The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In current textile design, fabric weave pattern indexing and searching require extensive manual operations. The manual weave pattern classification is not sufficient to give the accurate and precise result and it is time-consuming. There is no such research to index and search for weave pattern specially. In this paper we propose a method to index and search weave patterns. We use pattern clusters,...
Financial time series often exhibit high degrees of fluctuation which are considered as noise in time series analysis. To remove noise, several lower bounding the Euclidean distance based dimensionality reduction methods are applied. But, however, these methods do not meet the constraint of financial time series analysis that wants to retain the important points and remove others. Therefore, although...
Biological results suggest that information provided by neighborhood of each individual offers an evolutionary advantage, furthermore, the current state of neighbors significantly impact on the decision process of group members. However, particle swarm algorithm, as a simulation of group foraging behavior, does not introduce the neighborhood sharing information into its evolutionary equations. Hence,...
As a swam intelligent technique, particle swam optimization (PSO) simulates the animal collective behaviors. Since each individual manipulates different experience due to the different living environment, each particle may produce a personal moving direction when making an individual decision at each iteration. However, this decision mechanism is not considered by the standard version of PSO. Therefore,...
Surface representation and processing is one of the key topics in computer graphics, since it greatly affects the range of possible applications. This paper reviews the Laplacian operator (differential coordinates) which represent surface's differential geometric properties , discuss the mesh deformation and smoothing based on Laplacian operator. Laplacian operator denotes a vector that is the difference...
In this paper, we discuss the knowledge redundancy and the knowledge simplification of an uncertain system based on theoretical aspects of rough sets and information entropy. The consistence of analysis on knowledge redundancy and the knowledge simplification is set up. The relationship of information entropy and knowledge significance is drawn on the information dependence of condition attributes...
This paper describes how the selection of parameters for the variance fractal dimension (VFD) multiscale time-domain algorithm can create an amplification of the fractal dimension trajectory that is obtained for a natural-speech waveform in the presence of ambient noise. The technique is based on the variance fractal dimension trajectory (VFDT) algorithm that is used not only to detect the external...
Role assignment is an important task in role-based collaboration (RBC). Agent evaluation is the first step of role assignment. The other two steps are group role assignment and role transfer. This paper clarifies the requirement of agent evaluations, defines the structure of roles and agents, and designs and implements an initial evaluation method. Furthermore, it proposes the requirement to extract...
The concepts of artifact-as-organism and creator-in-a-box, and their autonomy, adaptation and evolution are proposed as purely engineering motivations for the incorporation of the cognitive attributes of consciousness and self-awareness into robots, automata, machines and artifacts. These ideas are then used to create computational models of cognitive robots and machine consciousness that can be executed...
Autonomic unit is the essential element and the most basic component of autonomic systems. Having the ability of handling emotions is considered to make autonomic unit more intelligent, more communicative and more social. In this article we try to build an emotion model for agents that act as autonomic units in autonomic systems and can self-manage its behavior to achieve the best performance. From...
Two implication operators on interval sets are discussed, related structure theorems are proved. As a generalization of these results, two implication operators on rough sets are established. Moreover, a characterization of HW-algebra is proposed and a mistake in a paper is pointed out.
This paper proposes a medoid based variation of rough k-means algorithm. The variation can be especially useful for a more efficient evolutionary implementation of rough clustering. Experimentation with the rough k-means algorithm has shown that it provides a reasonable set of lower and upper bounds for a given dataset. However, rough k-means algorithm has not been explicitly shown to provide optimal...
Credit risk management, which is the basic of the credit application, is the most perfect embodiment in the bank credit application and asset supervision. The ultimate purpose of credit risk management is to ensure that credit fund is of safety, profitability and fluidity. At present, it is extremely important of commercial banks to set up an early bank risk warning system. The author who makes great...
Negotiation protocol is the basic principle in the electronic commerce, this principle have a direct impact on the efficiency of the negotiation. This study brings up the communication architecture with negotiation protocol on the semantic Web. Precisely speaking, agents make computing with ontology, and we define an agent's communication ontology for this communication framework. Semantic Web use...
In this paper, we propose a hierarchically iterate model of human conceptualization and cognition. Based on the theory of dual structure of cognition and related physiological evidence, we firstly propose the notion of concept space in human brain and a corresponding conceptualization model. Conceptualization is the process of forming concepts in our brain. The concept of cognition process is then...
Interactive TV is a promising technique to realize individualized services besides traditional video broadcasting, such as VOD (video on demand), email on DTV (digital TV), e-banking. Utilizing return channel (like Internet, mobile communication), many new applications can be established, which promote the value-added services of DTV. For more profound applications, security mechanisms must be deployed...
In the paper, from the point of view of interval structure, the interval-operations of the universal logics are redefined based on the radical models. The interval-implication is proved to be a generalized S-implication, and its properties are discussed. Especially, its monotonicity is proved. Moreover, operation models of the interval S-implication are given in the special points of h.
Cognitive parameter plays an important role in particle swarm optimization. Although many cognitive parameter selection strategies are proposed, there is still much work need to do. This paper proposes an individual cognitive parameter setting method by simulating the black stork foraging process. It chooses the cognitive value of each particle associated with its age dominated by its performance...
In this paper a novel technique, discrete Fourier transformation based image authentication (DFTIAT) has been proposed to authenticate an image and with its own application one can also transmit secret message or image over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 times 2 of the source image in sliding window manner then convert...
Agents operating in both wired and wireless networks find and retrieve location-aware information. Agents in our system are required to endow with the full range of cognitive abilities, including perception, use of natural language, learning and the ability to understand the user query. The speed and accuracy of retrieval and the usefulness of the retrieved data depends on a number of factors including...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.