The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Different mutation operators have been developed in evolutionary programming, such as Gaussian mutations, Cauchy mutations, Lévy mutations, and some mixed mutations. Experimental results have often been focused on comparisons of performance among different mutations. Besides measuring the performance, this paper discusses how to evaluate Gaussian mutations, Cauchy mutations, and Lévy mutations using...
DDoS attack is a major Internet security problem-DoS is that lots of clients simultaneously send service requests to certain server on the internet such that this server is too busy to provide normal services for others. Attackers using legitimate packets and often changing package information, so that traditional detection methods based on feature descriptions is difficult to detect it. This paper...
Information needs and knowledge discovery was submerged in Inundated vast network information, Information for "many" affecting the demand for the "quasi", Affecting the transformation of information into knowledge. How to effectively manage information, found knowledge and provision of intelligence services, Become a hotspot in information resources of network management and application...
Based the analysis of application method, principle and previous practices of the waste water utilization from hot spring, it is found that the waste water source heat pump is a feasible energy efficient system, compared with other heat pump systems. Through the analysis and theoretical calculations of the projects in which the hot spring water source heat pumps system was adopted for heating and...
This research simulated the urban growth scenarios of a mountain city of Chongqing, China through a CA-based model of SLEUTH. The fundamental data were four Landsat TM images of 1978, 1988, 1993, and 2001 which were utilized for generating maps of land use, road networks, and urbanized area. Three alternative development scenarios, including business as usual, compact city and decentralized concentration,...
This paper analyzed the current development of electronic teaching materials, and probed into the restricting elements of the development: digital copyright protection, readability and multi-format support. Also, it reviewed the current readers' digital rights protection technology, and introduced the basic principles and properties of e-paper, and synthesized the advantages of the LCD screen and...
A lot of on- site management works are involved in the process of cluster project management, especially the treatment of sudden accidents which would produce plenty of knowledge and experience. As cluster project on-site management spots change frequently, knowledge produced by mobile workers in the process of on-site management is hard to be saved into the knowledge repository on time. It may cause...
In this paper, an adaptive neural network nonlinear control method is developed based on trajectory linearization control (TLC). The adaptive neural network TLC control (ANNTLC) compensates the model nonlinear uncertainty adaptively, and improves controller performance. ANNTLC can also be used to simplify the TLC control design procedure by using a simplified model. A stable neural network learning...
The process of leading to breakdown of low-density polyethylene (LDPE) film and high-density polyethylene (HDPE) film was investigated, with particular attention on the breakdown phenomenon identification. From the pictures of breakdown point obtained by a monocular video zoom microscope, it can be observed that the shape of breakdown area was almost identical to the type of electrodes. Meanwhile,...
This paper explores the problem of cooperative control among multiple networked unmanned air vehicles (UAVs) for persistent area denial (PAD) mission. An adaptive Markov chain model is used to predict the locations of pop-up threats. The mixed information of predicted pop-up threats and actual pop-up targets is utilized to develop cooperative strategies for networked UAVs. The approach is illustrated...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.