The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Radio Frequency Identification (RFID) technology is a contactless automatic identification technology. With the wide application of this technology in many fields, anti-collision algorithm to solve the problem of multi-tag identification becomes more and more important. The current RFID anti-collision algorithm is mainly divided into two categories: ALOHA based algorithm and tree based algorithm....
A novel differential evolution algorithm is proposed for constrained optimization problems (COPs). The proposed algorithm combines the ideas between the self-adaptive differential evolution algorithm (JDE) and simple penalty function method (SPFM). Simulation results on the bump problem show that the solutions of the new algorithm is better than those of the algorithms in the almost exiting literature...
A network topology algorithm based on SNMP was put forward and implemented. This algorithm could confirm the connection between ports and improve the efficiency of discovery through combining the topology discovery of the network layer and the link layer. It could solve the problem of subnet information redundancy and incomplete information of address forwarding table during the discovery. The experimental...
The traffic with tidal phenomenon in Heterogeneous Wireless Networks (HWNs) has radically increased the complexity of radio resource management and its performance analysis. In this paper, a Simplified Dynamic Hierarchy Resource Management (SDHRM) algorithm exploiting the resources dynamically and intelligently is proposed with the consideration of tidal traffic. In network-level resource allocation,...
It introduces the association rules correlation theory in detail, and analysis the classical Apriori algorithm performance, makes the improvement to it. Before the natural connection to generate the candidate set, conducting a pruning process based on the concept lattice similarity, to reduce the number of connected set, thus to reduce the generation of candidate item sets size, to reduce the number...
Fast Fourier Transform (FFT) is the basis of Digital Signal Processing (DSP). In this paper, a high performance FFT library using radix-2 decimation in frequency (DIF) algorithm is presented which is well suited for SIMD architecture. SIMD architecture microprocessors, such as Intel and AMD, allow parallel floating point operations on contiguous data in memory. A 128-point FFT based radix-2 DIF algorithm...
Intrusion detection is the process of identifying and responding to suspicious activities targeted at computing and communication resources, and it has become the mainstream of information assurance as the dramatic increase in the number of attacks. Intrusion detection system (IDS) monitors and collects data from a target system that should be protected, processes and correlates the gathered information,...
This paper introduces a new wavelet packet image compression algorithm called WP-SPECK which is based on the set partitioned embedded block coder (SPECK). The zerotree quantization coding which is successful for dyadic wavelet decomposition is not best for WP, because the parent-child relationships of tree structures are difficult to define and the probability of zerotrees are greatly reduced in the...
In this paper, a new rate adaptive control algorithm is proposed based on study of JPEG2000 rate control algorithm, in order to reduce the amount of bits sent to the arithmetic coder, without any significant changes into the standard architecture and without loosing performance. After wavelet transform, the coefficient is modeled as Gaussian distribution, but remove the offspring of the lowest frequency...
Document image binarization plays an important role in image segmentation and its effect directly impacts on the quality of the OCR recognition system. However, binarization is difficult for camera-based document images with poor contrast or illumination. In this paper, we propose a binarization algorithm, called NFCM, for camera-based document image. NFCM, a local threshold method, is a combination...
LDT and LDT-P Algorithms are proposed, which fit for linear and parallel service composition respectively .Composition Agent is responsible for searching components and generating a least delay tree. Then candidate paths are found by visiting the tree nodes with the depth-first traversal scheme. At last a path is selected for composed service considering the capability of the nodes and the bandwidth...
In embedded system, how to utilize the limited physical storage capacity for code parameters is a challenging problem. This paper proposes a dynamic programming based algorithm to solve this problem under DOCSIS standard. The algorithm is able to generate the best storage structure of parameters in terms of the width of the bus, the priority and least storage spaces of those parameters. The algorithm...
The composed service for the complicated business appeared with the boom of electronic commerce. Previous routing algorithms designed for the linear and parallel service composition are not feasible since there are multiple interactive messages between service components. The feasible composed-service scheme selection algorithms are present, which regards delay as a prior consideration while finding...
Ant colony algorithm is a new simulation-biological evolution algorithm. ACA Applications in the logistics distribution system were analyzed. During the process of constructing the logistics distribution system, logistics center location was optimized by ACA, which guarantees highly effective logistics supply. Logistics route optimization offers the optimization route of goods transportation. And...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.