The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The software defined optical network (SDON) service plays an important role in the production and operation of the network system. It's important to solve the problem of how to reduce the risk and distribute the service path more rationally. However, most of the existing algorithms do not take into account service importance. In this paper, a risk balancing routing assignment mechanism based service...
To improve the localization accuracy of wireless sensor networks (WSNs) node for underground tunnel monitoring, we propose a method to improve the localization accuracy of Received Signal Strength Indication by using the anchor node selection mechanism, which is based on the three-dimensional space characteristics of the mine and the choice of the wireless communication frequency. Firstly, we sort...
Automated Modulation Classification (AMC) shows great significance for any receiver that has little knowledge of the modulation scheme of the received signal. A useful digital signal modulation recognition scheme inspired by the deep auto-encoder network is proposed in this investigation. In our proposed method, there are two deep auto-encoder networks. The system extracts the original features of...
Crowdsourced ranking algorithms ask the crowd to compare the objects and infer the full ranking based on the crowdsourced pairwise comparison results. In this paper, we consider the setting in which the task requester is equipped with a limited budget that can afford only a small number of pairwise comparisons. To make the problem more complicated, the crowd may return noisy comparison answers. We...
Anomalies of multitier services running in cloud platform can be caused by components of the same tenant or performance interference from other tenants. If the performance of a multitier service degrades, we need to find out the root causes precisely to recover the service as soon as possible. In this paper, we argue that cloud providers are in a better position than tenants to solve this problem,...
Flame image segmentation is an important prerequisite for fire characteristics and recognition, The segmentation results will affect the accuracy of fire identification. This paper proposes a flame segmentation algorithm merging 2-dimension Otst and seed region growth on HSI color space. After many texts, it confirmed that the new flame segmentation algorithm doesn't only overcome interference the...
In this paper, a new particle swarm optimization algorithm, adaptive particle swarm optimization (APSO) algorithm, is proposed to optimize the stability and setting time of the fourth generation grate cooler scraper during speed regulation. This algorithm replaces the compression factor with the time varying parameter by using the dynamic variation of the time varying parameters of the traditional...
It is difficult to compute large RNA molecules with pseudoknots in bioinformatics, the prediction of RNA structure with pseudoknots is an NP-hard problem. According to PTAS principle and MFE models, we investigate the RNA pseudoknotted structure. We first presents an efficient algorithm for predicting RNA structure with pseudoknots. The experimental tests in PseudoBases indicate that the algorithm...
In this paper, we propose a low complexity algorithm to separate collided RFID signals. By carefully analyzing the collided signals when two tags with the same bit durations respond to a reader simultaneously, we observed that the individual amplitudes of each tag appear in pairs and the two tags' information bits are different, and regular RFID signals with larger amplitudes appear if the two tags'...
In wireless sensor networks, the limitation of energy and cache space of nodes around the base station, as well as the multi-hop transmission instability will seriously interfere the performance of traditional data collection protocols. To address this problem, a data collection mechanism by using mobile base station is proposed. Firstly, a new clustering algorithm-Time High-Overflow-Based Dominating...
High-Bandwidth Digital Content Protection(HDCP)-it is a technology method which is used to protect the high definition signs. This paper focuses on design and verification of authentication part, the most important of a HDCP2.2 transmitter. Besides architectural analysis and design approach discussions, a detailed micro architecture, including signature verification, key encryption and revocation...
Based on evolutionary algorithms and complex networks, dynamic complex network in evolutionary computation is briefly summarized. First, the history of evolutionary computation is discussed in general as well as its faultiness. Second, the research progress of complex network is presented. And the complex networks can remedy the defect that ignores the intermediate process. Third, the prospect and...
The citation network is the social network made up of papers and their citation relationships. A key task of the citation network is to find influential papers in the network. Traditional properties such as centralities can not reflect the influence of papers comprehensive, since it does not take the authority of the paper and the transfer effect into account. Other algorithms such as PageRank and...
This paper presents a Modified Cuckoo Search (MCS) algorithm for solving flow shop scheduling problem with blocking to minimize the makespan. To handle the discrete variables of the job scheduling problem, the smallest position value (SPV) rule is used to convert continuous solutions into discrete job permutations. The Nawaz-Enscore-Ham (NEH) heuristic method is utilized for generating high quality...
This paper discusses bi-objective optimization algorithms for energy efficient traffic grooming in a bandwidth constraint IP over WDM network. If the maximum network throughput is required for traffic grooming, the algorithms use the priori method to maximize the network throughput, and then to minimize the energy consumption afterwards. If the maximum network throughput is not required, the minimum...
Many real world classification problems lack of a large number of labeled data for learning an effective classifier. Active learning methods seek to address this problem by reducing the number of labeled instances needed to build an effective classifier. Most current active learning methods, however, are myopic, i.e. select one single unlabelled sample to label at a time. Obviously, such a strategy...
In allusion to infrared non-uniformity noise of robot vision imaging, an infrared non-uniformity correction algorithm based on zereo virtual perimeter diaphragm strips is proposed, which does not need any prior information. This algorithm initially executes one-point correction to the perimeter detectors using zero virtual perimeter diaphragm strips. Then based on the scene information and shift between...
The duplication-loss problem is to infer a species super tree from a collection of gene trees that are confounded by complex histories of gene duplication and loss events. The decision variant of this problem is NP-complete. The utility of this NP-hard problem for large-scale phylogenetic analyses has been largely limited by the high time complexity of existing heuristics. These heuristics aimed at...
Kernel function optimization and selection is an open and challenging problem in statistic learning theory and kernel methods research area at present. The existing kernel optimization algorithms usually work in specific application, and it is efficient when used with one kind of kernel function. A kernel optimization and selection algorithm based on cost function maximization is proposed. Compared...
In many decision problems, there are two levels of choice: The first one is strategic and the second is tactical. We formalize the difference between both and discuss the relevance of the bandit literature for strategic decisions and test the quality of different bandit algorithms in real world examples such as board games and card games. For exploration-exploitation algorithm, we evaluate the Upper...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.