The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The optimal thermal design issue of a forced aircooled heat sink to obtain satisfied performance indices such as thermal resistance, pressure drop, geometry, total weight and cost is great of practical value for the stable and safe operations of a power electronic equipment. This paper formulates this issue firstly as a typical constrained optimization problem by considering the entropy generation...
The admissible tracking consensualization problem and the admissible containment consensualization problem of singular multi-agent systems are discussed. The sufficient and necessary condition to achieve the above two admissible consensus problems are provided. At the same time two constructive algorithms are presented to design the gain matrices of protocols. Two numerical examples are given to show...
This paper proposes a novel surrogate assisted multi-objective evolutionary algorithm based on decomposition (s-MOEA/D) for the design of electric motors. The idea is to improve the surrogate gradually during the optimization. Simulation results show that the proposed method can outperform a regular multi-objective optimization algorithm with only a small portion of the computational cost.
In quantum cryptography network routing selection is an important task for performing end-to-end key agreement. In the paper, we propose a stochastic routing algorithm based on distance vector and residual key bits. The main idea is that after all the shortest paths have been obtained, the communication key bits can be transmitted randomly in any path with enough residual key bits. Simulation results...
The thousands of streaming data overwhelmingly provide for Internet users on Twitter every day, especially for those Twitter users with many friends. However, the useful tweets that users are really interested in personally could be covered by massive other uninformative and uninteresting information. Therefore, how to bring immediately the interesting tweets for users is always a challenging issue...
After long time cognitive work, most of people confronted with the mental fatigue, which can decrease the classification accuracy of cognitive, or even cause the traffic accidents for drivers. Therefore, the detection of the fatigue state is very essential. The study aims to explore an effective and novel approach based on electroencephalogram. All participants were instructed to implement the spelling...
A combination of dynamic adjustment method and multi-robot task allocation auction algorithm is presented, which is an efficient algorithm to solve task allocation problem of multi-robot cooperative hunting. Firstly, this paper optimizes the auction algorithm which can improve the coordination and negotiation performance in multi-robot system and greatly reduce the amount of communication and computation...
As Network Function Virtualization (NFV) becomes reality and cloud computing offers a scalable pay-as-you-go charging model, more network operators would like to outsource their Service Function Chains (SFC) to the public clouds in order to reduce the operational cost. However, how to minimize the operational cost with Quality of Service (QoS) guarantee when outsourcing SFC is still an open problem...
An improved multi-objective artificial bee colony algorithm is designed in this paper reflecting the multi-objective characteristic of multi-robot path planning problems. Firstly, the foraging mechanism is optimized and a new method to calculate crowding distance is proposed. The restructuring and elimination mechanism of food sources are also presented. Secondly, an improved environment map representation...
Many ID-based strong designated verifier signature schemes have been proposed in recent years. However, most of them did not give the rigorous security proofs and did not satisfy the strong ness property that anyone except the designated verifier cannot check the validity of a designated verifier signature, In addition, considering some special applications, these schemes have larger data size of...
The multi-sensor image fusion technology can obtain a more accurate and reliable image to understand the scene or recognize the target more easily. However, most existing algorithms are mainly based on optical images, which are highly susceptible by media interference, and cannot save the textural feature and color information at the same time. In view of these problems, this paper presents a multi-sensor...
The impact of process variation has been more prominent in nano-technology, and it poses great challenge to timing analysis for digital VLSI. Traditionally, this problem is solved by using statistical static timing analysis (SSTA). However, static timing analysis may lead to an overly pessimistic estimation, as many critical paths are not true paths. In this paper, we present a fast SSTA method, in...
We introduce a novel Multi-Carrier Code Division Multiple Access (MC-CDMA) system, where random sparse signatures are deployed in the frequency domain. Data symbols transmitted from base station (BS) to mobile stations (MSs) are drawn from discrete finite alphabets, such as M-QAM constellations. Transmitter-based precoding is introduced so as to allow simple despreading followed by single-user detection...
The traditional way to the contention based random access has great limitation on account of only considering solving the all collision by sending Msg4. In order to meet the 3rd Generation Partnership Project (3GPP) standard low delay for the TD-LTE (Time Division Long Term evolution) system, this paper designs a random access procedure. The main idea is to form a corresponding relationship between...
Based on the analysis of the process of data masking, the formal definition of data masking was presented and a generic data masking model was proposed from a theoretical point of view. The key problems and algorithms of the model were described and analyzed. The generic model can ensure similarity and availability of data without the leakage of sensitive data. So it has a strong practical value.
Binary k-out-of-n system is a commonly used reliability model in engineering practice. Many researches have extended the concept of k-out-of-n system to multi-state k-out-of-n systems. This paper proposes a binary decision diagram (BDD) based approach for binary k-out-of-n system: G system and a multi-state multi-valued decision diagram (MMDD) based approach for multi-state k-out-of-n: G system. BDD...
In this paper, a multi-tag anti-collision method with collision signal recovery for UHF RFID systems is proposed. Signal recovery of 2 tags or 3 tags is adopted in the algorithm and the frame size is optimized accordingly. Simulation results show that the average system efficiency of the proposed anti-collision algorithm can be up to 67%, while the system efficiency of the algorithms without adopting...
There is always much difficult in the MR image segmentation. Although fuzzy c-means(FCM) clustering algorithm has been widely used in the field of image segmentation study, some inherent deficiencies of this algorithm especially the high cost of computation made the algorithm to be difficult widely used in practice. A novel algorithm, based on kernel fuzzy c-means (KFCM) clustering algorithm and the...
Management of multi-echelon with transshipments is an effective approach to improve support effectiveness. A common assumption in early papers is that transshipments are allowed between all locations. However, this configuration may not be the best choice in many fields. Focusing on the problem, a system where transshipments are allowed only in one direction is provided. Such policies may be of interest...
A new algorithm is suggested in this paper to solve discrete Lyapunov matrix equations. First, we design the algorithm to solve the matrix equations, of which coefficient matrices are of Frobenius form. Then, we extend this method successfully to general discrete Lyapunov matrix equations by similarity transforming their coefficient matrices. Finally, numerical results show that the new algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.