The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The construction of knowledge graph of dangerous goods (KGDG) is with great significance of inferring relative information of dangerous goods, developing corresponding policy for its storage and transport, preventing disaster caused by dangerous goods(DG), and providing emergency plan when the disaster happens. Since distributed representation of natural language is an effective method for knowledge...
Privacy has become an important issue in Data Mining. Many methods have been brought out to solve this problem. This paper deals with the problem of association rule mining which preserves the confidentiality of each database. In order to find the association rule, each participant has to share their own data. Thus, much privacy information may be broadcast or been illegal used. These issues can be...
A new fractional-order chaotic system, fractional-order Lorenz-Stenflo (LS) system, is found in this paper. Chaos can exist in the fractional-order LS system with order as low as 3.6. The chaotic dynamics of this system is investigated. Then based on Laplace transformation theory, the controller of complete synchronization is designed for this system. Moreover using stability theory of linear fractional-order...
The global synchronization of chaotic brushless DC motor (BLDCM) systems via variable substitution control is investigated. A master-slave synchronization scheme with variable substitution control is constructed at first. Based on this scheme, some sufficient criteria for global chaos synchronization of the master and slave BLDCM systems via various single-variable coupling are proved. The effectiveness...
This paper applies the selective harmonic elimination (SHE) technique to determine the switching angles for a multilevel inverter that cooperated with specially connected transformer, zig-zag connection. With the ability to direct controlling harmonics, SHE technique has the adaptability to associate with apparatus which are congenitally immune to specific harmonics, such as the zig-zag connection...
In the paper, we present an efficient algorithm to hide information in MPEG compressed video. In order to utilize the large amount of video streams, and to speed up the process of hiding information, we provide an algorithm that makes use of compressed coefficients to hide information directly. The advantage of the method is that we can make use of DCT coefficients directly without compressing and...
Comparing with traditional DFT, windowed all-phase DFT (apDFT) possesses excellent property of restraining spectral leakage. However, based on analyzing the relationship between windowed apDFT and windowed DFT in theory, a half of information which can be obtained by windowed DFT is left out by windowed apDFT. So this paper holds that windowed apDFT has the excellent property of restraining spectral...
Fixing positioning errors calibration of payload will help to improve the payload's performance. Several kinds of methods of correcting errors and their own characteristics are referred to and a new fixing positioning errors correction method of photoelectric payload of aerial mobile platform is proposed based on simplified ant colony system. By simulation of both minor errors and major errors, rapid...
In order to improve the location accuracy of the centroid algorithm in binary-detection sensor networks, a cooperative target location algorithm based on time difference of arrival was proposed. This algorithm only needs the position information and the target signal arrival time information of four nodes; it is simple in principle and calculation. Besides, because this algorithm used the centroid...
Analyzed here is a dynamic learning fault localization algorithm based on directed graph fault propagation model and feedback control. Input and output of the algorithm are named as fault and hypothesis respectively. Because of the complexity and uncertainty of fault and symptom, it's difficult to accurately model the relationship of them in probabilistic fault localization. Fault localization algorithm...
One promising application of natural language processing (NLP) research is in the area of information extraction (IE). In this paper, we present work flow of our IE system for the extraction of semantically rich information from the unstructured or semi-structured Chinese web pages. Knowledge engineering approach and automatic training approach are used to extract pattern and built knowledge repository...
Multi-scroll chaotic system has found important applications as broadband signal generator and true pseudorandom number generator for communication engineering. In this paper, an active control method is proposed to projective-synchronize two n-scroll chaotic Jerk systems. The proposed technique is applied to achieve generalized projective synchronization for the chaotic system, where all state variables...
This paper focuses on the distributed iterative parameter estimation scheme, based on the consensus averaging algorithm, for estimating an unknown parameter from the noisy measurements. A new spatio-temporal adaptive algorithm, called the consensus averaging-based adaptive estimation fusion (CA-AEF) algorithm is proposed, which accelerates the convergence rate of the current distributed iterative...
Adaptation helps retinal ganglion cells encode varying visual signals. However, an index for population adaptation is still lacking. In present study, we applied entropy theory to characterize the process of adaptation for a group of ganglion cells under the stimulus of both full-field white light and pseudorandom checker-board. We noticed that entropy rate shared the same trend with meaning firing...
Drafting the topological graph of the transduction network characteristics of non-small cell lung cancer signal by Pajek software, analyzing the characteristic quantities such as node degree, clustering coefficient and betweens that construct the complicated system, seeking the key regulating locus (or the local regulating center) that regulates the proliferation and apoptosis of tumor cells, utilizing...
As is well known, the bilinear time-frequency distributions possesses a highly oscillatory cross term for each pair of signal terms. In this work, a novel method to suppress the cross-terms using beamforming is proposed. With Wigner-Ville Distribution as an example, the simulation results verify the feasibility of this method.
Geographic routing, based on greedy forwarding, relies on topology knowledge of the node's neighbors and achieves short path in the well-connected sensor networks. However, because of the absence of the topology knowledge outside of the neighborhood, the forwarding technique fails in the presence of void area. With the void-handling techniques, the geographic routing will experience non-short path...
Holographic biology found by Chinese Professor Ying-qing Zhang has turned on a new era from the point of view of cognizing the world and has led to a cognitive transform in cognition field and will has broad developmental and applied space. According to systems science and system cognition idea, holographic idea is theoretically explained, it is considered that holographic biomedicine is just a biomedical...
The work presented in this paper focuses on discovering ordering rules between ordinal attributes. Generally speaking, rough set theory is the foundation of many algorithms of mining ordering rules. We provide a new approach using algorithm of mining association rules to solve this problem. The key to the problem is to transform information tables into transaction database. The comparison results...
Basic conceptions are defined, which includes states of MAS’s capability, environment states, effects, events and basic actions, et al. An approach to construct strategy of operation process (SOP), for MAS to complete its missions, is advanced, which is based on the constraint of MAS’s capability states and evolving of environment state. With static influence graph and dynamic Bayesian Networks, actions,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.