The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper gives a brief overview of version 3.3 of PRISM, a tool for the automatic formal verification of probabilistic systems, and some of the case studies to which it has already been applied to date.
The technology of face recognition has been widely applied to many fields such as identity authentication. A New Improvement for Face Recognition Using MMPCA is presented in this paper. The proposed algorithm when compared with conventional modular PCA algorithm is different in the computation of image mean value and the recognition process. Comparison of the two algorithms in different face databases...
Bitmap indices are widely used in massive and read-mostly datasets such as data warehouses and scientific databases. Recently, Bloom filters were used to encode bitmap indices into approximate bitmaps(AB). The salient advantage of this technique is that bitmaps can be directly accessed without decompression, and the query time is proportional in the size of the region being queried. This technique,...
Aiming at the problem of the "semantic gap" and the "dimensionality curse", this paper discussed the model of cross-media retrieval. The methods of feature extraction and fusion of multimedia were given for processing high-dimensional data, and a nonlinear hybrid classifier based on support vector hidden Markov models was design for implementation semantic mapping and learning...
This paper presents a variant test scheduling for multi-clock domain SoC. Test resources are allocated reasonably by using ant colony optimization, and test application time is minimized. Experimental results demonstrate that the proposed method improves test application time on previous methods.
This paper presents a new mesh simplification algorithm based on edge collapse, it combines surface curvature and quadric error metric, the position of a new vertex for edge collapse depends on multiple-weighted approach. The new algorithm can improve simplification rationality in procedure and preserve important features after simplification. In an addition, we do some experiments with comparing...
This article introduces a numerical scheme to simulate aero acoustics propagation. The wave equation is discrete spatially with collocated finite volume method and Eulerian implicit method in time domain. The performance of the PC is greatly developed, so as expected the network can provide great computational capability. Based on this point, we developed a data structure system and parallel code...
Swarm intelligence exhibits a number of interesting properties such as flexibility, robustness, decentralization and self-organization. The instances of these algorithms on the domains of optimization, telecommunication network, knowledge discovery and robots are obviously increased. An ant colony algorithm is proposed aiming at the basic ant colony algorithms convergence slow and be prone to plunge...
Introducing Agent theory is an efficient way to solve the limitation of the method that constructing plant growth modeling in the virtual plant research, based on the definition and features of Agent and introduction of the virtual plant's significance and present situation. A new system of plant growth modeling is proposed, which is applied in soybean growth system, according to the features of plant...
The most important thing of using model checking technology to verify production knowledge base is to build system model from rule set. It is a fundamental but time-consuming job. This paper presents an efficient formal method to verify production knowledge base. Two main contributions of this paper are as follows. Firstly, we propose a dynamic modeling method to build system model of knowledge base,...
Notice of Violation of IEEE Publication Principles"An Efficient Mining Algorithm for Top K Strongly Correlated Item Pairs"by Qiang Li and Yongshi Zhangin the Proceedings of the 4th International Conference on Internet Computing for Science and Engineering, December 2009, pp. 152-155After careful and considered review of the content and authorship of this paper by a duly constituted expert...
This paper presents a survey of the state-of-art of formal verification technique. The expression models for formal verification are introduced and analyzed. The characteristics of each model are expounded. Moreover, the typical model checking techniques are studied. Equivalence checking and property checking are introduced. The development trend for formal verification is discussed.
Trajectories play an important role in analyzing the behavior of moving objects. Many researches have been conducted that retrieved similar trajectories of moving objects in Euclidean space rather than in road network space. However, in real applications, most moving objects are located in road network space. In this paper, we investigate the properties of similar trajectories in road network space...
In order to deal with the uncertain temporal knowledge of the complex real-time system and to improve the existed uncertain temporal knowledge expression and inference algorithm, a new kind of high-level fuzzy timed Petri nets was proposed based on fuzzy timed Petri nets (FTN). The uncertain temporal of the complex real-time can be quantitatively described and the time possibility can be analyzed...
By analyzing existed improved DHT networks, we propose a novel improved CAN: PPCAN, which adopt 2-dimensional Polar coordinate and power series expand subspace hops to obtain better routing efficiency and lower maintenance cost. Then, we introduce the Landmarks to optimize the relay sequenced peers through the hops. Our design can be implemented entirely at the application level. Some improved routing...
Feature extraction for individual communication transmitter identification is one of the major issues in the identifying process. A neighborhood rough set is proposed in this paper, in order to search for the good feature subset. Then we present a SVM classification approach of weighted feature set based on the significance of an attribute. The result of experiments shows that the reduced feature...
Stitching multiple animate or video clips together is a widely used technique in multimedia processing area. From digital video editing to scene generator in Text-to-Scene conversion system, it usually has its usage. Currently, many general or specific software were developed aiming to complete such task. However, few of them stitch VRML clips together. In this paper, we proposed an approach of stitching...
How to distinguish abnormal access from normal ones is the key problem in Distribution Denial of service(DDoS) attack detection. This research aims at finding out the major difference between the abnormal access and the normal ones in application layer. To this end, the paper conducts modeling on Web users' access behaviors based on hidden Markov model(HMM) with multiple chains and puts forward a...
One of the bottlenecks in traditional evolvable hardware is that the fitness evaluation process is restricted by the performance of the reconfigurable hardware, so that the overall evolution efficiency is very low. In order to solve the problem we propose a double-layer evolvable hardware method, which is composed of logical evolving layer and physical evolving layer. The chromosome coding based on...
As the brisk development of Internet, shopping online becomes the mainstream. This new shopping makes the customers convenient, but it also makes new trouble that it costs customers much time to browse lots of website to choose the right commodities. This paper analyzed Deep Web technology, proposed the “Easy-shopping” system based on this technology, and introduced each part of this system. This...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.