The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Circle curve fitting is always the important issue of the engineering technology. The effect of circle curve fitting is influenced by both the data quality and fitting method. In this paper, using the special properties of circle, that's the error value of any two radius is zero. Then the method of circle curve fitting was proposed, by finding the minimum error distance between any two fitting points...
Existing bus travel time prediction methods only provide a point prediction value of bus travel time. Relevance vector machine (RVM) is proposed for solving the problem. By using a probabilistic Bayesian learning framework, RVM can provide probabilistic prediction and obtain prediction value and variance of prediction error. For making use of historical data and current information, the running time...
Arming at the characteristic of shrapnel multi-type and variable batch, developing tools Visual C++ 6.0 and Pro/Toolkit are used, the CNC system based on SmarTeam Data Model is put forward. Effective management and utilization are carried out which are in the fields of the processing parameter inquiring, experience inquiring and G code of numerical control cutting, milling, drilling, boring and so...
Isolation and identification of key components of the crude de-emulsifier produced by Bacillus mojavensis was studied. Organic solvent precipitation method was used to extract active ingredients from cell free broth. Crude products extracted by different solvent showed diverse de-emulsification activity. 84% and 73% of the de-emulsifier in cell free broth could be extracted successfully by using isopropanol...
Through mathematical models and game theory, this paper analyzes the optimal incentive contracts between enterprises and their project managers under asymmetric information condition in order to solve the problems in establishing incentive mechanism for project managers. Punishment mechanism is introduced and analyzed in the design of incentive mechanism for project managers. It expands the theoretical...
Selective classifiers can effectively improve the accuracy and efficiency of classification by deleting irrelevant or redundant attributes of a data set. Though many selective classifiers have been proposed, most of them deal with complete data. Yet actual data sets are often incomplete and have many redundant or irrelevant attributes. So constructing selective classifiers for incomplete data is important...
Security is a big challenge when wireless sensor networks are deployed in a hostile environment. Due to the computational and storage overheads, traditional asymmetric cryptographic protocols are not suitable for the resource-constrained wireless sensor nodes. Several key pre-distribution schemes have been proposed in literature to establish pairwise key between sensor nodes, but most of which only...
Secure and efficient communication among a set of mobile node is one of the most important research subjects in ad hoc wireless networks. Due to the resource scarcity in ad hoc networks, traditional key management protocol cannot be effectively applied to such decentralized networks. After study different strategies, in this paper the trust evaluation based clustering technique is employed to propose...
A new equipment of distinguishing rock from coal based on statistical analysis of Fast Fourier Transform (FFT) is invented which can be used in the mechanized caving coal locales. First, eight groups of sound signals which had been measured during caving are transformed by FFT. Second, using variance analysis method (Var), the FFT results are analyzed and the ratios(ER) of the low frequency energy...
In this paper, we present a new method for numerical differentiation of bivariate periodic functions when a set of noisy data is given. TSVD is chosen as the needed regularization technique. It turns out the new method coincides with some type of truncated Fourier series approach. A numerical example is also given to show the efficiency of the method.
Voice over Internet Protocol (VoIP) service has been a very popular and important application over the Internet. Recently, wireless mesh networks (WMNs) has been considered as a good solution for VoIP services due to low cost and convenience, easy deployment and larger area coverage. However, many relevant security issues have been raised for integrating IP Telephony into the existent applications...
Hexagons are an ideal shape for clustering sensor networks, because clustered areas can be seamlessly divided by the hexagons. In addition, hexagons are the largest regular polygon (in terms of the number of sides) that has this property. In this paper, we propose a novel scheme for subdividing a hexagonal cluster where sensors are densely populated and distributed uniformly throughout the cluster...
This paper analyzed the basic model for the e-payment industry with the agent under the guidance of Two-sided Market, and introduced the 2-stage game of adoption strategies for both the Platform and the Buyer. Then the authors made a deep through case study for three dimensions: speed improving, convenience improving and safety improving, mainly based on the functions of the agents in e-payment application...
With the increasing demand for dynamic network connections between multiple research networks, a number of issues on multi-layer hybrid networks need to be addressed, such as network representation, path finding, and path provisioning. This paper focuses on solving the multi-layer path finding problem by a declarative approach. The declarative approach uses Prolog and is compared to an imperative...
The method of cluster analysis is usually adopted in spatial data mining research, and this paper studies the theory of the two popular methods of cluster analysis, investigates the interesting ratio of 108 features and attributes in spatial database, uses these two methods respectively to analyze the statistics data and compare the two analysis to get the close results, at last, classifies the current...
Ecological environment is the primary condition for human being survival, social and economic development. The research of the regional ecological environment becomes more and more important to regional sustainable development in order to achieve the harmonious relationship between the person and the nature. In the process, the regional ecological environment spatial data which can express the spatial...
This note derives a novel alternative state-space formulation of 2D frequency transformation for 2D digital filters by utilizing linear fractional transformation (LFT) techniques. It turns out that the obtained new state-space formulation is much simpler than the existing result. Moreover, all the known 1D and 2D formulations can be unified by the proposed formulation as special cases. Numerical examples...
The Graphplan planner has enjoyed considerable success as a planning algorithm for classical planning problems. However, it is argued that this framework is too rigid to capture the full subtlety of many real problems. Hence, a new flexible planning problem is defined and flexible planning method emerges as the times require. This paper just makes research on flexible Graphplan and applies a novel...
Since Graphplan was proposed, intelligent planning has become a research focus in AI. This paper provides a new algorithm that extends Least Committed Graphplan to handling conditional effects. Different from the previous work on it, we employ the sub-mutex relations between action components, which makes the construction of planning graph much faster. In addition, we distinguish brotherhood components...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.