The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The improved algorithm of WNN based on BP was proposed in this paper. Theoretical analysis and simulation result show it avoids both the blindness of framework designs for BP neural networks and the problem of nonlinear optimizations, such as local optimization. So it can simplify the training of neural networks. It has better abilities in function learning and generalization. This algorithm was successfully...
The Web information which influences the topic relevance of URL is analyzed based on the research of the search strategy about the crawler. On this basis, a new URL search algorithm based on the content and link analysis is supplied to us. The experimental results show that the algorithm not only can solve the problem of topic isolated island to increase recall, but also can avoid the phenomenon of...
According to the foreign classical models of the trust development, the paper firstly explores the dynamic development model of the trust between the entrepreneur and the venture capitalist; secondly, the paper proposes two kinds of the trust using way: the exploiting and the exploratory; finally, the paper empirically examines the positive impact of the trust's development and the using way on entrepreneurial...
Grid is the next generation information infrastructure of Internet and software running support platform. At present, there are many resource discovery mechanisms in Grid, which can find probably useful resources, including software component. Furthermore, this paper solves the problem of searching trusty component by providing a trust evaluation and component selection mechanism. The simulation experiment...
GUI test case definition is the core issue in automatic or semi-automatic GUI testing. We use TTCN-3 language to define GUI test cases. The test specifications under this definition are easy to maintain, evaluate and assess. The time related test specifications are covered; few of current works cover this kind of testing. It's easy and flexible to create test oracles by this approach thanks to TTCN-3...
Most of existing inlining algorithms are used in optimizing compilers and are not suitable for program analysis. Therefore, an inlining algorithm based on program dependence graph is proposed. It uses simple function call tree to determine the sequence of inlining and adopts program dependence graph as the intermediate representation for a program. Inline expansion is performed on program dependence...
CLEFIA is a 128-bit block cipher designed newly by Sony Corporation. In this paper, a differential power analysis attack method on every byte of CLEFIA round keys is presented. Through this attack, the round keys can be obtained, and then the 128-bit encryption key can be calculated out. The results of simulation experiments indicate that this attack is effective and practical on the CLEFIA cipher.
It is very important for generating an orthonormal multiwavelet system to construct a conjugate quadrature filter (CQF). In this paper, a general method of deriving a length-J + 1 conjugate quadrature filter with multiplicity r and scale a from a length-J conjugate quadrature filter is obtained. As a special case, we study generally the construction of a length-J + 1 conjugate quadrature filter which...
The Smarandachely adjacent-vertex total chromatic number of graph G is the smallest positive integer k for which G has a proper total k-coloring such that for any pair of adjacent vertices u, v, the set of colors appearing at vertex u and its incident edges is not a subset of the set of colors appearing at vertex v and its incident edges. This paper,we obtain the Smarandachely adjacent-vertex total...
The instability disaster prediction model of tailings dam had been established, based on system analysis of the factors that caused the instability disaster of tailings dam, by selecting 6 prediction index, medium unit weight, cohesion, internal friction angle, slope angle, slope height and pore pressure ratio and combining with using theory of the rough set and neural network. First the rough set...
As a result of the research and design of reconfiguration router unit (RRU), the producing of network equipment is turned into component composition as building block. Based on the component composition and the character of RRU, this paper proposes the concept-CCS (component candidate set). The scheme of creating component candidate set is based on the BP neural network. The CSS is proposed to resolve...
Program risk management facilitates a higher-level coordination of interdependencies of risk management activities of all related projects within a program, and supports the optimal risk planning for the program. In addition to the metrics of monitoring individual project risks, risk metrics that monitor the overall program risk level are also essential in program management. As risks are not always...
This paper presents a component-based model with a novel ranking method (CMR) for constrained evolutionary optimization. In general, many constraint-handling technique inevitably solve two important problems: (1) how to generate the feasible solutions, (2) how to direct the search to find the feasible optimal solution. For the first problem, this paper introduces a component-based model. The model...
Fuzzy systems have been used as a mechanism to build classifiers which are called fuzzy rule based classification systems (FRBCSs). In this paper, a new method for improving this kind of classifiers, based on ensemble strategy, is proposed. Here instead of building a classifier or a fusion of a group of them, we build some base classifiers and select one for every test pattern. A number of UCI datasets...
In this paper, we describe an approach to communicate with computers in virtual reality (VR) system, this VR system can provide an operating sequence saved in an expert database by using mouse-click event. The VR system allows supervisor to set a series of training procedures, then to test operators whether could follow operating procedures or not. Furthermore, the testing procedures are saved into...
In order to solve an intra-system interface for chip-to-chip and board-to-board communications and meet the explosive demand for higher bandwidth and more efficient signal processing and data transmission in typical embedded system, here is an active demand that adopting a new system interconnect technology to ensure that bus performance continues to increase. The RapidIO is proposed in the paper...
In knowledge discovery, the problem of attributes reduction aims to retain the discriminatory power of original attributes. Many algorithms have been proposed, however, quite often, these methods are computationally time-consuming. To overcome this shortcoming, we introduce two functions, which can be used to improve the process of attribute selection. Based on the proposed functions, a new attributes...
Access with prediction has been an effective approach to reduce the power consumption of set-associative I-cache. However it decreases the performance meanwhile. This paper improved LAW (last accessed way) based I-cache design, which takes both the replacement and predicting access policy into account. By replacing and accessing along the last accessed way, the CMR (cache miss rate) and PMR (predict...
Edge contraction simplification based on DEM terrain algorithm is proposed as a new terrain simplification algorithm which is based on DEM terrain data characteristics. The algorithm introduces the gradient of triangle, and combines with gradient and the length of edges as weight of the vertex to represent the importance of a vertex. By using the vertex weight, we can constrain the region being affected...
A novel bounding sphere hierarchy is presented to track the potential intersection area of the subdivision surfaces, so the large number of facets should not humble the intersection computation. The compact local patches, which are regular vertex grids, are very helpful to construct and verify the bounding spheres of different levels. Some illustrative results are given to verify the feasibility of...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.