The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper we study on the alert analysis technique of Network Situation Awareness (NSA). The overwhelming alerts make it challenging to understand and manage. Although there are already many alert analysis techniques proposed in Intrusion Detection research area, most of them are used to reduce false positives and false negatives. However, the NSA requires the alert analysis techniques to offer...
Speech recognition result is always evaluated by dynamic programming algorithm which can find the best match between recognized results and references. And the match unit could be word, syllable, phone and so on. However, in mandarin speech recognition, this traditional algorithm is not accurate because of the unique characteristics of Chinese word-formation. In order to improve evaluation performance...
The Choquet integral has been applied in data mining, such as nonlinear multiregressions and nonlinear classifications. Adopting signed efficiency measures in the Choquet integral makes the models more powerful. Another idea for generalizing the above-mensioned models is to use a linear core in the Choquet integral. This has been successfully used in nonlinear multiregression. However, there is a...
This paper deals with steering control problem of a computer simulated model car with fuzzy control approach. For simulating the real environment, the stochastic behavior of system is considered as multiplicative noise term. In addition, the external disturbance effect on system is also discussed for achieving attenuation performance by applying passivity theory. Through using the Takagi-Sugeno (T-S)...
This paper presents a modified R-learning according to the traditional average reward reinforcement learning algorithm. Reinforcement learning problems constitute an important class of learning and control problems faced by artificial intelligence systems. The general framework of reinforcement learning can be divided into two forms, discounted reward reinforcement learning and average reward reinforcement...
From software architecture perspective, the software architecture is described by layer. We propose a model which is used abstract data type to formal describe elements of each layer of software architecture. Using the model mainly describes the relationship among elements of the software architecture. Based on the abstract data type theory, we can make operation on the model and we divide software...
This paper has analysed the a priori algorithm performance, and has pointed out performance bottleneck question of the a priori algorithm. Currently those algorithms to mine association rules only pay attention to one aspect of efficiency or accuracy respectively. There is a paradox between efficiency and accuracy. In order to resolve to this conflict, a novel algorithm based on probability estimate...
With the development of high rate data transmission technology via distribution line communication, the electric power, data, voice and video can be transferred in the same electric power distribution network, and the technology will be put in operation widely in the future. However the traditional technology of power line communication is not adaptable to the complex and harsh environment of distribution...
In terms of Gauss-Newton (G-N) nonlinear least-squares algorithm, if J(x) is rank-deficient, then either the Gauss-Newton method cannot work well, or the algorithm converges to a non-stationary point. To overcome the difficulty, in this paper we consider employing trust-region technique, and propose Levenberg-Marquardt (L-M) algorithm. In L-M algorithm, damping term mukI is added to G-N algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.