The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Personalized search based on the users' preference has been extensively studied in the field of information retrieval. As a typical representative of web2.0, social tagging not only allows users to better describe and manage web resources, but also provides a great opportunity for the personalized search research, since it contains abundant public personal information. In this paper we propose a user...
Modeling topological properties in the field of complex networks in recent years has been rather spectacular and amazing. A key question for characterizing topological structure is how to understand the importance of a node in network? Here we propose a topological potential model to obtain the global ranking which can reflect the importance of each node in given network. Through defining and calculating...
In this paper, a combined MLFMA-ACA approach is presented, which is applicable to three dimensional scattering problems of widely varying electrical sizes with complexity and fine structure. The classic MLFMA suffers breakdown at low frequencies, while ACA algorithm becomes less efficient than MLFMA at high frequencies. The presented algorithm combines these two methods to achieve stability at all...
Object categorization has become active in the field of pattern recognition. There are two main factors which affect the performance of classification. One is the representation of images, and the other is the design of classifier. The representation of images based on bag-of-word (BOW) has become a popular method because of its simpleness and high efficiency. This paper aims to compare some state-of-the-art...
As RFID is being applied in more and more business applications, events to be processed by RFID middleware is becoming more and more complex. It is needed that some original events are processed to create a complex event in order to get complex information. This paper introduced the design of an RFID middleware based on complex event process (CEP) concept, and presented checking method that is based...
Swept and curved blades may change aerodynamic behaviors in turbomachinery. This configuration might improve performance of wind turbines. It is interesting and necessary to find out how it could be influenced qualitatively or quantitatively by using swept and curved blades in HAWT. First, this study is based on the antetype wind turbine. The commercial CFD software FLUENT was utilized to get the...
While the potential benefits of multi-business interaction automation are truly phenomenal, the complexity of business has increased dramatically, and building reliable and secure e-business application systems becomes an important issue. Industry standards for Web service composition, such as BPEL, provide the notion of LRT (Long running transaction) for the execution of business processes in Web...
A clear understanding of the complicated interactions among various key ingredients of flux will be very beneficial for developing future high performance solder pastes. In this work, the group contribution method was introduced to estimate and predict the properties of compound and their interactions, especially, the chemical interactions. Based on the assumption that the effects of the individual...
Mining investment is a kind of venture capital, the risk level of which is impacted by various factors. There are still a lot of uncertainty and ambiguity in the process of evaluating on mining investment decision, so it is more suitable to use fuzzy evaluation methods for it. The core of fuzzy evaluation is membership degree transformation. But the existing transformation methods should be questioned,...
The core of fuzzy evaluation on the safety of belt conveying system is membership degree transformation. But the existing transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge...
In modern NC machining, interpolation of spatial motion such as spatial arc and spiral line is significant. Based on the quaternion interpolation algorithm and S curve velocity planning, we have discovered a method which can be used to machine spatial arc and spiral line. This method uses the quaternion to describe the arc interpolation in three-dimensional space. The arc information is transformed...
The core of performance fuzzy evaluation is membership degree transformation. But the transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information about object classification...
The paper, analyzing from the system attributes of supply chains, firstly studied risks from the view of system theory; and lastly tried to propose solutions for the system risks. d the common features and individual features of supply chain system from the perspective of system theory; then, on this basis, the paper discussed in-depth exploration into the sources of supply chains.
One of the performance issues that has come to light upon study of field data from deployed GSM networks is the occurrence of call-drop due to slow handoff since the reverse link messages can not be delivered to the mobile terminal. It is hard to develop an accurate mathematical model for call-drop. In this paper, A new way is recommended by combining the fuzzy case-based reasoning (CBR) with the...
In any multi-indexes uncertainty decisions, if choosing membership function to describe the uncertainty of every space-index value about some status, it must meet membership degree conversion, which must solve the conversion from membership degree of coordinates to membership degree of points. But the present methods affect the credibility of result of decision because of the redundant data. So, by...
In this paper, we introduce one simple heuristic for value ordering in solving frequency assignment problem. Our approach is based on a special container to organize the values selection by jumping between two sides of domain. In order to reduce the time and space complexities of algorithm, we change the current value selection with last unchecked element in the domain, and put all the inconsistent...
The efficient calculation of the electromagnetic interactions with dielectric objects is always a challenge to CEM (computational electromagnetics). Among the numerical exact methods, the method of moment (MoM) is considered to be more preferable than finite element method (FEM) and finite difference method (FDTD) for its high precision and discretization on the geometry model instead of the field...
In this paper, the IE-FFT has been successfully implemented with the curvilinear basis function to solve scattering problems. The IE-FFT is used to speed up the matrix-vector multiplication. The CPU time per iteration is O(N1.5log(N)) and the memory requirement is O(N1.2). The MN preconditioner has been used to improve the convergence of the CG solver and the good performance has been shown. The speed...
In this paper, MLFMA is implemented in the IEFIE to compute scattering from complex conducting structure coated by thin dielectric material. Numerical results demonstrate the efficiency and validity of the present method.
The core of fuzzy evaluation on the safety of chemical industrial park is membership degree transformation. But the transformation methods should be questioned, because redundant data in index membership degree is also used to compute object membership degree, which is not useful for object classification. The new algorithm is: using data mining technology based on entropy to mine knowledge information...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.