The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Muscle fatigue is one of the main factors that influencing the sports performance and resulting in injuries. In this paper, the fatigue analysis for early warning system based on fuzzy algorithm is developed. The system does not need to construct complex mathematical functions, based on the participants' surface Electromyography (sEMG), heartbeat rate and exercise time after exercise to calculate...
This paper presented a novel holes filling method for the scattered point cloud, particularly for recovering the missing points at featured curves or corners. Firstly, hole-boundary point and feature point were extracted to determine the incomplete feature curves. According to these two point sets, the holes were categorized into two types, featured holes and non-featured holes. Secondly, tensor voting...
According to the feature of palette image, a chaotic encryption algorithm for image of palette format is proposed in this paper. In the algorithm, the index matrix of pixel and the palette are both encrypted. In the encryption procedure of the index matrix, the position and value of an index are both encrypted, after multi-rounds, the ciphered index matrix is obtained, and in the masking procedure...
This paper considers the job-shop problem with release dates and due dates, with the objective of minimizing the total weighted tardiness. A hybrid DE (HDE) is presented by combining differential evolution algorithm with the improved critical path algorithm on a disjunctive graph model. Firstly, a job-grouping-order (JPO) rule is presented to convert the continuous values of individuals (real vectors)...
Inspired by the concept of swarm intelligence, a parallel harmony search algorithm with dynamic harmony-memory size (PDHS) is presented to solve unconstrained problems. The PDHS algorithm has two significant operations: Harmony Memory (HM) grouping and Harmony Memory Size (HMS) updating. In the former operation, the harmony memory is divided into several groups named sub-HMs which help decreasing...
Since the present algorithms are on the assumption of correct beacon information, when the network is attacked, especially the beacons are captured by opponents, all algorithms will not work. To address this issue, one attack-resistant nodes localization algorithm we call VDV-Hop(Voting DV-Hop) which is on the basis of DV-Hop algorithm and based on the voting mechanism is presented. This algorithm...
As the key point of the ontology research field, concept similarity computation has been widely used in the automatic question-answering systems. This paper firstly analyzes the existing concept similarity computation algorithm which is based on the semantic distance, and then proposes a new computation algorithm formula by modifying and adding some factors which can affect the accuracy of concept...
Web application testing based on user session reduces artificial efforts while designing and generating test cases. It attracts more and more researchers and forms a hot spot of web application testing. Reduction, prioritization, and selection of test cases are widely used for the testing based on user session. In this paper, web application test cases optimization based on clustering is researched,...
Propose the collecting algorithm to meet guillotine for large rectangular parts cutting problems. Avoid the traditional rectangular layout algorithm lead to large parts of the plate into the low utilization problem, and get satisfied result by secondary cutting. The result is much better than surplus rectangle method and genetic algorithm.
The search efficiency of the individual ants is improved by means of introducing individual ant velocity to its colony optimization process and creating new pheromone release functions. Improve the selected line coding method by assigning 2N numbers to N nodes. For instance, integer number 1 to n for lines to be selected and n+1 to 2n for unselected. Situation like algorithm getting stuck into a local...
In this paper, an acoustic imaging algorithm based on acoustic array Multiple-Input Multiple-Output (MIMO) and Multiple Signal Classification (MUSIC) by location algorithm fusion is proposed to realize Three Dimension (3D) location estimation and display for future mobile system. By combined with MIMO beam estimation and MUSIC estimation algorithm, the location fusion algorithm with 3D display advantage...
Combat multiple access interference(MAI) and near-far effect, to some degree, BP neural network can be better suppression interference, because of its use of the least squares method, prone to local minimum. In this paper, instead of using the MMSE algorithm for least squares and the addition of a new kind of constraints, and gain iterative formula of BP neural network blind multiuser detection algorithm,...
This paper analyzes a new control algorithm about the input power feed-forward loop control based on the traditional double-loop control strategy. The input power of PV system is used as a reference component of inner current closed-loop, so the reference of the current contains the message of input power. Thus the proposed algorithm can improve the dynamic response of the PV system if mutations appear...
In this paper, we provide a new method, named dynamic software evolution method, for component based software evolution and this method is consisted of a collection of algorithms. Each algorithm achieve one software evolution objective, and all theses algorithm is meaningful for software evolution strategy design and better understanding component based software evolution process.
To the slab discharge optimization of steel industry, a class of slab discharge decision model is suggested in this paper, considering the minimal amount of shuffled slab and the minimal crane travel. It consists of the slab discharge optimization decision sub-model and the optimal turned-out slab pile one. The slab discharge planning is accomplished by the layered collaborations between two sub-models...
In this paper, firstly, we propose a dynamic classroom teaching idea which is a main trend for model classroom instruction ideal. Secondly, we focus on study and analysis of classroom instruction approach from three aspects: heuristic teaching method, interactive teaching method and teaching language. Thirdly, based the multimedia teaching measure, we present an interactive action learning method,...
The particle swarm optimization (PSO) algorithm is already proved efficient in the rule extraction in intrusion detection. But in practice the most intrusion detection systems often have a high false alarm rate. To solve it, this paper gives a new PSO-based algorithm which has a special fitness function to extract better rules set with lower false alarm rate to detect the attacks. Experiments based...
The image feature matching is a critical step in photography measurement and rebuilding. Based on the characteristics of topography measurement, a new topography feature matching algorithm is presented in this paper. In the algorithm, the stereo images to be matched are partitioned, and then the region matching process is used to these partitioned image pairs. Based on the region matching, the corner...
To effectively realize the image feature matching for geomorphic reverse measurement and rebuilding, a new matching scheme is presented, where the SIFT method are adopted to implement initial geomorphic image matching by going through five stages: scale-space construction, scale-space extrema detection, orientation assignment, keypoint descriptor and feature vector matching. Then, in order to eliminate...
Sequential pattern has important applications in many areas and a large number of data and patterns need efficient and scalable parallel algorithm. In light of the widespread problem in current sequential pattern data mining algorithm and on the basis of researching the data mining algorithm of serial sequential pattern, a data mining algorithm of parallel sequential pattern is presented in this paper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.