The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Users in social networks can follow and be followed to establish all kinds of cliques. Users' rankings in followed numbers show their popularities, which is an important measurement for social network analysis. In order to give a fast answering for ranking queries, we proposed four methods, ISH, HDD, BBT and SMH. ISH uses inverted sequential hash, HDD is a combination of blocking and hierarchy, BBT...
Pattern recognition is a significant field in contemporary high-tech research and it has a broad range of applications, but its application in geotechnical engineering is still at primary stage. Slope stability problem has been an important issue in geotechnical engineering. According to the randomicity and uncertainty of the influencing factors in slope stability prediction, utilization of the good...
Intrusion detection systems (IDS) are developing very rapid in recent years. But most traditional IDS can only detect either misuse or anomaly attacks. In this paper, we propose a method combining artificial immune technique and principal components analysis (PCA) neural networks to construct an intrusion detection model capable of both anomaly detection and misuse detection. Initially an artificial...
Intrusion detection technique has become increasingly important in the area of network security research. It is innovative that various soft computing approaches have been applied to the intrusion detection field. This paper presents an intelligent intrusion detection system which incorporates several soft computing techniques to implement either misuse or anomaly detection. Genetic algorithm is used...
With the growing rate of network attacks, intelligent methods for detecting new attacks have attracted increasing interest. This paper presents an approach incorporating several soft computing techniques to construct a hierarchical neuro-fuzzy inference intrusion detection system which can implement either misuse or anomaly detection. In the proposed system principal component analysis neural network...
The paper reports a systematic study of the resonance-mode effect on mass-sensing performance of resonant microcantilevers by both analytic and experimental methods. Firstly the research reveals that the in-air mass-sensing resolution of resonant microcantilevers is dominated by air-drag loss limited Q-factor. Using theoretic analysis and software simulation, we conclude that a higher order mode is...
An approximation controller is developed to obtain an optimal control for nonlinear networked control systems (NCS) with time delay. In the approach only the non-linear compensating term, solution of a sequence of adjoint vector differential equations, is required iteration. By taking the finite iteration of non-linear compensating term of optimal solution sequence, a suboptimal control law for NCS...
Severe noise and interference on the upstream channel in the HFC system and noise funneling effects are very hard. These noise and interference abstract as narrow band interference and take a nonlinear suppression measure from the point of signal processing. High efficient nonlinear suppression arithmetic MLMS/MRLS/MFTF can be applied in the narrow band interference suppression. The SNR improvement...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.