The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and verify in design process of application model for trusted computing and analyze its trust in theory. In this paper the problems of security and trust...
In this paper, the notion of an three-band Generalized Multiresolution Structure(GMS) of L2(R) is introduced. The properties of affine pseudoframes for subspaces with three-scale is characterized. The construction of a GMS of Paley-Wiener subspaces of L2(R) is investigated. The pyramid decomposition scheme is derived based on such a GMS. As a major new constribution the construction of affine frames...
In this article, the notion of biorthogonal two-direction compactly supported wavelet packets with a positive integer dilation factor ?? is introduced. A new approach for constructing biorthogonal two-direction wavelet packets is developed and their properties is investigated by means of time-frequency analysis method, matrix theory and operator theory. The formulas for performing iterations and decomposition...
In this article, the notion of biorthogonal two-directional compactly supported wavelet packets with a positive integer dilation factor is introduced. A new approach for constructing biorthogonal two-directional wavelet packets is developed and their properties is investigated by means of time-frequency analysis method, matrix theory and operator theory. The formulas for performing iterations and...
With the growth of network in size and complexity, the isolated security systems are facing many challenges and they can not meet users' needs. As a new type of network, trusted network can make up for security defects of traditional network, change from passive recovery to active attack and end vicious network behaviors from head. Researching trusted network model is popular nowadays. Based on BLP...
With the expansion of the Web, automatically organizing large scale text resources, e.g. Web pages, becomes very important. Many Web sites, like Google and Yahoo, use hierarchical classification trees to organize text resources in Web. User can easily find the text resources that meet their requirements by navigating these hierarchical classification trees. Typically, the text resources in Web are...
Set the Chinese text sets into two classifications and determine whether the information is in the field of Chinese maritime by a two-classifier which is guided by multiple semantic. Eventually it gets Chinese maritime information set so that we can custom maritime information. We call this information system for the Chinese Marine engine. Experiments show that the Chinese Marine engine achieves good...
This paper presents a data purification algorithm based on outlier mining. In order to implement the purifying of training data, we define the central bias function of complex events and dissimilarity function of event set, and put forward an exception set growth algorithm based on bias priority. Experiment proves that the algorithm can solve non-deterministic polynomial hard and control the algorithm...
Wavelet analysis has been developing a widely used mathematical branch for twenty years. In this work, the notion of biorthogonal multiple vector-valued trivariate wavelet packets is introduced. A new feasible method for designing them is presented. Their properties are characterized by using time-frequency analysis method, matrix theory and finite group theory. Three orthogonality formulas are established.
Multi-scroll chaotic system has found important applications as broadband signal generator and true pseudorandom number generator for communication engineering. In this paper, an active control method is proposed to projective-synchronize two n-scroll chaotic Jerk systems. The proposed technique is applied to achieve generalized projective synchronization for the chaotic system, where all state variables...
This paper studies self-triggering in sampled-data systems, where the next task release time and finishing time are predicted based on the sampled states. We propose a new self-triggering scheme that ensures finite-gain L2 stability of the resulting self-triggered feedback systems. This scheme relaxes the assumptions in that the magnitude of the process noise is bounded by a linear function of the...
This paper presents a new image labeling approach that implicitly incorporates top-down information using content-based image retrieval (CBIR) with conditional random field (CRF) model. To reduce the content ambiguities a small content similar training set for CRF labeling is built using retrieved matches from CBIR. To achieve global consistency of image labeling, a novel CRF probabilistic model with...
This paper proposes a granular ranking algorithm for mining market values, gives the framework of algorithm and the concrete algorithm steps. The core of new algorithm is the construction of granular ranking function rG (x), which guides instances in the testing dataset finish ranking. The ranked result has a strong readability. The new algorithm improves the computation efficiency further relative...
Law enforcement agencies need to discover underlying patterns of crimes in a short time. One of the key steps is associating related criminal incidents with each other. This paper describes a new methodology to associate crime incidents automatically, as well as, accurately by using narrative information. Specifically this paper shows a new method for measuring the similarity between crime incident...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.