The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A delay/disruption tolerant network (DTN) architecture where a “store-carry-forward” strategy is adopted for data transmissions can be utilized in vehicular ad hoc networks (VANETs). The key point of routing in DTN-enabled VANETs is to choose the best node and determine the best time to forward messages. Time-space graph models provide an idea of converting the dynamic routing problems into static...
Traditional graph based sentence ranking approaches modeled the documents as a text graph where vertices represent sentences and edges represent pairwise similarity relationships between two sentences. Such modeling cannot capture complex group relationships shared among multiple sentences which can be useful for sentence ranking. In this paper, we propose two different group relationships (sentence-topic...
Space information network is a kind of delay-tolerant networks. Recently, with possible participation of many network nodes, maintaining efficient and dynamic topology becomes crucial. In space information networks, the underlying topology is lack of continuous connectivity, and has the drawbacks of network segmentation, long delay and unreliable connections, which makes the routing design face severe...
In this paper, a new fault diagnosis approach presented for a class of non-linear systems with external disturbances. The unknown disturbances are supposed to be rated by an exogenous system, where some classical assumptions on disturbances can be removed. It is shown that it will be difficult to diagnose the fault if disturbances and faults exist simultaneously in the system. To overcome this obstacle,...
In this paper, we consider optimization and identification problems in a non-equilibrium dynamic game. To be precise, we consider infinitely repeated games between a human and a machine based on the standard prisoners' dilemma model. The machine's strategy is assumed to be fixed with k-step memory, which may be unknown to the human. By analyzing the state transfer graph, it will be shown that the...
This paper, aiming to improve the traditional design process, proposes a method that designers provide a basic conceptual form scheme of the products, but a detailed form is modified by the users according to the locally changeable two or three dimensional models released on the internet, and the needed several product form schemes can be achieved through statistic analysis of the feedbacks from the...
A novel signature scheme based on DSA is proposed. When adding group member, parameters transferred between group member and group center were strengthened verified to ensure the information accurate. When deleting group member, modification to public key of group member was restricted to ensure that the deleted member was unable to sign. The parameters in the proposed scheme are less than 160 bits...
Thresholding is an easy yet efficient method in image segmentation, when dividing different objects with distinct gray-levels. Its main problem is how effective the thresholds divide the image. A new multilevel thresholding method is proposed in this study, which bases on voting response of all histogram bins to each bin. Smoothed the histogram, the method accumulates all voting of other bins by a...
A new search strategy proposed in this paper, which is used in n-dimensional spectral feature space to find reasonable end-members based on maximum volume transform (MVT), is implemented to improve the performance of N-FINDR algorithm. The N-FINDR algorithm, as a successfully used end-member extraction tool, produces inconsistent result in many cases and consumes lots of computing time if it carries...
In this paper, we propose a new Dynamic Reputation Evaluation Model (DREM) to meet the requirement of characteristics and security in hierarchical Ad Hoc networks. In this model, the reputation relationship is defined with the consideration of related node roles and functions, and the reputation evaluation mechanism is built based on the correlation among nodes to evaluate and update the reputation...
This paper studies the Hamiltonian cycle protection method in survivable WDM mesh networks and propose a new heuristic algorithm called differentiated Hamiltonian cycle protection (DHCP). Compared to conventional algorithm, DHCP obtains significant improvement in resource utilization ratio and blocking probability.
The human brain anatomy is extremely variable across individuals in terms of its size, shape, and structure patterning. In this paper, a novel method is proposed for grouping brain MR images into different patterns. This method adopts the affinity propagation methodology to partition a population of brain images into different clusters. In the affinity propagation method, the tissue-segmented and...
Automatic target recognition (ATR) is an important task in image application. A classifier for the airplane recognition based on the merits of rough set theory (RST)and directed acyclic graph support vector machines (DAGSVM) is proposed in this paper. RST can mine useful information from a large number of data and generate decision rules without prior knowledge. DAGSVM have better classification performances...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.