The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The existence of non-line-of-sight (NLOS) errors will considerably degrade the localization accuracy. Therefore, the NLOS node localization is investigated. In this article, we propose a NLOS node localization algorithm that utilizes the firefly algorithm. The objective function is established by the probability of propagation of NLOS and LOS according to the approximate maximum likelihood method...
Power optimization based on intelligent algorithm draws more and more attention. This article presents a novel low power optimization strategy based on the high level software power management employing Markov Process for charactering the real running workload. This article formulates workload characterization and selection with stochastic process method, and solves the formula using dynamic voltage...
A novel photomosaic art with three-layer information is proposed in this paper. In addition to the over-arching image can be seen from a distance and a matrix of individual images when looked closely, a QR code can be accessed by taking a picture of the whole photomosaic using public QR code scanners. In the proposed scheme, a tile image classification procedure is carefully designed to dispatch appropriate...
Embedding virtual network requests in an underlying physical infrastructure, the so-called virtual network embedding (VNE) problem, has attracted significant research interests already. A realistic scenario might entail embedding multiple VN requests (MVNE) that arrive simultaneously (batch arrivals). The existing heuristic MVNE approaches neither consider the coordination among multiple VNR embeddings...
The small companies become increasingly important in bank's lending business. But the challenge is how bank's credit assessment is made in a small amount of time and money. Compare with the big companies, the small companies often need a small amount of cash flow. They may not provide the complete certificates or documents, so that the bank has to collect information of the companies and evaluate...
This paper focuses on quickly identifying the unknown or time-varying random latency probability (RLP) of the measurements in the nonlinear networked multi-sensor system by resorting to the efficient implementation of maximization likelihood (ML) estimation. Firstly, the full-probability likelihood computation is equivalently transformed into a log-likelihood function summation form parameterized...
Data locality in distributed memories has a significant performance impact on NUMA multi-core systems owing to non-uniform memory accesses. In addition, memory contention also influences the performance of multi-core systems. The performance degradation caused by both effects should be analyzed before performance optimization because data locality and memory contention are mutually dependent. A reduction...
In this paper, we develop new models and methods for exploring multidimensional design spaces associated with digital predistortion (DPD) systems. DPD systems are important components for power amplifier linearization in wireless communication transceivers. In contrast to conventional DPD implementation methods, which are focused on optimizing a single objective — most commonly, the adjacent channel...
Most internal combustion engines are built on compression or spark ignition, which is far from optimal and the problem of which is more than optimization. This paper first improves a genetic algorithm (GA) for such an application, aiming at the potential invention of a homogeneous charge microwave ignition (HCMI) engine. For an HCMI system, search for optimal emitters under the intrinsic constraints...
This paper presents a novelty classification method based on multivariate Bernoulli naive Bayes with Dirichlet prior and hyper parameter optimization. We test the proposed method on 15-Scenes and Msrc-v2 data set by comparing with basic multivariate Bernoulli naive Bayes and SVM (Support Vector Machine). The experiments show that our method has advantages both in running time and classification precision.
Anomaly detection based on communication behavior is one of difficult problems of industrial control systems for intrusion detection. A normal communication behavior control model is established by using improved one-class SVM and a PSO-OCSVM algorithm based on particle swarm algorithm is designed to optimize parameters in this paper. This method established an intrusion detection model to identify...
In real production process, machines may break down after long time operation or non-available under some conditions. To keep machines' production efficiency and products' quality, proper maintenance is needed. Many researchers have discussed scheduling problems with maintenance. This paper reviews the research results about this problem from three aspects briefly and points out the feasible research...
Aimed at the characteristic of recognizing wheat seed, a method is proposed based on fuzzy theory. In this paper, Fuzzy C-means Clustering is introduced and remarked firstly. On the basis of systematic analysis of current algorithms, Tabu search is inducted into fuzzy clustering to solve the locality and the sensitivity of the initial condition of Fuzzy C-means Clustering. Then, this paper proposes...
Bispectral index (BIS) is a popular technology widely used in hospitals to monitor depth of patients' anesthesia during surgeries. Maintaining a proper, steady state of the patient's BIS level is critical for patient safety. In this paper an autoregressive moving average model is implemented on patient BIS data for the prognosis of the depth of anesthesia. This prognosis will enable anesthesiologists...
A meta-heuristic search algorithm intended to introduce chaotic dynamics and Levy flights into the algorithm is presented in this paper. Among most evolutionary computation for optimization problem including meta-heuristic search algorithms, the solution is drawn like a moth to a flame and cannot keep away. The fine balance between intensification (exploitation) and diversification (exploration) is...
Fault isolation and reconfiguration are very important aspects of distribution network automation. When there is a fault in the distribution system, the loads connected with the fault zone should be separated and the operation pattern can be found by changing the status of the section switches or contact switches. A method of using different fault isolation and reconfiguration measures to deal with...
With large centralized photovoltaic (PV) power stations connected to the grid, its effects on the distribution networks cannot be ignored. The mathematical model of a photovoltaic power station was built and the power outputs of this model with the changes of illumination were simulated. One photovoltaic power station and one reactive power compensation capacitor were accessed to IEEE 30-node network...
The performance of cooperative spectrum sensing was analyzed based on soft combination of data fusion and decision fusion under both imperfect sensing channels and reporting channels in cognitive radio networks, and the closed expression of detection and false alarm probability also given. The optimal soft combination algorithm for maximizing the detection probability was proposed for further, in...
Based on the fuzzy programming, this paper puts forward fuzzy time optimal path concerning military traffic and transportation by building fuzzy chance-constraint programming and fuzzy dependent-chance programming. The methods based on genetic algorithm are designed and the problems of necessity node and prohibition node are also dealt with. Finally, an example shows that this algorithm is simple,...
Taking the advantages of fast convergence, high ability of global optimization in artificial fish-swarm optimization algorithm, this paper optimizes the background sequence, time sequence error and the combination of them in grey model GM (1, 1). Practical examples for GDP prediction are given and the simulation results indicate that the improved model gives better prediction precision and may have...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.