The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Determination of the benchmark interest rate is the core under the marketization of the interest rate. Shibor is established for cultivating the standard rate in our country. It is essential to see whether Shibor can be the standard rate in our monetary market. In this paper, we will get solutions to this issue and make further suggestions by researching the relationship between Shibor and other market...
In many applications involving the multiple criteria optimal decision making, users may often want to make a personal trade-off among all optimal solutions. As a key feature, the skyline in a multi-dimensional space provides the minimum set of candidates for such purposes by removing all points not preferred by any (monotonic) utility/scoring functions; that is, the skyline removes all objects not...
In this paper, we use statistical methods to establish a keystroke biometrics model to authenticate a user's identity by predicting the user's keystroke behavior characteristics. We use HMM for keystroke sequence analysis and time series to compute the state output probability of HMM used in keystroke biometrics model. At the authentication phase, we use modified forward algorithm to compute the users'...
On the basis of rough sets, by considering both the dynamic characteristics of the set x and the statistics information in the knowledge database, this paper constructs bidirectional probabilistic PS-rough sets model in probabilistic approximation space, discusses property and theorems of PS-rough sets, proves that PS-rough sets is the further extension of S-rough sets and Z.Pawlak rough sets, S-rough...
Instant wireless sensor network (IWSN) is a type of WSN deployed for a class of special applications which have the common requirement on instantly responding for collecting and transmitting sensory data, e.g., volcanic eruption monitoring or nuclear leakage detection. In this paper, having a cluster-based WSN, we present a compensation-based reliable data delivery protocol (CRDD) to collect and transmit...
How to composite Web service is one the most important problems of next generation Internet (NGI) researching. In order to reuse complex service for service composition, multi-scale Web service composition (MSWC) is proposed. Inspired by word segmenting algorithm, service composition can be achieved by diving service request into several groups and mapping these groups into existed complex services...
Many emerging technology firms (ETF) are usually indebted and on deficit at the early stage due to the market or technology factors. In this research, we use stochastic integral techniques to measure the default probability of these ETF before the maturity date of debt. By measuring default probability, the credit risk of the ETF can be predicted and assessed.
This paper studies how the concept of global optimization can be modeled in granular computing. The basic mathematical theory is filled function method, one of the effective deterministic global optimization methods. Such filled function method is viewed as a new computing architecture that is focused on processing information granulation. Based on the modified concept of filled function, we propose...
Uncertain data are inherent in many important applications. Recently, considerable research efforts have been put into the field of managing uncertain data. In this paper, we summarize existing techniques to query and model uncertain data and systems that effectively manage uncertain data, mainly from a probabilistic point of view.
In some industrial areas, wireless sensor network (WSN) is widely used. Hierarchical cluster-based architecture is a common type which has some extraordinary performance on energy-saving and special applications. However, because of its special character, two-level architecture, the cluster heads (CHs) easily become the targets of enemy. Although traditional secure approaches can provide some network...
Evaluating radiant threat rank is an important part of situation assessment and attack decision. All factors which would affect the assessment are analyzed. The advantages of experts system based on dynamic Bayesian network are given. After that, the theoretical model and its algorithm based on dynamic Bayesian network are presented and discussed. Finally, the model is established and simulated according...
In our previous work [11], we derived detection delay and detection probability for a randomized scheduling algorithm in wireless sensor networks. In this paper, we study asymptotic coverage, prove many mathematical lemmas, and study properties including asymptotic properties of network coverage intensity, detection probability, and detection delay in wireless sensor networks.
Internet congestion algorithm decides the queue sizes and quality of service (QoS) of network. Based on the mechanism of Internet congestion control, a new active queue management (AQM) algorithm based on the fuzzy logical controller (FLC) is presented. When the system states are far off the equilibrium, a sliding-mode controller (SMC) is applied to control the states returning the neighbor of the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.