The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A discrete Fourier transform (DFT) enhanced complex least mean square (CLMS) algorithm, which utilizes the underlying time series relationship among the consecutive fundamental DFT components, is proposed to adaptively mitigate the spur pollution in multi-standard transceivers. The transient and steady-state performances of the proposed algorithm are investigated, demonstrating faster convergence...
Aiming at efficiently mapping multiple virtual optical networks (VONs) on a shared substrate network. This paper proposes a load balancing algorithm that is based on key-link and resources contribution degree (RCD) for VONs mapping (KLRVM) in elastic optical networks (EONs). In this algorithm, virtual nodes mapping gets the network status according to the proposed RCD, and comprehensively considers...
To solve the problem of high sampling rate and massive data processing brought by high bandwidth in the Aerospace Communication System, researchers proposed compressive sensing theory to deal with wideband signal processing. Sparsity analysis is the fundamental point for the application of compressive sensing theory. This article studies the sparsity of the frequency hopping signal, which is a widely...
Holding time awareness provides the additional information that could be used in routing and spectrum assignment (RSA) in elastic optical networks, and thus improves the performance of RSA. We propose an RSA algorithm that achieves low blocking probability by using Back Propagation neural network (BPNN) to predict the information of each future request with holding time awareness. We examine the performance...
Support vector machine (SVM) is a supervised method widely used in the statistical classification and regression analysis. SVM training can be solved via the interior point method (IPM) with the advantages of low storage, fast convergence and easy parallelization. However, it is still confronted with the challenges of training speed and memory use. In this paper, we propose a parallel primal-dual...
Support vector machine (SVM) is a supervised method widely used in the statistical classification and regression analysis. SVM training can be solved via the interior point method (IPM) with the advantages of low storage, fast convergence and easy parallelization. However, it is still confronted with the challenges of training speed and memory use. In this paper, we propose a parallel primal-dual...
The vigorous growth of big data has triggered both opportunities and challenges in business and industry. However, Web big data distributed in diverse sources with multiple data structures frequently conflict with each other, i.e. inconsistency in cross-source Web big data. In this paper, we propose a state-of-the-art architecture of auto-discovering inconsistency with Web big data. Our contributions...
Modern network security devices employ packet classification and pattern matching algorithms to inspect packets. Due to the complexity and heterogeneity of different search data structures, it is difficult for existing algorithms to leverage modern hardware platforms to achieve high performance. This paper presents a Structural Compression (SC) method that optimizes the data structures of both algorithms...
Deep inspection is widely used to identify network traffic. Due to the complexity of payload in traffic, regular expressions are becoming the preferred choice to specify the rules of deep inspection. Compiling a set of regular expressions into one Deterministic Finite Automata (DFA) often leads to state explosion, which means huge or even impractical memory cost. Distributing a set of regular expressions...
The information gradient-based routing protocols have been proved to be economical and effective by adopting the principle of achieving the global objective through local decision, but lightweight methods to construct the information gradient should be fully investigated, especially in a large-scale network with high information dynamics. In this paper, we focus on the construction of the information...
Cloud computing has been more and more popular and widely used as a new model of information technology. In order to achieve a reliable and efficient operation of the cloud environment, it is important for cloud providers to detect and deal with system anomalies in time. In this paper, we present a method for anomaly detection in MapReduce environment. This method is based on peer-similarity and uses...
Moving object detection is a very important research topic for video surveillance. Drawbacks of low computational efficiency and high power consumption are still challenging to current background subtraction methods. This paper proposes a hardware design to accelerate background subtraction. A real-time background subtraction method is designed with function and task partitions to improve throughput,...
Security in control system is an important issue. To safety-related system it is more critical. A safety-security communication measure to counteract nature or intend data modification is proposed, which based on refining characters of data with MD5 approach. And to some low speed network a 2-refine approach is introduced which based on MD5 and CRC. A confidential communication to secure all the data...
Modern networks are increasingly becoming content aware to improve data delivery and security via content-based network processing. Content-aware processing at the front end of distributed network systems, such as application identification for datacenter load-balancers and deep packet inspection for security gateways, is more challenging due to the wire-speed and low-latency requirement. Existing...
In practice, the intelligent PID control algorithm which is an improved algorithm based on the classical PID control was put forward by many researchers to resolve some control problems, such as time-delay, lag and nonlinear. In this paper, an intelligent PID control algorithm is considered and applied to an internal combustion control system. Then, the semi-physical simulation platform based on PLC...
To shorten the design period of airplane, improve the design quality and reduce the manufacture cost, the computer supported cooperative design has become one of the effective methods. In order to organize the airplane design coordination tasks reasonably and improve the group collaborative efficiency in CSCD, an airplane cooperative design model based on task-related work breakdown structure was...
Field programmable gate arrays (FPGAs) are becoming increasingly important implementation platforms for digital circuits. This paper presents a method for symmetrical FPGA placement based on ant colony optimization (ACO). Also, we take the routing congestion into consideration by introducing a congestion factor in our algorithm. Experimental results show that compared with the state-of-the-art FPGA...
Ant colony optimization (ACO) is a popular-based, artificial agent, general-search technique for the solution of difficult combinatorial problems. This paper presents a solution to the resource-constraint project scheduling problem based on ACO algorithm. The method considers the quantified duration and resource as the heuristic information to calculate the accurate state transition probability and...
In this paper, we study the major modules of on-line handwritten chemical expressions recognition. We propose a novel two-level algorithm to recognize expressions. In the first level, structural information is used to distinguish different parts and recognize substances. Then the algorithm segments expressions fatherly and recognizes isolated symbols. To meet the demand of actual applications, the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.