The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of information technology, data acquisition, data storage and management means is increasingly perfect, data mining discipline emerge as the times require At present, the application of the technology in the field of medicine is still in its infancy, and expounds its theoretical framework and its specific application in the medical field and the current application situation in...
Recently, Khan et al. proposed an efficient and practical chaotic hash-based fingerprint biometric remote user authentication scheme on mobile devices. Unfortunately, Yoon-Yoo demonstrated that Khan et al.'s scheme was vulnerable to a privileged insider attack and an impersonation attack by using lost or stolen mobile devices. To isolate such problems, Yoon-Yoo proposed an improvement to Khan et al...
For the superiority of good uniqueness, stability and being easily collected, fingerprint has become one of the most widely used biological characteristics. The algorithm of fingerprints identification is generally divided into three parts: image pretreatment, feature point extraction and matching. This paper analyses and improves the most widely used matching algorithm - the shortest distance point...
At present, the research of biometric recognition is gave more and more attention in the world. The iris recognition is a kind of the biometrics technologies based on the physiological characteristics of human body, compared with the feature recognition based on the fingerprint, palm-print, face and sound etc. the iris recognition technology has recently become popular in identity recognition. In...
Communication network has been shown as a key factor to influence system performance even under the same coordination algorithm. Although many distributed algorithm designs have been proved to be feasible to make up some functions in the large scale networks as claimed, for example, recovering the network from link failure or node failure, the efficiency of recovery in different network topologies...
Given uncertain status reports or notes come from multi-sensor, identity fusion further makes them integrate information and jointly determine the observed entities. This paper discusses an improved data fusion approach to multi-biometric feature, including face, fingerprint and iris image. The approach is called improved multiple biometric data fusion algorithm, based on the eigen-face and the Gabor...
With the enlargement of sizes of networks, scale-free property of networks is present. However, scale-free networks are fragile. If the nodes with most degree are attacked, the whole network will be devastated. This paper proposed an algorithm to optimize the topology of scale-free networks with redundant edges. Adjacent networks of key nodes will be linked as a rotary and junction structure, to ensure...
The potential of wide-area distributed computing systems has not been fully exploited. Resource virtualization gradually is used to promote its computing performance. However, the existing of NAT in networks hinders the communication among distributed systems. This paper argues a structure to solve the obscured connectivity problems with combining virtual machines and virtual networks, and presents...
The single biometric identification technology has the inherent and difficult overcoming shortcomings, so multi-modal biometric fusion and identification techniques were proposed to improve the performance and accurate rate of identification system. This paper proposed a model combined with 2-dimensional Fisher linear discriminant analysis for face and iris feature fusion and recognition. First face...
Traditional fault diagnosis system in large industrial networks is not intelligent enough and cannot predict faults. It is too expensive for industrial corporations. This paper brings forward an intelligent fault diagnosis system-IFDS, which uses new types of intelligent database technology, and has the ability of effectively solving the fault diagnosis and prediction issue of current industrial Ethernet...
Data classification has been studied widely in the fields of Artificial Intelligence, Machine Learning, Data Mining and Pattern Recognition. Up to the present, the development of classification has made great achievements, and many kinds of classified technology and theory will continue to emerge. This paper discusses a great deal of classification algorithms based on the Artificial Neural Networks,...
With the interface from words to graphic, the quality of application program is more and more depend on the degree which the graphic interface feat the taste of the users. So if we can predict the users' taste of the style of application program, our work must be more popular. Now with the help of BP-neural network we can do it because of its strong capacity of prediction.
Rough set theory is not only a new mathematical tool dealing with vagueness and uncertainty but also a new effective soft computing method. It was been widely used in the area of artificial intelligence, data mining, pattern recognition, decision analysis, fault diagnosis and so on. So according to the rough set theory and its extensive applications, the application of rough set theory to algebra...
The device failure must be taken into account in the nano-scale design. This paper presents the probabilistic logic model to model the probabilistic behavior of a nanoscale adder. The analysis shows that the device probability distribution highly depends on the system structures and other performance parameters.
Obtaining invariant representation of time varying signals is one of the major problems in object recognition. Recently, a new method that slowly feature analysis (SFA) which can extract invariant features of temporally varying signals is being explored, which is an extension of independent component analysis (ICA) which has been used for extracting facial feature. The technique of SFA can be extended...
The probabilistic diagnosis model is useful in many fields such as distributed network, digital system level testing, wafer fault testing. Some topologies and continuous defect units distributions are studied in the previous work. In this paper, we extend the model to arbitrary topology structure with share nodes and to the discrete defect distributions, such as Poission distribution and binomial...
In order to effectively evaluate the system security, a quantitative information security evaluation method which combine analytic hierarchy process (AHP) and fuzzy comprehensive evaluation were proposed. Firstly, referring to Common Criteria (CC), we established security evaluation hierarchy model. Then, the analytic hierarchy process (AHP) method was used to calculate the security factors' weights...
The axiom definition of distance measure between vague sets is introduced. Some distance measures are proposed and corresponding proofs are given. The relations between similarity measure and distance measure of vague sets are analyzed. Finally, distance measures of vague sets are applied to pattern recognitions.
Dynamic cluster organization is a hotspot research field for wireless sensor networks. A new algorithm of building and regroup clusters - improved distributed cluster organization algorithm (IDCOA) is proposed in this paper. By IDCOA, nodes are clustered via the way that some nodes propose invitations, and the other sensors respond. Member nodes in the networks save the cluster's id, but header nodes...
A kind of adaptive PID control algorithm is analyzed, and the drawbacks of the existing algorithms are commented. As an improvement, a neural network intelligent control algorithm based on one-step prediction is developed. Result show that the new control method is more adaptable to the control of time-varying and nonlinear control systems.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.