The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Due to the difficulty in describing the nonlinear characteristic of Francis turbine, this paper takes advantage of the powerful nonlinear approximate ability of the feed forward neural network to put up the Francis turbine neural network model (FTNNM) and the neural network identification model (NNIM) for the nonlinear Francis hydroturbine generator set (TGS) including FTNNM. The neural network model...
Based on the idea of nonlinear prediction of phase space reconstruction, this paper presented a time delay BP neural network model, whose generalization capability was improved by Bayesian regularization. Furthermore, the model is applied to forecast the imp&exp trades in one industry. The results showed that the improved model has excellent generalization capabilities, which not only learned...
Adaptive fuzzy neural network systems (AFNNS) are employed for adaptive noise cancellation using multi-sensory signal recording of the same noise source. The method based on AFNNS not only achieves the optimal reconstruction but also possesses a desired robust against the effect of uncertainties and incomplete information in signal processing. Simulation result shows that the design method can not...
The GIS Web services provide a new efficient solution to assemble the GIS functions into a variety of ITS applications dynamically. This paper presents the system architecture design for Web service based uniform GIS transportation information platform. The GIS Web services are designed to provide the hosted spatial data and GIS functionality for the different customized ITS application systems to...
First, there are several new conceptions proposed, such as adversarial planning, oppositional planning, role value, checking function and so on. Then, a deep research is done on the adversarial planning recognition method that uses role value and checking function. After receiving the recognition results, the oppositional planner applied strategies, according to the actions' executable degree to oppose...
As information and network security is exposing to increasing evil threats significantly, authentication is now playing a more and more important role in security defense system. In this paper, a model that authenticates and identifies access to computer systems and networks by applying keystroke manner is put forward. In the model, legitimate user's typing manner such as durations of keystrokes and...
Learning semantics from low-level features of multimedia learning resources enables high-level access to multimedia content. Considerable amount of researches have been focused on multi-modal analysis to detect multimedia semantics. However, two fundamental issues have not been adequately addressed. First, given a set of raw features extracted from multimedia sources, what are the best independent...
Peer-to-peer (P2P) worm has become an interesting research topic during recent years. It is widely believed that the monoculture of P2P systems results in fast worm propagation in P2P networks and software diversity can decrease the virulence of worms and the effectiveness of repeated applications of single attacks. In order to break monocultures in P2P networks, we propose a P2P-based software diversity...
Most of clustering methods focus on single-dimensional or inter-dimensional data. The paper extends the concept of single-dimensional set to multidimensional set, which is a kind of set whose element is also a single-dimensional set. The paper first presents the definition and similarity model of multidimensional set, whose distance space is proved to be a metric space. Then a database anomaly detection...
According to analyzing and researching the concept and structure of trusted computing, this paper reviews the relative work of security operating system based on trusted computing. Then a security model based on trusted computing IBLP is advanced through the improvement of a classical security model BLP. The overall design scheme and modularized implementation of a secure operating system for trusted...
According to the limitation of principal components analysis (PCA) in dealing with the nonlinear data, connecting with the linear programming techniques for multidimensional analysis of preference (LINMAP), this paper presents the kernel principal components analysis-linear programming techniques for multidimensional analysis of preference (KPCA-LINMAP) evaluation model. In addition, the weight of...
The paper presents a data gathering routing algorithm of sensor networks according to ant algorithm based on MOP, which is achieved via visibility made up of reliability factor and efficiency factor. The MOP jointly optimizes over the efficiency and reliability of the routing build. The efficiency factor reflects the utilization of network resource. The reliability factor endows the artificial ants...
An evolutionary autonomous failure recognition approach is presented using multi-objective genetic programming in this paper. It is compared with the conventional robot failure classification algorithm. Detailed analysis of the evolved feature extractors is tempted on investigated problems. We conclude MOGP is an effective and practical way to automate the process of failure recognition system design...
Future information grid is a large complex system that human and network are integrated, also can be called human-network system. Information grid similar to human organizations (IGSHO) is advanced to model the human-network system. Its construction and operations are explored with new technological and cross-disciplinary knowledge. The conceptions and descriptions of IGSHO are given, on which components...
When the fuzzy production rules (FPRs) are used for knowledge representation in rule-based system, overlapping exists among these rule sets corresponding to different classes. Each of the rule sets is composed of the rules which have the same consequence. In order to model and handle this kind of overlapping, this paper proposes a nonnegative non-additive set function and provides a new algorithm...
Syntax completeness is an important character of formal systems. In this paper, two questions are proposed that syntax completeness of a formal system S have relations with semantic completeness under what condition? What is relation between the syntax completeness of S and the syntax completeness of consistent extension of S? And that following results are proved: (1) if S has syntax completeness...
For most P2P file-swapping applications, sharing is a volunteer action, and peers are not responsible for their irresponsible bartering history. It is necessary to establish a trust mechanism for the P2P network. Among the existing trust models based on recommendation, the Dempster-Shafer (D-S) evidence theory can solve uncertain problem. But in the existing researches on D-S evidence theory, no one...
A method of Web recommendation based on user interest model is proposed from the point of mixed recommendation strategy in this paper. For analyzing features of the user interest model, recommendation satisfaction rate under different model parameter C was studied and effectiveness evaluation was done for the proposed method, UAP (by-user-average collaborative filtering predictor) and IAP (by-item-average...
Automatic source attribution refers to the ability for an autonomous process to determine the source of a previously unexamined piece of writing. Statistical methods for source attribution have been the subject of scholarly research for well over a century. The field, however, is still missing a definitive currency of established or agreed-upon classes of features, methods, techniques and nomenclature...
This paper discusses the design and implementation of a Web crawler - Inar written in C++ executed on Linux. It is a single-threaded crawler base on asynchronous I/O technology, which is under development. This paper describes the architecture of the Web crawler and discusses the design and the function of its each component in detail. For some design problems that we met in practice, such as URL...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.