The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an algorithm of complete coverage path planning (CCPP) for mobile robot in unknown environment based on the Finite State Machine (FSM) approach and rolling windows approach. The rolling window approach is used to detect the local environments. The robot only uses on-board sensors to acquire a limited range knowledge of the surroundings and construct the rolling windows. Then it...
According to the research and analysis of auto-generating exam paper issues, identified auto-generating exam paper is a multi-objective constrained optimization problem, this paper puts forward mathematical models for auto-generating paper based on genetic algorithm. In this model, uses the properties of global-selecting-excellent and intelligent search of genetic arithmetic, on the basis of the every...
Broadcasting message via the social web, people always hope that the message goes through the most credible path, and would like to know trustworthiness on the most credible path and the least credible path. To solve these problems, this article defines the concepts related to the most credible path and the least credible path for single-source broadcast. Proposes algorithms on the most credible path...
Based on node influence, establishes a maximum spread model of single-source influence, defines concepts related to maximum spread of single-source influence, proposes the polynomial time algorithm of maximum influence on single-source, quantifies the largest node set influenced by single-source, computes the most influential node in a social network. Our algorithms significantly out-perform node...
Based on trustworthiness, defines a couple of concepts associated with trusted path, the most trusted path and the least trusted path. In order to look for the most trusted path and the least trusted path we propose two trusted path algorithms, which are proved to be really the most credible and the least credible; quantify the trustworthiness of the most trusted path and the least trusted path; and...
In the distributed network environment, delegation is increasingly necessary, so a delegation model based on UCON and Dynamic Fuzzy-Neural-Network (UCONDFNND) is proposed. The model considers the delegation and the credibility. The delegation solves scalability problem of distributed authorization, such as distracted implementation of a task. The delegation based on UCON makes the process of access...
The existing trust evaluation system do not provide adequate support to cope with quick change in users' behavior and falsification, so a new model based on time-frame is introduced. The model takes into account the impact of the time factor to the trust evaluation. There are four parameters in computing credibility: evaluation credibility, short-time-trust, long-time-trust, and cumulative-negative-trust...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.