The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Blog is one of the important components in Web 2.0. Many blog retrieval systems still use the classical retrieval method in Web page retrieval. In this paper, we present a new retrieval approach which is based on the relation between the blogger and query. The advantage of this approach is collecting the semantic information which we called blogger role in retrieval model. The experiments show that...
Axiomatic design gives a design map to designers in order to establish a scientific basic for design and to improve design activities. In the Axiomatic Approach, the relationship between functional requirements and design parameters has been defined by 0 or 1. This definition, sometimes, restrict designers under the situation that there are incomplete information or uncertainty. In this study, the...
In this paper, a kind of shape memory alloy (SMA) model based on hysteretic nonlinear theory and data mining was developed and applied in vibration control on rotor system with SMA bearing. Nonlinear difference item was introduced to interpret the hysteretic phenomenon of SMA. Arctangent function was introduced to describe the variation of SMA stiffness with temperature. Based on above, all of possible...
One of the key questions in algebraic attacks is how to effectively reduce the degree of the function. Based on the algebraic attack, this paper presents a new algorithm of attack - chosen IV algebraic attack, which can reduce the function??s degree by choosing appropriate IV. Using this algorithm, we analyze the One.Fivium, the predigesting form of Trivium. we can get 70 key bits, and the length...
Based on the analysis of the e-waste (electronic waste) reverse logistics network and the characteristics of its planning, this paper presents a mixed-integer linear programming (MILP) model, which has cost minimization as its objective from the overall perspective of reverse logistics. The factors considered in the model include the cost of collection, disassembly and treatment, processing capacity,...
Training systems based on virtual reality are used in several areas. In these systems the user is immersed into a virtual world to have realistic training through realistic interactions. In such training is important to know the quality of user??s training. Several approaches to perform assessment in training simulators based on virtual reality have been proposed. However, they did not present a satisfactory...
Jacquard image inpainting is an interesting new research topic in pattern preprocessing for jacquard CAD. Phase field model has been well acknowledged as an important method for image inpainting. This paper discussed the problem of jacquard image inpainting by approaching the phase field paradigm from a numerical approximation perspective. The basic idea is to represent the damaged pattern of interest...
This paper presents a new functional network which is based on rational function. A learning algorithm of rational functional network is proposed, the learning of functional network parameters use Lagrange multipliers by means of auxiliary function and solving a system of linear equations obtain parameters. An experiment in approximating rational functions is given. The results show that the rational...
A prediction model for short-time traffic flow series is proposed in this paper. At first, estimation of the largest Lyapunov exponent is implemented by applying small data sets method so as to validate that chaos exists in traffic flow series. Then, through properly choosing the delay time and the embedding dimension using mutual information and false nearest neighbor methods, respectively, phase...
With the development of computer technology and artificial intelligence in automatic control field, all kinds of parameters tuning methods of PID controller have emerged in endlessly, which bring much energy for the study of PID controller, but many advanced tuning methods behave not so perfect as to be expected. GA and chaos optimizing was integrated, by use of the chaos serial's property of "ergodicity,...
A belief rule-base inference methodology using the evidential reasoning approach (RIMER) has been developed recently, which is an extension of traditional rule based systems and is capable of representing more complicated causal relationships using different types of information with uncertainties. A rule-base in RIMER is designed with belief degrees embedded in all possible consequents of a rule,...
A novel quantum associative memory using the quantum holography scheme is presented. The patterns stored in the model are encoded into a set of independent quantum states. It overcomes the harm of nonorthogonal by storing these independent patterns into the memory using an iterative learning algorithm. The positive operation valued measurement is performed on the selectively recalled quantum state...
Wireless sensor network has become the hot research field over the world since 1990 s, and the localization plays important role in WSN, however, distance measuring is the base of the localization. A novel distance measuring technology is proposed in the paper, which use fuzzy inference system trained by adaptive neural-fuzzy inference system to create the model that maps RSSI into the correct T-R...
Spatial clustering with obstacles constraints (SCOC) has been a new topic in spatial data mining (SDM).In this paper, we propose an advanced Particle swarm optimization (PSO) and differential evolution (DE) method for SCOC. In the process of doing so,we first developed a novel spatial obstructed distance using PSO-DV(particle swarm optimization with differentially perturbed Velocity) based on grid...
This paper is concerned with the design of type systems for logic programming so as to satisfy the requirements of modern logic programming. The design of type systems is based on the language Godel which has a strongly type system based on many-sorted logic with parametric polymorphism. The definitions of the basic logic programming concepts of terms, atoms, programs are given in the setting of polymorphic...
Tracking moving objects in video sequences requires a robust technique. In this paper, a novel object tracking method is discussed. The color distributions histograms is integrated into particle filter, which is also considered the target??s shape as a necessary factor in target model. To compare the target model with the current hypotheses of the particle filter, the Bhattacharyya coefficient is...
This paper focuses on providing a high-quality semi-supervised clustering with small quantities of constraints. A clustering method called CP-KMeans is proposed for propagating pairwise constraints to nearby instances using a Gaussian function. This method takes a few easily specified constraints, and propagates them to nearby pairs of points to constrain the local neighborhood. clustering with these...
This paper presents a novel approach to improve the OOV (Out-of-vocabulary) phrase translation by combining lexical information and web mining. We first retrieve the top relevant anchor words with source OOV phrase from search engine, and then search the translation with expanded query ??source OOV phrase + anchor word?? from mixed-language web pages. Finally, a ME (Maximum Entropy) model is employed...
To tackle problems of on-line fault detection in industrial process system, a method based on modified SVDD (support vector data description) is presented. Since the performance of SVDD is strongly influenced by kernel parameter selection and hyper-sphere class-boundary. A new criterion is presented to optimize the kernel parameter, which is performed by measuring the non-Gaussian value of kernel...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.