The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many important properties of materials such as strength, ductility, hardness and conductivity are determined by the microstructures of the material. During the formation of these microstructures, grain coarsening plays an important role. The Cahn-Hilliard equation has been applied extensively to simulate the coarsening kinetics of a two-phase microstructure. It is well accepted that the limited capabilities...
In this paper, the thought of space division full duplex (SDFD) is introduced to improve the flexibility of traffic adaptation in time division duplex (TDD) systems. In SDFD scheme, two spatial separated transmission points (TPs), which can be two base stations (BSs), serve downlink (DL) and uplink (UL), respectively. In this case, the interference between two TPs cannot be avoided, which might affect...
As more and more cloud services are exposed to DDoS attacks, DDoS attack detect has become a new challenging task because large packet traces captured on fast links could not be easily handled on a single server with limited computing and memory resources. In this paper, we propose a Hadoop based model to identify abnormal packets and compute the statistics according to the number of abnormal packets...
The Least Mean Square (LMS)algorithm is the most basic adaptive echo cancellation algorithm. However, the fixed step size of LMS does not solve the contradiction between the convergence rate and the steady state error which are all used for judging the performance of algorithm. This paper references the Sigmoid function and creates the nonlinear relation between estimated error e(n) and variable step...
Cloud detection plays an important role in total-sky images based solar forecasting and has received more attention in recent years. Accurate cloud detection for complicated total-sky images is especially changeling due to the low contrast and vague boundaries between cloud and sky regions. Unlike the existing cloud detection method without any preprocessing, one novel decorrelation-stretch (DS) based...
Considering real-time path planning in emergent threats and starting from engineering practice this paper put forward a method for real-time path planning. Combined with dynamic battlefield environment real-time path planning constraints are classified. According to the receding horizon control thought, the rolling detection and planning process is designed, also the time and space constraints of...
This paper presents an optimization of the Irondale algorithm which can speed up execution on ARM920T microprocessor. Irondale was selected as the Advanced Encryption Standard (AES) by the National Institute of Standards and Technology (NIST). First we present a theoretical analysis of the Irondale algorithm and code optimization, and then simulation results of the optimized algorithm on ARM920T microprocessor...
With the worldwide strengthening of anti-terrorism and other identity verification, the products based on face recognition are used in real life more and more. The recognition as an important ways has become the focus of academic research in the world. Face recognition accuracy can be improved by increasing the number of training samples, but increasing number will result in a large computing complexity...
To ensure the security of information systems, security risk have to be accurately evaluate first. Because security risk is influenced by attackers and defenders, it is necessary to consider the costs and benefits of both sides. However, the current evaluation methods mostly focus on one side. To solve the problem, in this paper we propose a security risk evaluation model Based on complete information...
Recently, total variation (TV) based minimization algorithms have achieved great success in compressive sensing (CS) recovery for natural images due to its virtue of preserving edges. However, the use of TV is not able to recover the fine details and textures, and often suffers from undesirable staircase artifact. To reduce these effects, this paper presents an improved TV based image CS recovery...
Measures of graph similarity have a broad range of applications but involve compute-intensive process. Similarity flooding algorithm is an efficient algorithm for comparing the similarity of graphs of small size and small datasets. However, nowadays more and more large-scale graph applications emerge and existing stand-alone similarity flooding algorithm cannot efficiently conduct the similarity comparison...
String match has been widely used in such diverse areas as data compression, search engine, information retrieval. Due to its simplicity and high-efficient space, suffix array is used to improve the efficiency of string match. However, the existing suffix array-based algorithms will rebuild suffix array after window slides every time. According to the properties of sliding window, the concept of completed...
For modern society, The concealment and completeness of data is particularly important. To solve this problem, developed a mixed DES and SHA-1 encryption system based on VC + + environment. The system on the one hand by Triple DES and RSA algorithms for data encryption to hide, on the other hand, by the SHA-1 algorithm to validate the integrity of data, it has a wide range of practicality.
There are three major approaches of principle component analysis (PCA [1]): singular value decomposition (SVD [2]), covariance-matrix and iterative method (NIPALS). This paper implemented these methods for medium-sized hyperspectral images [3, 4, and 5] in NVIDIA CUDA and compared the performance between them and their CPU counterparts. It is found that the covariance-matrix approach has a great potential...
The efficiency of a cognitive radio system depends critically on sensing reliability since post-sensing communication efficiency is subject to optimal resource allocation under this sensing uncertainty. In this paper, we develop online algorithms for maximizing throughput in a cognitive radio when the sensing outcome of the primary channel (available/unavailable) is not always reliable. We first develop...
Recently traffic identification based on Machine Learning (ML) techniques has attracted a great deal of interest. Two challenging issues for these methods are how to deal with encrypted flows and cope with the rapid growing number of new application types correctly and early. We propose a hybrid traffic identification method and a novel unsupervised clustering algorithm, On-Line Density Based Spatial...
Data transmission is the most important issue in wireless sensor network (WSN). The energy consumption and latency are the key factors of data transmission. To optimize these factors, a noble data aggregation algorithm is proposed in this paper. The proposed algorithm is originated from LEACH, and energy efficiency and latency is considered as the researching parameters. The overlap of detect regions...
Rough set is used extensively in the field of date mining, which is also an useful tool for mining rules from decision tables, then solves the bottleneck of knowledge acquisition effectively, while concept lattice represents knowledge shown with hierarchical structure on the Hasse diagram, thus it is properly applied to the description of mining association rules in databases. Association rules mining...
In order to solve such problem as sensitivity to the load torque variations of PI speed controller for interior permanent magnet synchronous machine (IPMSM), and to reduce the overshoot of system speed, a sliding mode controller (SMC) for IPMSM speed control system is proposed in this paper. And the chattering problem of SMC is eliminated by applying the variable exponential reaching law and saturation...
Traffic classifications based on Statistics methods and Machine Learning techniques have attracted a great deal of interest. One challenging issue is that most of supervised algorithms need traffic application information and training data sets to generate classification model offline, which is infeasible to cope with the fast growing number of new applications and online traffic classifications....
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.