The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Attention mechanism advances the neural machine translation (NMT) by reducing the confusion introduced by irrelevant words in long sentences. However, the confusion caused by ambiguous words hasn't been handled yet and it may be a bottleneck for the NMT model. This paper validates the hypothesis and proposes a simple and flexible framework, which enables the NMT model to only focus on the relevant...
This paper presents the design and implementation of a highly efficient Double-precision General Matrix Multiplication (DGEMM) based on Open BLAS for 64-bit ARMv8 eight-core processors. We adopt a theory-guided approach by first developing a performance model for this architecture and then using it to guide our exploration. The key enabler for a highly efficient DGEMM is a highly-optimized inner kernel...
Molecular Dynamics (MD) simulations have been widely used in the study of macromolecules. To ensure an acceptable level of statistical accuracy relatively large number of particles are needed, which calls for high performance implementations of MD. These days heterogeneous systems, with their high performance potential, low power consumption, and high price-performance ratio, offer a viable alternative...
Visual attention model is a hotspot in the field of multimedia understanding. It is quite helpful for multimedia processing especially in the case that the human vision should be considered. In this paper, a novel information hiding algorithm based on Stentiford visual attention model is proposed. By embedding less information in sensitive region, the invisibility of image with hidden information...
In this paper, we present an efficient hybrid method based on finite element (FE) and rigorous coupled wave analysis (RCWA) to model scattering from 3-D doubly periodic dielectric structures. The mode expansion technique is used as boundary truncation scheme. This scheme allows truncation boundaries to be placed close to dielectric grating, thus significantly reduces the size of the problem. Comparisons...
During the expressed of the virtual battlefield situation, a lot of irregular objects have to be simulated. Particle system is an effect way for the modeling of fuzzy object, which need dynamic modeling. We expatiate on the application of the particle system from the aspect of tactics situation express and from two aspects: combat entity simulation and environment entity simulation, and analyzing...
Using classical transmission line steady-state model and based on the three-pulse harmonic voltages of the rectifier side and the inverter side, this paper describes an approach to calculate the DC side harmonic currents in HVDC systems, including the harmonic currents flowing directly in the DC line and the grounding electrode line, as well as the harmonic currents induced in their lightning shield...
Intrusion Detection System (IDS) is the key technology to ensure the security of dynamic systems. We employ a sequential pattern mining approach to discover significant system call sequences to prevent malicious attacks. To reduce the computing time of generating meaningful rules, we design a weighted suffix tree structure to detect intrusive events on the fly. The experimental results show our method...
Nowadays, the cloud computing exists on the Internet. And Google already allows people port some of their personal data to the Internet and use its Web-based software. If there is no cloud computing, which is impossible, in this paper, author will introduce Google sites, it is a case that the Cloud computing applied in the network learning environment. Google sites offer a free (and ad-free) Set of...
This paper presents a parameter identification method of nonlinear Hammerstein model with two-segment piecewise nonlinearities. Its basic idea is that: First of all, expressing the output of the Hammerstein nonlinear models as a regressive equation in all parameters based on the key term separation principle and separating key term from linear block and nonlinear block. Then, the unknown true outputs...
In view of complexity of the construction engineering quality and fuzziness of quality evaluation, AHP-based multi-level fuzzy comprehensive evaluation become the advantage model for construction engineering quality assessment. The core computing of Fuzzy Evaluation is the membership conversion; however, membership conversion way at present has a problem of redundancy. Because of this, we use entropy-based...
Three parallelization approaches used in the program of discharge simulation along resin insulator surfaces in SF6/N2 gas mixture which initially consumes a great deal of computational time and suitable for implementation on computer systems with symmetric multiprocessor (SMP) architecture are developed and validated in this paper. The approaches include: (i) static domain decomposition using a distributed...
The paper presents a quaternion-based attitude control algorithm which is subject to control input constraints for rigid spacecrafts. Lyapunov theory is employed to prove the global asymptotic stability of the zero equilibrium points of the close loop system. Also the algorithm is validated by the corresponding hardware-in-the-loop (HIL) simulation using a single-axis air bearing table and other hardware...
The prominent virtues of grey prediction are small information, few data and a little of computation. The conventional PID controller has strong robustness, sophisticated technology and simple structure, so it has been used widely in the process control. With the adjustable role of feedback response of biological immune systems, the capability of simulating non-linear functions with fuzzy rationalizing...
Based on the characteristics of the equipment support and the current war factual situation, the rush-repair task of damage equipment was classified according to different urgent level. Then the rush-repair task assignment model was made based on the urgent level of the damaged equipment, and the method is given to solve the model. Finally, the example validates the model and the result indicates...
In computer vision system, detection of moving targets has interference in subsequent processes including classification, tracking and recognition. Background subtraction method is commonly used in image segmentation for moving region of video. This paper puts emphasis on background model update based on mixture models of Gaussian in complicated situation, and implements an adaptive learning method...
This paper analyses production scheduling system in re-entrant line, and presents a simulation model of the manufacturing system which is based on MAS (multi agent simulation) and HLA (high level architecture). According to the model, a related simulation system is developed with Jade and Jess as developing tools to stimulate the manufacturing system, and a new model of constructing ant algorithm...
This paper researches the production scheduling system, and presents a simulation model of the manufacturing system which is based on MAS (multi agent simulation) and HLA (high level architecture). According to the model, a related simulation system is developed with Jade and Jess as developing tools. Specific scheduling algorithm or rule is turned into conducting rules of agent. The system can describe...
The network traffic is the important parameter that measures the burden of network movement and network appearance. It also plays an important role in network layout, traffic management. In traffic management, traffic model is used to evaluate the mechanism of join control and predict network performance. The grey model and neural network have good effect in reflecting the variable trend of data....
An algorithm was developed to quickly generate a virtual terrain in a parametric 3D based bridge modeling system. The terrainpsilas details was increased by using the fractal theory, a quadtree data structure was used to store triangulation irregular net (TIN) in order to accelerate the retrieval of the triangle containing the given point, the triangle retrieved was subdivided by sparse control points...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.