The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper considers a discrete-time modulus consensus model in which the interaction among a group of agents is described by a time-dependent, complex-valued, weighted digraph. It is shown that for any sequence of repeatedly jointly strongly connected digraphs, without any assumption on the structure of the complex-valued weights, the system asymptotically reaches modulus consensus. Sufficient conditions...
A symmetric signed Laplacian matrix uniquely defines a resistive electrical circuit, where the negative weights correspond to negative resistances. The positive semidefiniteness of signed Laplacian matrices is studied in this paper using the concept of effective resistance. We show that a signed Laplacian matrix is positive semidefinite with a simple zero eigenvalue if, and only if, the underlying...
According to the status measurement method of fine iron powder, we design an improved detection method to test grade of fine iron powder. We implement the function of on-line detection for fine iron powder. The method adopts the principle of balancing coil detection technology. We design and debug sensor and test circuit of the grade of fine iron powder. It realizes the different grade of fine iron...
MapReduce has emerged as a powerful tool for distributed and scalable processing of voluminous data. In this paper, we, for the first time, examine the problem of accommodating data skew in MapReduce with online operations. Different from earlier heuristics in the very late reduce stage or after seeing all the data, we address the skew from the beginning of data input, and make no assumption about...
We are in an age where people are paying increasing attention to energy conservation around the world. The heating and air-conditioning systems of buildings introduce one of the largest chunk of energy expenses. In this paper, we make a key observation that after a meeting or a class ends in a room, the indoor temperature will not immediately increase to the outdoor temperature. We call this phenomenon...
Service discovery is critical for mapping logical resource name to physical resources in large-scale distributed systems. The traditional Domain Name System (DNS) deployed on the Internet, however, suffers from slow-down, vulnerability for denial of service attacks, and does not support fast updates. To address these problems, a novel decentralized service discovery approach based on peer-to-peer...
TPCM is an essential part for a trusted computer. How to test and evaluate whether the trusted function can execute in a trusted computer is very significant. A risk assessment model for TPCM based on threat analysis is proposed, which considers comprehensively the essential factors of the information security risk assessment, including the asset, threat and vulnerability of TPCM. The risk computation...
Due to the insecurity of Internet, many enterprises and schools develop and adopt a Virtual Private Network (VPN) technology for secure intercommunication in this global open network. VPN arouses people's attention with its characteristics of safe, reliable, economical and effective transmission via a public network. This paper introduces the concept of VPN, its technological composition, classification,...
Trust platform is key technology of trusted computing. How to verify if a model is trusted in theory is a signification research work. In this paper, a trust level evaluation method of trusted computing model based on fuzzy logic is presented. By the similarity-based weighted fuzzy reasoning method, the fuzzy trust value between entities which have no direct recommendation in trust chain can be gained...
If only one bus in a multi-island power system is energized, the voltages at buses in the same island as the energized bus are non-zero, while the voltages at the buses in other islands are all zero. Based on this idea a network topology method by solving the equations whose coefficient matrix is adjacency matrix is presented. The elements of the coefficient matrix and the right-hand vector of the...
Practical teaching is a key link of cultivating mining engineering professional with creative ability. Based on innovative ideas, the computer innovation education in mining engineering formed by professional knowledge education in mining engineering and computer education provides an effective means to reform and perfect practicality teaching. According to the own characteristics of the computer...
To determine the need for the simulated training of e-commerce activities prior to working in the real environment, we studied the views of the undergraduates from several aspects. Two hundred university students were asked what the real problem was when they learned in e-commerce courses. Next, they were surveyed to inquire what knowledge do they really need when they go to their work positions and...
To improve the training speed of SVM, we propose a new SVM training approach which takes thick convex-hull as training set. The approach makes better use of the margin information for classification of data sets, and thus extends the use of convex hull to approximately linearly separable problems. Experiments on 5 UCI data sets indicate that the approach speeds up training of SVM with guarantee of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.