The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Web sequential pattern mining is an important way to learn the access behavior of Web users. In this paper, we present an efficient method of Web sequential pattern mining in the e-learning environment. Different from traditional mining methods, we categorize the user sessions into human user sessions, crawler sessions and resource-download user sessions. Then we filter out the non-human user sessions,...
In this paper, we consider blind interference suppression in IR UWB communication system, and the means of a statistical technique called independent component analysis (ICA), taken as a solution for the coexistence of impulse-radio Ultra-wideband (IR-UWB) systems with other wireless systems was studied. Particularly for the evaluation of the system performance, tone, multiton, and partial-band interference...
High voltage switchgear products always produce a great lot of parts models and design information in digital design. And such products have the characteristics of series and complexity. Therefor, this paper takes a certain series of outdoor HV isolating switchgear as an example, and multi-attribute mapping parts library system has been researched and developed based on C/S mode for corporate design...
This paper studies information diffusion in networks. Traditional models are all history insensitive, i.e. only giving activated nodes a one-time chance to activate each of its neighboring nodes with some probability. But history dependent interactions between people are often observed in real world. This paper propose a new model called the history sensitive cascade model (HSCM) that allows activated...
Integrated sidelobe level(ISL) criterion and the maximal sidelobe level(MSL) criterion are used to design frequency-hopping waveforms based on ambiguity functions respectively in this paper. Some simulation results are given and analyzed. The performance of the proposed algorithm is validated by numerical simulations.
As a new research scope, blind signal separation (BSS) is attracting more and more interests. Independent component analysis (ICA) is an important solution to the problem of BSS, under the assumption conditions of ICA, a BSS algorithm using oblique projection operators is proposed in this paper. The autocorrelation matrix of mixing matrix is used to construct the objective function while the principle...
Self-propagating malware spreads over the network quickly and automatically. Malware propagation should be modeled accurately for fast detection and defense. State-of-the-art malware propagation models fail to consider a number of issues. First, the malware can scan a host for multiple vulnerabilities on multiple ports. Second, the vulnerability scanning can be done by multiple threads concurrently...
In wireless sensor network (WSN), digital image data are transported in uncontrolled and possibly hostile environment. Thus, copyright protection has drawn much attention in behalf of the originators of the sensing data in wireless transmission. Traditional security schemes are computationally expensive, because they introduce overhead which shortens the life of the image sensors. In comparison with...
An earlier paper [1] introduced the theory of the single-symbol parallel interpolation in all-digital receiver, in which the interpolation is based on a scale of symbol, characterized by vector-operation of the vector input, fractional delay, and output. In this paper, the theory of the multiple-symbol parallel interpolation in all-digital receiver is proposed, in which the interpolation is based...
Social tagging systems allow collaborative users to annotate shared resources with tags. Since they rely on user contributed content, social tagging systems are vulnerable to spam annotations, which are generated by malicious users to mislead or confuse legitimate users. Thus, mechanisms for spam detection need to be developed to combat the flexible strategies of spammers for the success of social...
Influence of production cost on export price is always the hot topic of foreign trade research. Previous researches just use original series to establish models but not fully discover information content of time series signals. Taking China's citrus trade for example, the paper uses wavelet analysis to decompose production cost and export price into four series, which are trend, cycle, volatility...
Mashup allows users to integrate different kinds of sources together. The ProgrammableWeb.com is a popular online social mashup site that enables users to publish mashups. In this paper, we discover user behavior pattern in mashup community by studying the network and clustering properties of ProgrammableWeb.com. Moreover, we define a new concept-mashup entropy to evaluate the diversity of mashup...
Transactional memory(TM) provides an easy-using and high-performance parallel programming model for multicore systems. It simplifies parallel programming by supporting that transactions appear to execute atomically and in isolation. Despite the large amount of recent works on various TM implementations, very little has been devoted to precisely guarantee that these implementations have implemented...
A vacuum-packaged double-gated FED is fabricated based on a stacked metalized apertures structure. The characteristics of the device shows the device structure is promising for application in large-area display. Further work will be carried out on improving brightness, uniformity and resolution of the device.
This paper focuses on the problem of reasoning about concurrent assembly code with reentrant locks. Our verification technique is based on concurrent separation logic (CSL). In CSL, locks are treated as non-reentrant locks and each lock is associated with a resource invariant, the lock-protected resources are obtained and released through acquiring and releasing the lock respectively. In order to...
Reliability design optimization method of gravity dam section is put forward in this paper. Considering the failure probability of gravity dam is very small required in specification, the Markov chain Monte Carlo (MCMC) method and subset theory are combined and applied to calculate the reliability of gravity dam. The minimization of initial cost and failure cost of gravity dam is optimization objective...
All the major citrus producing areas in China are facing the intensive competition from international market. The problem of how to find an efficient path to decrease citrus production cost by analyzing production cost of citrus and how to promote effective cooperation between regions to deal with the pressure of international market through integrating resources of the regions, has become an important...
The memristor has drawn the worldwide attention sine HP laboratory released its invention on May 1, 2008 at Nature Letters. Since then many researchers are taking efforts to find its applications in various areas of the information technology. A good model will help to study and seize the behavior characteristics of memristor. In this paper, we proposed a piecewise line approximated memristor model,...
In this paper, a marching-on in degree solution to the problem of time domain electric field integer equation is presented where the higher order basis functions are employed for the spatial expansion. The marching-on in degree method can obtain a solution that is late-time stable, which is marching-on in time method cannot. Numerical result is presented to show the accuracy of the MOD method with...
The NEWUOA is a newly developed trust region based derivative-free method for solving unconstrained optimization problems. We present in this paper this powerful tool for antenna optimization. Two antenna design examples are optimized using simplex method, conjugate gradient method and the NEWUOA algorithm. Optimization results are presented and compared. The NEWUOA shows good performance and is proved...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.