The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the Elastic Net method is applied to longitudinal data model which appears in network marketing. It not only makes us better understand the impact of big data on a variety of marketing activities, but also allows companies to better play its effectiveness. The Elastic Net estimation of longitudinal data model is established and proved that this model has the nature of group effect....
Transactional memory has been proposed as an alternative to the traditional lock-based approach to express and manage concurrency in the multicore era. Among transactional memory techniques, software transactional memory (STM) is the most flexible and widely researched. However, researches show that STM suffers performance problem. In this pager, we present an overhead model for STM and our model...
As sensors are energy constrained devices, one challenge in wireless sensor networks (WSNs) is to guarantee coverage and meanwhile maximize network lifetime. In this paper, we leverage prediction to solve this challenging problem, by exploiting temporal-spatial correlations among sensory data. The basic idea lies in that a sensor node can be turned off safely when its sensory information can be inferred...
In this paper, we propose a novel trust management scheme for improving routing reliability in wireless ad hoc networks. It is grounded on two classic autoregression models, namely Autoregressive (AR) model and Autoregressive with exogenous inputs (ARX) model. According to this scheme, a node periodically measures the packet forwarding ratio of its every neighbor as the trust observation about that...
In this paper, the author make the grey forecast united with the fuzzy synthetic assessment to determine the regional classification problems for regulating and planning groundwater. In this case, the following models are adopted to forecast the water quality system: GM(1, 1) model groups, GM(1, 1) residual difference model, GM(1, N), GM(1, 1) Weighted model.
Distributed GIS system's data security, especially access control, has become an indispensable function component in the practical application of distributed system. However, current approaches to access control are mostly based on individual user identity; hence they do not scale to distributed systems. In this paper, a new access control mechanism which is the combination of trust and role-based...
The study applies Asp.Net Web Service technology to develop network services and technology such as COM-MapObjects and XML to develop client software. Finally, a water resources management decision support system has been developed on the basis of C/S (Client/Server) and ComGIS. The system implements dynamic management, timely updated information about water resources management, visual query, visual...
In this paper, we present our study of extracting a mobility model for vehicular ad hoc networks (VANETs) from a large amount of real taxi GPS trace data. In order to capture characteristics of the urban vehicle network from microscopic to macroscopic aspects, we design three parameters and extract their values from the GPS trace data. Using this mobility model, we can generate the synthetic trace...
The traditional error control coding of channel has no long satisfied the requirement of the deep space communication, because of the long delay, great error rate, probability of packet loss, links easily interrupted and so on. The Fountain codes, used in deep space communication, has been introduced and analyzed. The coding and decoding process of LT codes of Fountain codes has been introduced and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.