The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The improved algorithm of WNN based on BP was proposed in this paper. Theoretical analysis and simulation result show it avoids both the blindness of framework designs for BP neural networks and the problem of nonlinear optimizations, such as local optimization. So it can simplify the training of neural networks. It has better abilities in function learning and generalization. This algorithm was successfully...
The Web information which influences the topic relevance of URL is analyzed based on the research of the search strategy about the crawler. On this basis, a new URL search algorithm based on the content and link analysis is supplied to us. The experimental results show that the algorithm not only can solve the problem of topic isolated island to increase recall, but also can avoid the phenomenon of...
Most of existing inlining algorithms are used in optimizing compilers and are not suitable for program analysis. Therefore, an inlining algorithm based on program dependence graph is proposed. It uses simple function call tree to determine the sequence of inlining and adopts program dependence graph as the intermediate representation for a program. Inline expansion is performed on program dependence...
This paper first presents a new architecture of SHA-1, which achieved the theoretical upper bound on throughput in the iterative architecture. And then based on the general proposed architecture, this paper implemented other two different kinds of pipelined architectures which are based on the iterative technique and the loop unrolling technique respectively. The latter with 40-stage pipeline reached...
In knowledge discovery, the problem of attributes reduction aims to retain the discriminatory power of original attributes. Many algorithms have been proposed, however, quite often, these methods are computationally time-consuming. To overcome this shortcoming, we introduce two functions, which can be used to improve the process of attribute selection. Based on the proposed functions, a new attributes...
Edge contraction simplification based on DEM terrain algorithm is proposed as a new terrain simplification algorithm which is based on DEM terrain data characteristics. The algorithm introduces the gradient of triangle, and combines with gradient and the length of edges as weight of the vertex to represent the importance of a vertex. By using the vertex weight, we can constrain the region being affected...
Aiming at the various distribute clustering problems in diffusion model for all data points, providing a new clustering algorithm (CDD) based on the change of density. CDD searches the core point using a typical clustering algorithm (DBSCAN) which based on the density, then calculate the direction, speed and acceleration of density diffused which through analyze the diffusion rule of data sample and...
Composite service selection is a research difficulties in service-oriented computing domain. Most selection approaches are based on service QoS information which is difficult to acquire accurately. In this paper, a distributed Web service usage pattern mining infrastructure based on services execution information is proposed. In order to meet the cross-organizational associated business requirement,...
Firstly, the article introduces the WIA-PA wireless network which is under study at present and can be used for industrial control. Aiming to FTSP algorithm can be used correctly in this network, combined with the unique TDMA media access control method of this network, this article takes a way building the logic synchronization tree to improve the precision of multi-hop FTSP clock synchronization...
The Ant colony algorithm is an intelligent algorithm with its better robustness and parallelism, as well as the advantage combined easily with other algorithms. Each ant Agent does not need to have a comprehensive understanding to the every aspect of the system so the individual Agent is considered as the main object of study. In the paper, supermarket customer subdivision model was researched by...
An improved adaptive genetic algorithm for solving facility layout problem is proposed. The principle of the algorithm is: during running process, making the crossover and mutation possibility adjust adaptively along with the value of fitness in accordance with the laws of sigmoid function curve; using smaller crossover and mutation possibility for the individuals of better patterns while lager crossover...
The control dependency information of inter-class is the foundation of inter-class data-flow testing. This paper proposes an approach to analyzing inter-class control dependence of Java programs with exception-handling constructs by studying the effects of the exception propagation on the dependency in the cluster-level testing of object-oriented programs. According to the relationships of classes,...
This paper discusses the two important phases, which are data preprocessing and clustering analysis, in Web transactions clustering analysis, in order to gain an easily interpreted clustering result, we introduce the "Concept URL" in the data preprocessing phase; In the clustering analysis phase, A model of artificial ant is set up. Based on this model, we implement an ant-colony clustering...
Efficient application assignment algorithm is important for high performance and low power consumption in NoC architecture. In this paper, we apply novel algorithm based on GA (genetic algorithm) and maximal free matrix constraint, which aim at using confliction avoidance and minimization between router communications in order to provide less network contentions during several running applications...
This paper presents a database-based optimized algorithm for terrain data organization, storage, scheduling and multi-resolution rendering; besides, some technical means in data dynamical scheduling are illustrated, such as data encoding and indexing, view frustum culling, cache management and multi-threading. Due to the drawbacks of ROAM algorithm when dealing with large scale terrain data, ROAM...
Based on chaotic characteristic of high frequency ground-wave radar (HFGWR) sea clutter, a new adaptive artificial neural networks ensemble method for sea clutter predicting is presented in this paper. In phase space reconstructed, when one sea clutter sample is to be predicted, some artificial neural networks are choosed adaptively by evaluating their performance and error correlation in neighborhood...
As belt transmission can offer a maximum of versatility as power transmission elements and allow the designer considerable flexibility in selecting a location of driver and driven machinery, and can operate smoothly and silently, therefore it is very necessary to use advanced methods to design the belt transmission. Considering the random character of the design parameters and load-bearing capacity,...
Recently, a fast modular multiexponentiation algorithm for computing AXBY (mod N) was proposed. The authors claimed that on average their algorithm only requires to perform 1.306 k modular multiplications (MMs), where k is the bit length of the exponents. This claimed performance is significantly better than all other comparable algorithms, where the best known result by other algorithms achieves...
For the problem of digital audio watermarking against synchronization attacks, we propose a self-synchronization properties anti-synchronization attacks audio watermarking algorithm. The algorithm accorded maximize the autocorrelation of watermark data generated by the same pseudo-random sequence to get synchronization, using search mechanism of segments synchronization to obtain synchronization point...
The performance of large vocabulary continuous speech recognition system mostly depends on the quality of speech corpus, but the design of corpus ties in corpus selection. According to ancient Tibetan phonology, the continuous speech corpus based on half-syllable Tibetan is built. Each word in the ten thousands sentences of Tibetan texts is separated into initial and final. Then, the inner syllabic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.