The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Soft sliding mode control (SSMC) strategy is given for discrete-time systems with uncertainties by the reaching law with active disturbance rejection function in this paper. The reason of causing chattering is analyzed and a discrete reaching law with boundary layer is developed. A grayscale algorithm is presented for uncertainties and the estimates of parameters are obtained appropriately. Soft sliding...
Based on the linear spaces spanned respectively by the functions {1, x, x2, x3, x4, x5}, {1,x, x2, x3, esx, e−sx} and {1, x, x2, x3, eisx, e−isx}, a non-stationary two order Hermite interpolatory subdivision scheme with one parameter is constructed for the given function values and the first and second order derivatives at two sequential points. Also, the convergence, C2 continuity and geometric properties...
In this paper, based on D. X. Cao[Numerical Mathematics A Journal of Chinese Universities, 2002, 24(4): 359-365], an interval algorithm is developed for finding all global solutions of the unconstrained continuous minimax problems, in which the objective functions are C1 functions, by structuring the interval extension of the objection function and region deletion test rules, combining bisection rules...
This paper improves CNM algorithm to detect community structure on weighted network. Based on the link weight and vertex weight, algorithm design defines a new Q-function to calculate community modularity, the type of communities were classified by finding the Q peak. We have generated networks with known community structure A,B and C(different sizes), to test if the algorithms can recognize and extract...
In this paper, we evaluate fractal dimension of the fractal curve generated by the 3-point ternary interpolatory subdivision scheme. A formula between the subdivision parameter and the fractal dimension of the limit fractal curve is obtained. As an application of the obtained results, the generation of fractal curves and surfaces is discussed. The presented results in this paper can also be used to...
Calculating and generating optimal motion path automatically is one of the key issues in virtual human motion path planning. To solve the point, the improved A* algorithm has been analyzed and realized in this paper, we modified the traditional A* algorithm by weighted processing of evaluation function, which made the searching steps reduced from 200 to 80 and searching time reduced from 4.359s to...
In this paper, a simulation optimization method for campus bus routing, which allows the vehicle divert from its current destination, is given. Vehicle routing that can divert a vehicle away from its fixed route in response to a new customer request is beneficial to campus bus routing for its efficiency in quick response and saving cost especially when the density of customer requests is low. A simulation...
The distributed intrusions detection system based on remote procedure call (RPC) has revealed the disadvantages that the quantity of data transmission is large, the performance of real time is poor, the dynamic configuration and cross-platform are hard to realize and so on, which have not been able to satisfy the need of the security of network. This paper introduces the technology of mobile agent...
Hybrid sensor network (HSN) is composed of a set of static and mobile sensor nodes. Besides the capabilities of sensing, computing and communicating like static nodes, mobile nodes have locomotion capability particularly. Area coverage is one of the most fundamental metrics for hybrid sensor network because it is crucial to the quality of monitoring. In order to improve the network coverage, we employ...
Recently, each of the multifunction card systems has been continuously expanding its function, and almost to the acme. The implementation of bank campus multifunction card system has realized the multi win among banks, merchant stations, card owners and schools. However, these designs are confined to the connotative expansions of the system function, not the further optimize of the system. Furthermore,...
According to the problems of the nonlinearity and non norm on dam displacement prediction, the dam displacement mode based on improved ant colony algorithm neural networks was proposed. The binary ant colony algorithm has been brought into the optimization of weights in neural networks. So that the shortcomings of the ant algorithm using in the combinatorial optimization in continuous field have been...
An anomaly intrusion detection algorithm based on minimal diversity is proposed. It can deal with mixed attributes, so overcomes the deficiencies of most unsupervised learning methods. Based on the minimal diversity measurement, we use a small amount of marked data to guide clustering. When detecting new records, we calculate its diversity from the existing clusters to determine its category. This...
In order to improve the performance of Netfilter firewall framework of Linux while packets are being matched under the stateful inspection, the thesis, which is based on the analysis of the mechanism of stateful inspection firewall and the data structure of Netfilter connection tracking hash table, puts forward a matching algorithm of connection tracking based on IP flow. The algorithm, through revising...
In order to connect the block cipher into stream cipher mode, the middleware about output of the block cipher was designed according to flexible and scalable principle. The byte wise operation can be paralleled to more large scale such as 32 bit wise or 16 bit wise. Secure of this design was demonstrated by the block cipher algorithm itself and the complexity of mask algorithm. The middleware model...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.