The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to grasp the changing situation of ground subsidence and surface collapse caused by underground mining in mining area, and improve the efficiency of field data collecting, this paper presented the architecture and functions of a Field Data Collecting Synchronously System (FDCSS). According to the FDCSS schema, mobile devices used Web Services to synchronous data with the server computer....
In this work, we apply the iterative learning method to address the traffic density control problem in a macroscopic level freeway environment with ramp metering. The macroscopic model to describe the evolution of freeway traffic flow is firstly established. Then traffic density is selected as the control variable in place of traffic occupancy, and the control objective is determined. In conjunction...
In this paper, the finite-time ruin probability with different interest rates for non-standard Poisson model is considered. Under the assumptions that the claim-arrival process is non-standard Poisson process, i.e. nonhomogenous and conditional Poisson process, and the claimsize is subexponentially distributed, some simple asymptotic formulae of ruin probability within finite horizon are derived....
In this paper, we first propose a novel clipping, named as repeated enlipping (RE) scheme. Then, we integrate the proposed RE scheme into the conventional active constellation extension (ACE) scheme, called as ACE-RE scheme, to reduce the peak-to-average power ratio (PAPR) of the orthogonal frequency division multiplexing (OFDM) signals. The proposed ACE-RE scheme may greatly improve the convergence...
Spectrum sensing is a crucial technology for cognitive radio networks. In this paper, we develop a novel spectrum sensing method for secondary users to sense the idle spectrum. The key idea of the proposed method is combining multiple slots energy detection. Firstly, we establish the probability model regarding the appearance of the primary user at each slot of a secondary user slots window structure...
Under the assumption that the claimsize is subexponentially distributed and the insurance surplus is totally invested in risky asset, a simple asymptotic formula of discounted aggregate claims for renewal risk model within finite horizon is obtained. The main results we derived extend the corresponding conclusion of related references.
This paper researches ruin probabilities of insurance companies with reinsurance business. Under the assumptions that the diffusion term is considered and that claimsize is exponential distribution, the relationship between deductible and ruin is obtained. The survival probability is derived on the corresponding insurance and reinsurance company. The results extend Gerber's corresponding results for...
Discovering the significant relations embedded in the Web pages would be very useful for community discovery. In this paper, we propose an unsupervised method for relation discovery from Tibetan Web pages, which is based on co-occurrences of named entities in the pages. In order to find the relation, a rule-based named entity recognition algorithm has been proposed. Our experiment shows that the algorithm...
Along with the rapid development of Tibetan language information and Tibetan Web in recent years, personal information becomes a main focus of researchers. While, due to the complexity of the Web information, the extraction of person names is difficult, especially in Tibetan Web. This paper presents a rule-based approach, which is based on the case-auxiliary words and lexicon, to extract the person...
Most current semantic Web services (SWS) discovery approaches focus on the matchmaking of services in a specific description language while in practical application the advertised services are often heterogeneous and distributed. This paper proposes a metric space approach to resolve this problem in which all heterogeneous Web services are modeled as metric objects regardless of concrete description...
The behavior model of traditional temporal logic is closed and symmetrical, while the behavior model of aspect-oriented programs is open and asymmetrical. When the programmer designs the base-code, he is not sure what aspects will be woven to it. It is indirect and difficult to specify and verify the behavior of aspect-oriented programs by using traditional temporal logic. In this paper, we propose...
The fine-grained access control approaches in DBMSs should satisfy soundness property which requires the answer of a query returned by the approach under the control of fine-grained access control is consistent with the answer when there is no fine-grained access control. However, existing techniques cannot guarantee soundness property for all SQL queries. Therefore, for an approach, there is a practical...
Labeling the connected components in the feature space is an important step in grid based clustering algorithms in data mining. Although connected components labeling algorithms have been highly improved in image processing domain, there is little progress in grid based clustering in data mining domain. Two problems exist in transplanting these algorithms from image processing to data mining. One...
Adaptive learning system must support different learning objectives and contexts of different learners. However only a very limited requirements above can be considered in present adaptive learning systems, especially in learning objectives. By extending the domain model and the user model and introducing the directed hypergragh theory in learning system, three types of adaptiveness to the user model:...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.