The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Density-based clustering is a good solution for classifying enormous data without any early knowledge. In this paper, the focus is distance measure of dense regions, which can be set adaptively. By translating a density threshold selection problem into a determination problem of the spherality radius, a novel density-based clustering algorithm based on determination of density threshold is proposed...
Online social networks provide us a convenient way to access information, which in turn bring the information overload problem. Most of the previous works focused on analyzing user's retweet behavior on the micro-blogging system, and diverse recommendation algorithms were proposed to push personalized tweet list to users. In this paper, we aim to solve the overload problem in the mention list. We...
This paper studies the fundamental problems of mining association rules. Based on the summary of classical mining algorithm and the inherent defects of Apriori algorithm, some related improvements are researched. In order to avoid scanning the database multiple times, the database mapping method is changed in this research. Meanwhile, after the support of candidate item sets is get, each candidate...
Location-based measurement equipments are widely used in practice. However, the traffic data they collected are restricted in small spatial scale. Recently, more and more trajectory-based equipments are introduced in field. Floating cars and cell phones are two promising products. Since large market penetration of cell phones, they have attracted more and more attention. The use of cell phone signals...
Solution of the problem of fault accommodation in nonlinear dynamic systems is related to constructing the control law which provides full decoupling with respect to fault effects. Existing conditions are formulated and calculating relations are given for the control law.
In this paper, toll collection data in Guang Dong province are investigated. After pre-processing data, we obtain spatial characteristics and temporal characteristics of OD-Matrix, and further we take insight into the travel times among different vehicle types. The results obtained in this paper extend the corresponding results given in previous works. The study is very important to traffic management...
In this paper, a new approach of business process modeling-hierarchical modeling, is put forward. The core idea of this approach is the standardization of model symbols and the process of modeling. The business process model which is built by this approach is fit for the optimization for the purpose of BPR.
Production quality in the food production supply chain is studied in this paper. The deficiency of quality monitoring existing in traceability systems is analyzed. An abnormality diagnosis algorithm, pre-warning method and pre-warning system are presented. The potential production abnormality of the logistics unit in the whole supply chain is diagnosed; a warning is generated; and decision support...
According to characteristics of perpendicularity error evaluation of planar lines, particle swarm optimization (PSO) is proposed to evaluate the minimum zone error. The evolutional optimum model and the calculation process are introduced in detail. Compared with conventional optimum methods such as simplex search and Powell method, it can find the global optimal solution, and the precision of calculating...
With the development of Mobile IPv6 and multicast technology, mobile multicast becomes a research hotspot. Based on two basic mobile multicast methods, the Bi-directional Tunnel (BT) method and the Remote Subscription (RS) method, some mobile multicast schemes have been proposed. However, most of them evaluate the performance by means of analysis and simulation, but lack of testing the performance...
Software as a service (SaaS) is an important technology innovation as well as a business model innovation to bring new opportunities to small and medium enterprises (SME). There are different SaaS provisioning methods, depending on the customer profile, the cost of the required resources, and the price that customers are willing to pay. The core technology of SaaS-ization focuses on multi-tenancy,...
This paper proposes a cloud service model that centers around customer business requirements. The model covers the customers' subscribed services and the service providers' offered cloud services. It covers the relationship among offering versus subscription, cloud infrastructure service versus cloud application service, configuration versus customization of cloud services, etc. It then depicts a...
Lots of works have showed that the wireless LAN frame traffic is self-similar and obeyed in the heavy-tailed distribution. This paper analyzes a frame traffic data collected from real IEEE 802.11 networks, and studies the impacts of each type of frame traffic (management frame traffic, control frame traffic, data frame traffic, and retransmission frame traffic) on characteristics of self-similarity...
Source address authentication is very important to change current serious network security situation. In this article, we propose a new source address validation scheme based on IBS algorithm and study its security using SVO logic. We find that our scheme can successfully guarantees authenticity of IP packetpsilas information source.
In this study, we analyze the impact of different types of frame traffic on the self-similar behavior of the aggregated frame traffic, collected from the IETF 2005 conference. Our measurement results show that the different types of frame traffic have various impacts on the self-similarity of the aggregated frame traffic in different session periods, and these impacts are simultaneously related with...
Passport is a new secure and adoptable source address validation technique, which has attracted fully attention. In this article, we research into the efficiency of Passport. First of all, we build a mathematical model to describe Passportpsilas function, then propose an evaluating indexes, at last we use Brite generate a Power-Law network topology and design correlative algorithm to quantitative...
With the digital technology developments, Digital Cinema outperforms traditional films and attracts the movie industry. The first edition Digital Cinema System Specification was released by Digital Cinema Initiatives, LLC (DCI) in 2005, which advances the Digital Cinema development. We have developed a Digital Cinema Playback system compliant with the DCI Specification. It can extract and play the...
We propose an area-based local stereo matching algorithm that yields accurate disparity estimates, while achieving the real-time speed completely on the graphics processing unit (GPU). For a local stereo method, the key challenge is to decide an appropriate support window for the pixel under consideration. Our stereo method starts with computing an upright local cross adaptively for each anchor pixel,...
The texts recognized from a piece of Chinese handwriting and the speech corresponding to the same handwriting, respectively, are complementary to each other. A better text, thus, can be obtained by fusing the two texts, since a fused text can contain more semantic information. The fused text should cover all characters in the two texts and these characters can be arranged in any order. There are four...
In this paper, an improved adaptive fault estimation algorithm is proposed for a class of polytopic linear parameter varying (LPV) systems. The conventional adaptive fault estimation design method suffers from low performance of the fault estimation and a strict equation constrain, so a novel fast adaptive fault estimation (FAFE) design method proposed in this paper not only enhances the performance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.