The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The target of worm attacking is the whole Internet; usually, the defense of worm intrusion based on single computer cannot work well when facing large scale of worms' attacking, so it cannot assure the network security all the time. Inspired by the collaboration of the immune cells, we apply the artificial immunology theory to the design of the active worm defense model AI-WDM, in which the computer...
In order to solve the problem of the current mine microseism monitoring, presents a method to use the OPENGL program language as the designing tool to establish the mine microseism monitoring 3D model. Based on the model, dynamic displays monitoring points and the microseism centre which is got by the monitoring data computing in the three-dimensional visualization system. It implements the purpose...
Gaussian mixture model (GMM) has been widely used in fields of image processing and investment data mining. However, in many practical applications, the number of the components is not known. This paper proposes a kind of greedy merge EM (GMEM) learning algorithm such that the number of Gaussians can be determined automatically with the minimum message length (MML) criterion. Moreover, the greedy...
Domain experts are important clues to search for relevant documents in digital library information system. In this paper, we present a method to improve the document search by finding domain experts. Our method aims at exploiting the domain expertise as a rich source of evidence for document search. In particular, we propose (i) a graph-based model of the domain experts, (ii) an algorithm to find...
To improve the efficiency of auction-based negotiation system in e-marketplace, this paper presents a model of game agent for auction-based negotiation, a bid negotiation algorithm based on game theory and a framework of game-based electronic marketplace. It provides a new effective way to establish buyer game agents for making buyer agent bid more rationally and a game negotiation agent system for...
Through analyzing non-linear, time-varying characteristics of the economic system and summing up the basic idea of nonlinear economic model, BP neural network is used to do non-linear economic modeling methodology and specific implementation steps, by which new ideas is put forward for the existence of model, and implementation of the circumstances in Matlab is given.
Granular computing theory is a new way to simulate human thinking to help solve complicated problems. This paper combines granular computing theory with Web structure, presents a new granularity model of Web structure. A new concept called webpage granularity is defined, some associated factors are presented to impact on the organizational structure of Website. Finally, an experiment is given to verify...
Building models and model mesh simplification multiresolution storage mechanism is the key for three-dimensional navigation widely used. This paper proposed a mesh simplification and multiresolution storage compression algorithm based on the model of edge collapse operations. First of all, it used an artificial interact method to set the protected feature points and grids and updated a series of partial...
Discrete EVent system Specification(DEVS) is widely used in modeling and simulation for the interoperability, re-useability, and composability. The Distributed and Parallel DEVS is developed to study the complex problems. But the available implementations are all distribution centered, not performance centered. This paper applies the Message Passing Interface(MPI) into distributed DEVS simulation...
Modern machining processes require machine tools to work accurately and dynamically. This leads to the necessity for a method which can analyze the stiffness of machine tools. In this paper, a single module method and a hybrid modeling method for analyzing the stiffness of machine tools are presented. Techniques include building suitable finite element models, determining equivalent loads, simulating...
The Algorithm UCT, proposed by Kocsys et al, which apply multi-armed bandit problem into the tree-structured search space, achieves some remarkable success in some challenging fields. For UCT algorithm, Monte-Carlo simulations are performed with the guidance of UCB1 formula, which are averaged to evaluate a specified action. We observe that, as more simulations are performed, later ones usually lead...
The design based on ARM techniques is to realize a common model of communication equipment simulator. The S3C2410 chip, as the core of hardware, together with FPGA and other interface circuits, realize standardized coding and display controlling; the backstage computer software as a finite-state machine, need to give correct operating response, send display orders, communicate with other simulator...
Model checking is an automatic verification technique for finite state concurrent systems. In this approach to verification, temporal logic specifications are checked by an exhaustive search of the state space of the concurrent system. The size of the state space grows exponentially with the number of processes. This phenomenon is commonly called ??State Explosion Problem??. Many progress has been...
Malicious software is one of the most popular security threats of computer networks. It is difficult for traditional solutions to deal with dynamical and variable behaviors against malicious software. Danger model theory is a hypothesis of artificial immune systems. This hypothesis explains what is malicious from the trend of behaviors in a computer system. This paper presented a novel idea that malicious...
Transit signal priority (TSP) is a direct way to improve public transit service level and attract residents to trip. This paper proposes a novel signal control logic for TSP and attempts to improve the transit performance, minimize impaction of the other traffic mode by real time adjust the control parameters of transit departure ratio and vehicle delay ratio based on transit service schedules.
Many experts would agree that, had it not been for the analysis of gigabit switches, the simulation of Markov models might never have occurred. Actually, few theorists would disagree with the development of the UNIVAC computer, which embodies the robust principles of programming languages. In research, heterogeneous methodologies are used to prove that cache coherence and journaling file systems are...
The teachers' title be divided into the professor, the associate professor, the lecturer and the teaching assistant in china's university, the different titles form a structure. How to seek the stable structure, to be very difficulty, and very few people studied on the question. In this paper, we establish a Markov model for the university teachers' title structure, and establish the optimized model...
With the development and application of modern science and technology, many new technical measurement methods have been put forward successively which are of high resolution and high collection rate about microseismic monitoring. We urgently need an effective detection method of abnormal data (mine earthquake) to collect lots of data to make real-time detection. In the past, we usually depend on experienced...
Taking system dynamics as the study framework, using Support Vector Machines to obtain the non-linear relationship among units of product development complex system; and then using Rough Set to analysis the feedback loops of flow-chart of the system, so as to find the non-linear dynamics correcting mechanism of product development. The simulation model can illuminate the essentiality of the evolution...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.