The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Distributed systems usually provide services with varying criticalities. Failures of core services lead to catastrophic consequences to the system. Maintaining system core services' availability with limited resources has become a challenging issue, especially when system operates in an adversary environment and face malicious under attack. This paper discusses the attacker-defender problem and analyzes...
In this article, a new method to design the flexible-length S-random interleaver is proposed for storage optimization in a turbo coding system. In this method, the high-spread property s-random interleaver is constructed by selecting appropriate position and element that can improve spread property of interleaver in each iteration in which length of interleaver is increased. Using this method, interleavers...
The study aims at Supermarket Distribution Problem, a mathematical model is constructed and an ant colony algorithm with tabu search is put forward. The algorithm is tested in combination with Supermarket Distribution Problem. The experimental results indicated that the algorithm solves Supermarket Distribution Problem effectively with quick convergence, avoids local optimum, high precision solution...
With the combination of information technology and the theory of design pattern, this article focuses on the analysis and comparison of the principles and methods in the business layer design of an information system. The principles of three design patterns, namely business delegate, factory pattern and dependency injection were introduced with in-depth and a new solution to business layer design...
This paper deals with optimization of five-axis tool orientations in the context of five-axis machining of open blisk. The purpose is to generate smooth tool orientations that leading to consistent surface quality which can respect the mechanical and aerodynamic properties of the aero-engine blisk. With this as the object, optimal tool orientation planning methods for five-axis machining of blisk...
The leakage and diffusion accident of inflammable and explosive toxic gas has become a serious problem in the field of environment and security. Based on the optimized three-dimensional finite element model (FEM3) and the actual condition in complex and sealed space, a three-dimensional simulation system is developed to simulate the dynamic process of leakage and diffusion of gas in complex and sealed...
The interior-point filter algorithm (IPFA) is based on a primal-dual interior-point algorithm with a filter set which can be updated after every iteration, and the algorithm will not cycle between two points that alternately decrease the constraint violation and the barrier objective function. The simulation results from IEEE 30-bus system, IEEE 57-bus system and IEEE 118-bus system show that using...
An operation mode called hybrid sliding pressure operation mode, which considered the valve point and operation load together, was proposed in this paper based on the analysis and study of a large number of unit operation optimization methods. In addition, according to the steam-excited vibration occurred during the optimization process when the nozzle governing steam turbine switch single valve to...
The monitoring system of the dam is introduced. To different dams and monitoring points at different locations of dams, because their geographical environment and geological environment are different, their deformation discipline is different, we can preplace some deformation models, and let the computer look for the deformation model whose forecast error is least. In order to improve the fitted accuracy...
The first few batches of cassava harvester embedded depth is not deep enough or too deep, the rate of pick up is not efficient and not efficient cassava into the soil of time differences, and for different levels of the above limitations, this paper through simulation analysis and trajectory analysis of cassava harvester to identify the performance of the structural parameters of the above. Using...
Parallel metaheuristics based on Multiple Independent Runs (MIR) and cooperative search algorithms are widely used to solve difficult optimization problems in diverse domains. A key step in assessing and improving the speed of global convergence of parallel metaheuristics is tracing solutions explored by the MIR-based algorithm. However, this generates large amounts of data, thus posing execution...
Virus signature library is key factor for performance of anti-virus programs considering accuracy and scanning speed. To ensure coverage of various emerging viruses, the scale of signature library grows larger and the consequence is lower efficiency because of the need of matching against more signatures. This paper's target is to decrease the signature mapping cost by optimizing signature library...
Segregation and integration are two general principles of the brain's functional architecture; therefore brain network analysis is of significant importance in understanding brain function. Critical to brain network analysis and construction is the identification of reliable, reproducible and accurate network nodes, or Regions of Interest (ROIs). In this paper, based on functional ROIs derived from...
We address the optimal sink scheduling problem in wireless sensor networks (WSNs). The problem is inherently difficult since sink scheduling and data routing are tightly coupled. Previous approaches either have questionable performance due to no joint considerations, or are based on relaxed constraints. Our aim is to fill in this blank in the research. First, by discretizing continuous time, we develop...
Multi-resource sharings among virtual machines (VM)are very important in data center, but also bring contentions for cache, disk and network in host server. Recent studies focus primarily on locally optimizing resource sharings in a single server, or global optimization of mitigating cache and memory contentions. But it remains an open question how to efficiently find optimal co-schedules for cache,...
We consider a cognitive relay network (CRN) where the secondary users (SUs) are involved as cooperative relays in a primary user's (PU) communication. To avoid generating interference to PU transmissions, it is assumed that SUs can transmit only when the PU's channel is idle. On one hand, SUs use some relay powers to speed up the PU's transmissions. Consequently, PU's buffer will be depleted faster,...
We investigate the channel assignment problem in a cluster-based multi-channel cognitive radio sensor network in this paper. Due to the inherent power and resource constraints of sensor networks, energy efficiency is the primary concern for network design. An R-coefficient is developed to estimate the predicted residual energy using sensor information (current residual energy and expected energy consumption)...
Conventional optimization technique suggests that marginal unit generation sensitivity (MUGS) may be calculated based on perturbation at optimality. The calculated MUGS however only applies to the perturbed operating point. Often times it is not advisable to apply this local information to predict generations at another loading level with considerable load change, and therefore another calculation...
We have developed a hybrid system for imaging small animals using fluorescence optical tomography (FOT) and positron emission tomography (PET) simultaneously. This paper presents a statistical method for reconstructing spatial distribution of dual-labeled tracers from the combined PET and FOT data. We use the Poisson likelihood function for the PET data and Gaussian distribution for the FOT data....
The conditions for the preparation of activated carbon(AC) from corn cob(CC) treated with NaHCO3 using microwave radiation were optimized through response surface methodology (RSM) and central composite design (CCD).The effects of the radiation power, radiation time, and impregnation ratio were studied from the adsorption capacity on methylene blue dye(MB), and yield results.From the analysis of variance...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.