The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to guarantee data reliability in distributed storage systems, erasure codes are widely used for the desirable storage properties. Nevertheless, the codes have one drawback that overmuch data are needed to repair a failure, resulting in both large bandwidth consuming in the network and high calculation pressure on the replacement node. For repair bandwidth problem, researchers derive the tradeoffs...
To overcome the weakness of the slow convergence of the velocity component in the state vector in the classical Kalman filter (KF), a velocity item, the position difference of the observations, was introduced to serve as the observation velocity to rectify the prediction velocity and accelerate the convergence speed of the state vector, and then improve the tracking instantaneity. A modified mixed...
The simulation of space microgravity environment is indispensable during the development of space robot since its performances should be examined and enhanced before sent into space. However, the existing methods, such as air flotation method, hanging wire method and buoyancy method, etc., are very expensive and complex. A low-cost microgravity simulating system is proposed in this paper. In this...
Recently, HPC in the Cloud has emerged as a new paradigm in the field of parallel computing. Most of cloud systems deploy virtual machines for provisioning resources. However, in a virtual machine environment, there is still no mature method to analyze performance of MPI parallel programs. In this paper, we propose a series of innovative methods for performance analysis of MPI parallel programs on...
This paper proposes a new social network model - Preference Memory Network (PMN) to overcome the common deficiency that existing network models do not take into account the heterogeneity of nodes and the memory feature on node connections preference. Experimental results shows that Preference Memory Network model have small-world, scale-free, high clustering coefficient and short average shortest...
Regenerating code is a class of storage codes that achieve the optimal trade-off between storage capacity and repair bandwidth, which are two important performance metrics in data storage systems. However, existing constructions of regenerating codes rely on expensive computational operations such as finite field multiplication. The high coding and repair complexity limit their applications in large-scale...
In distributed storage systems, a data file is encoded and distributed to storage nodes, such that the data file can be recovered from some subsets of the nodes. Upon the failure of a storage node, we want to repair it efficiently by contacting and downloading some encoded bits from a small number of surviving nodes. Using projective-geometric self-repairing codes (PSRC), proposed by Oggier and Datta,...
A new separation and reconstruction method for BSS (blind source separation) is proposed in this paper. The objective here is to concatenate BSS separated signals in adjacent time blocks. The proposed method sets a overlap part for each adjacent signal blocks, and utilizes the associativity in separated signals of the overlap. It has advantages of no required array calibration, efficient computation,...
Machine Type Communication (MTC) and its related services have become the new business growth-point of mobile communication. However, application market with the size of about a hundred of million makes end-to-end security facing grand challenges, especially the repeated construction of authentication facilities for different applications. According to features of MTC, an end-to-end security scheme...
In cellular networks, Machine-Type Communication (MTC) has shown the advantages, including better coverage and lower network deployment cost, which makes it become the hotspot in industry area. However, the current cellular network is designed for human-to-human communication (H2H), and less optimal for machine-to-machine, machine-to-human or human-to-machine applications. One of the most urgent issues,...
In this paper, we consider K-user multiple input and multiple output (MIMO) Y channel where each user is equipped with M antennas and the relay N antennas. A scheme that each user exchanges d pairs of messages with each of the other users simultaneously via an intermediate relay is proposed. It is accomplished by utilizing signal space alignment for network coding and interference nulling beam forming...
A new multi-user two-way transmission network is considered to fully utilize wireless system resource, and ensure transmission reliability, with assistant of an amplify-and-forward relay. In multiple access channel (MAC) phase, signal space alignment technique is employed, which cancel the multi-user interference. In broadcast channel (BC) phase, a new multiple-input multiple-output (MIMO) precoding...
In order to solve problems as high error diffusion and instable convergence of Recursive Least Squares (RLS) algorithm in Code Division Multiple Access (CDMA), this paper combined local steepest drop characteristic of steepest descent algorithm presented a stable convergence and lower complexity algorithm -- D-RLS in condition of high multiple access interference (MAI) and intersymbol interference...
Co polymerization of chitosan selectively grafted by polyethylene glycol was studied in this paper. The graft copolymers can be expected to be used as DNA delivery vectors because of the improving hydrophilicity of chitosan and reserving the amino groups on chitosan chains. Chitosan was selectively grafted by monomethoxy polyethylene glycol(mPEG-OH), which contains a hydroxyl group combining with...
BP gets local minimization too easily and converges slowly and could not get the global optima. To solve these problems, this paper proposes GA-BP algorithm to predict the purity of vitamin E in obtaining the purity of vitamin E with molecular distillation. The genetic algorithm is applied to optimize the weights of BP neural network and the combination of the advantages of two arithmetic improves...
Recently, we have proposed a handwriting Chinese character database HIT-OR3C. Though it has been introduced in detail, to date, it has not been evaluated by any handwriting recognition method. To help the researchers use this database for algorithm evaluation, we propose the structure of HIT-OR3C database. Moreover, we evaluate the OR3C database with a series of experiments using state-of-the-art...
Multiple access interference (MAI) and related Near-far Problem (FNP), limit the development of the Code Division Multiple Access (CDMA) system. The classic Minimum Mean Square Error-MUD (MMSE-MUD) algorithm can effectively suppress MAI. But too much error will be introduced into the approximate estimation and its computation complexity is too high. To solve this problem, this paper presents an improved...
In this paper, an image similarity matching retrieval algorithm based on synergetic neural network (SNN) is proposed. It is a novel method with advantages of no pseudo-state and closer to natural self-organization process in the field of image retrieval. It utilizes feature vector extraction, attention parameter selection, order parameter calculation, pseudo-inverse matrix and its determinant value...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.