To the transistor layout, we introduce a symmetrical row-based structure where all transistors are transformed to matched pairs by duplicating...
To enable low-rank tensor completion and factorization, this paper puts forth a novel tensor rank regularization method based on the ℓ1,2-norm of the tensor's parallel factor analysis (PARAFAC) factors. Specifically, for an N-way tensor, upon collecting the magnitudes of its rank-1 components in a vector, the proposed regularizer controls the tensor's rank by inducing sparsity in the vector of magnitudes...
In this paper, we consider a multiuser multiple-input single-output downlink system for Simultaneous Wireless Information and Power Transfer(SWIPT). Different from the conventional battery-free power splitting strategy, the harvested energy can be buffered in a battery before consumption. Accordingly, increasing battery lifetime, where the base station is powered by sustainable energy. A sum rate...
Motivated by reduction of computational complexity, this work develops a pipelined adaptive filter architecture using the sign-error least mean square (SELMS) algorithm. The proposed algorithm was implemented with less than half the amount of calculation consumed for the conventional architectures. Besides, the proposed designs derived by retiming technique and with low latency also provide a faster...
Identification of reliable cancer biomarkers is a challenging task and great efforts have been devoted to utilize network-based methods to alleviate uncertainty of detected oncogenes. In the paper, an innovative network-based inference method is presented to recognize meaningful cancer-related genes. Firstly, a penalized kernel weighting algorithm is proposed, called ℓ2-norm regularized dynamic Smooth...
With one class outnumbering another, many real classification tasks show imbalanced class distributions, which brings big trouble to standard classification models: they usually intend to recognize a minority instance as a majority one. The data gravitation based classification (DGC) model, a newly developed physical-inspired supervised learning model, has been proven effective for standard supervised...
With the amount of data increasing rapidly, how to improve the scalability of nonlinear clustering has become a very crucial and challenging problem. In this paper, we design an efficient parallel nonlinear clustering algorithm by using a four-stage MapReduce framework. In our approach, we need to compute two quantities based on distance matrices, which, however, is difficult to compute in a MapReduce...
Linear solvers and parallel computing are crucial for developing a new generation reservoir simulator. To acquire satisfied acceleration performance, we study the parallel algorithms of linear solvers with preconditioners on GPUs (Graphics Processing Units). The classical GMRES solver is implemented, and the parallelization of ILU(0) and ILUT preconditioners based on the Restricted Additive Schwarz...
Green data centers have become more and more popular recently due to their sustainability. The resource management module within a green data center, which is in charge of dispatching jobs and scheduling energy, becomes especially critical since it directly affects a center's profit and sustainability. The thrust of managing a green data center's machine and energy resources lies at the uncertainty...
In this paper, we discuss the consensus of discrete-time multi-agent system. Based on the network topology, consensus protocol in discrete-time with dynamic step-size is designed. Conventional algorithms need man made step-size generally, having a great non-natural impact. The new algorithm employs a self-adaptive dynamic step-size based on the network topology, with little non-natural factor, and...
Modular exponentiations are widely used in discrete-log based cryptographic protocols. Most researches have been done for outsourcing exponentiation modular a prime, while less work has been done for outsourcing exponentiation modular a composite. In this paper, we first raise a new secure outsourcing algorithm for exponentiation modular a composite in the one malicious model. Then, we prove that...
As a tradeoff of GEO and LEO, MEO satellite system has more acceptable service performance and it is more appropriate to provide global mobile communications. A MEO satellite system model communicating according to time slots is constructed in the paper. Moreover, in order to improve comprehensive performance of the network, a novel routing algorithm applying Time Evolving Graph based on Pairing Heap...
Memetic Algorithm (MA) is a meta-heuristic algorithm which combines an Evolutionary Algorithm (EA) and a local search algorithm. In this work, we design a cooperate memetic algorithm (CMA) for image retrieval. We propose a novel image indexing method based on YCbCr color space and 4096-tree. And then we describe the memetic algorithm with local search chain and cooperate memetic algorithm (MA-LSCH-CMA)...
Directional sensors, such as cameras, are limited in their sensing angles, but are able to switch to different directions and cover the area of interest cooperatively. In directional sensor networks, how to prolong the network lifetime while satisfying certain coverage requirements is a fundamental problem since the sensors are powered by battery. In this paper, we propose scheduling schemes for directional...
Designated verifier signature (DVS) is a cryptographic primitive, which allows a signer to convince a designated verifier of the validity of a signed statement and prevents the verifier from convincing any third party about the signature. As a variant of DVS, strong DVS (SDVS), which exhibits perfect non-transferability, does not accommodate secure disavow ability (or non-repudiation). It makes a...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.