The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a PBIL algorithm based on adaptive theory-giving that the traditional reduction of rough set is not unique and the process lasts for a long time. The learn probability and mutation rate of traditional PBIL algorithm can change adaptively by introducing the Systemic Entropy, then a self-learning and adaptive variability PBIL algorithm (APBIL) is formed. When it is applied to attributes...
Objects grouping and matching simultaneously is an important means in grouping heterogeneous objects. In order to group and match the experts and applications in project-reviewing, the Expert-Application Algorithm is proposed in this paper, which is based on the co-clustering using Bipartite Spectral Graph Partitioning. In this algorithm, the number of the expert and application are configured at...
Compared with gray feature, the Gabor feature is more effective for facial image representation. But in practice, the dimension of a Gabor feature is so high that the computation is prohibitively large. In this paper, We use the two-dimensional principal component analysis (2DPCA) to reduce the dimension and then replace the original gray feature with the Gabor feature vector of reduced dimension...
Evolving networks of ad-hoc, wireless sensing nodes rely heavily on the ability to obtain position information. In this paper we first briefly analyze the theory of DV-hop algorithm. And with simulation results, we realize that the high anchor node ratio and node deployment density can improve the localization precision in random wireless sensor networks. However, this will increase the hardware cost...
In SAC'05, Strangio proposed protocol ECKE- 1 as an efficient elliptic curve Diffie-Hellman two-party key agreement protocol using public key authentication. In this letter, we show that protocol ECKE-1 is vulnerable to key-compromise impersonation attacks. We also present an improved protocol - ECKE-1N, which can withstand such attacks. The new protocol's performance is comparable to the well-known...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.