The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
By using function one direction S-rough sets, this paper presents concepts of f-separation law, F-separation law, f-separation law dependence and F-separation law dependence. Based on these concepts above, this paper proposes the separation-dependence theorem of f-separation law, the separation-dependence theorem of F-separation law, the separation-dependence theorem, and the criteria of law separation...
Vehicle scheduling optimization of hazardous materials is one of effective means to prevent accidents and reduce the loss of lives and property. This paper studies the vehicle scheduling problem of Hazardous materials based on the transportation risks which vary with time, taking into account the cost constraints and allowing for waiting at the nodes of the network, that is, our problem is a risk-based...
Security and economical operation of the traction transformer is a significant guarantee for electric railway with growing apace. Based on analysis of the economical operation principle with an instance, three kinds of power losses due to transformer and the outlay are discussed. Meanwhile, this paper puts forward an economical operation monitoring system for traction transformers, which links to...
The main purpose of this paper is to study the globally exponential stability of the equilibrium point for a class of impulsive neural networks with time-varying delays. Without assuming global Lipschitz conditions on the activation functions, applying idea of vector Lyapunov function, combining Halanay differential inequality with delay, the sufficient conditions for globally exponential stability...
In the meter reading system of low voltage power line communication (L-PLC), data signals are forwarded by relay nodes adopting routing algorithm. This paper puts forward a dynamic routing algorithm adapting to meter reading system of L-PLC. The algorithm is based on overlapping clustering, so it can establish multiple shortest routings. Then a new rule is given that a node can respond to clustering...
The paper researched on the relationship between Maritime industry and regional economy in Liaoning Province. Firstly, the current Maritime industry and the regional economy development status in Liaoning Province should be summarized and commented on. Thereafter, according to the Granger causal test, selecting the number of shipping cargo, GDP, the number of employment at the end of every year and...
The robot that can detect the indoor dangerous gas and give alarm is very useful. To obtain exact and plentiful danger information, the robot has to search the gas source. Traditional source searching ways of tracing plume or concentration is not ideal now. An intelligent robot mounted gas sensors and vision is introduced, and the responding and recover delay features of gas sensors is analysed. The...
Winding molding is a commonly-used molding method for composite fiber materials, in which the fiber winding tension is an important parameter, since the winding tension directly influences the quality of winded products, making winding tension control a key technique in fiber winding. A new type closed-loop tension control system, with PLC as the main controller, the industrial control computer as...
This paper proposes an automatic performance degradation prediction approach for equipment by use of field data with noise. In this method, the auto-regression model is employed for making performance degradation prediction by means of field data in order to fit the change process of equipment. The order determination for auto-regression model is according to the FSIC criteria which not only consider...
n jobs, each job i with a minimum processing time pi and a weight wi, have to be processed on a batching machine with capacity B. Minimization of total weighted completion time for single batching machine is a classical scheduling problem. Dijkstra's algorithm, the method to find the shortest path in a graph, is used to partition the jobs into batches. And it can get the optimal batches for a certain...
Distributed denial-of-service (DDoS) attacks are a major threat to availability of Internet services and resources. We present an adaptive control mechanism that utilizes the Shewhart's control charts based-on network connection to aid in handling DDoS attacks. This mechanism is designed to prevent incoming traffic from exceeding a given threshold, while allowing as much incoming, legitimate traffic...
Packet loss in a networked control system (NCS) is a stochastic event that depends on the current network state, which, as an abstract and hidden variable, can not be well defined but can be perceived by the observation of the packet-loss process. We model the network in an NCS as a Markov chain and the packet losses as stochastic events whose probability depends on the Markov chain state (i.e. network...
A supply chain with one manufacturer and one retailer was considered in this paper. The manufacturer produces a product, and sells it to the retailer who faces fuzzy consumers' demand. By using credibility theory and profit-sharing contract, a coordination mechanism was established, which can fully coordinate the decentralized supply chain system under fuzzy demand case.
With the development and widely used of Internet and information technology, the Web has become one of the most important means to obtain information for people. According to the Web document classification and the theory of artificial neural network, a Web classification mining method based on fuzzy neural network (FNN) is presented in this paper. We construct the structure of fuzzy neural network...
One of the most important constraints on wireless sensor network is the low power consumption. Therefore, topology of wireless sensor network must focus on power conservation. It is possible to extend the lifetime of a network by controlling its topology through clustering. Overlapping clustering find its wide applications such as inter-cluster routing, topology discovery, node localization, and recovery...
In order to solve security problems in web-based information systems in the large-scale distributed environment, we design a comprehensive security policy. We realize the single entry mechanism of multi-system access by using the single-sign-on, create identity authentication mechanism of high-reliability and security based on China's second-generation ID card. We also propose the cross-domain setup...
This paper proposes a communication model which utilizes Anycast to perform the seamless communication between an ad hoc network and an IPv6 network. This model creates a new kind of IPv6 address auto-configuration scheme which does not need the address duplication detection. In addition, in this model when a mobile node switches between the different sub-MANETs it does not need to register its care-of...
How to reduce the number of messages or improve searching efficiency has been a key problem which restricts the expanding of decentralized and unstructured P2P (peer-to-peer) networks. Based on traditional ant colony optimization (ACO) principle, this paper proposes a new algorithm for unstructured P2P networks by using the pheromone which can reflect the distribution of different types of files....
The single batch-processing machine scheduling problem with re-entrance to minimize total weighted completion time is considered, where the capacity of the machine is infinite and there are different processing types in the same machine. This problem can be transformed into a model with parallel chains precedence constraint. A polynomial time heuristic algorithm for the problem is given. Experimentation...
The theory of learning automata has already been applied in reinforcement learning which is characterized by single-agent and single-stage. This paper proposed a multi-robot cooperative Q-learning algorithm based on learning automata. Each robot updates probability for action selection through the learning automata constantly, and then converts the probability to special experience. Robots can accelerate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.