The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Construction industry is highly risk prone, with complex and dynamic project environments creating an atmosphere of high uncertainty and risk. The industry is vulnerable to various technical, sociopolitical and business risks. The track record to cope with these risks has not been very good in construction industry. As a result, the people working in the industry bear various failures, such as, failure...
Search engines and information retrieval (IR) systems provide a mechanism for users to access large amounts of information available through the Internet. However, in order to find the desired information, the user has to go through a staggering amount of information retrieved from highly dynamic resources. Experimental results show that the approach proposed for constructing specialized domains improves...
There is a wide range of applications in both military and civil fields for optimal path problem in raster terrain whose cost is visibility information. For the path search problem whose objective is maximal average horizon, the traditional algorithms are unsuitable due to the characteristic of the problem. This paper presents a method based on evolutionary algorithm, which may rapidly get the optimal...
Air Combat Decision-Making for Coordinated Multiple Target Assignment is an important yet difficult problem in the modern information warfare. Previous methods, such as neural network, genetic algorithm, ant colony algorithm, particle swarm optimization and auction algorithm, used to resolve this problem have proved to be either too brittle or not stable. To address this problem, a new continuous...
This paper analyzed the definition of software testability and its effect on software reliability test set. The conception of test effectiveness was proposed and the quantity model of minimal sample size in the software reliability demonstration testing (SRDT) introduced test effectiveness was put forward. Then the difference between the number of test cases with different test effectiveness was compared...
In the paper a novel improved genetic algorithm is proposed based on the maximum entropy for thresholding image segmentation. First of all, the encoded mode is made and the maximum entropy function is selected as the key adaptation genetic algorithm, and then the initial group is generated by roulette selection algorithm to the next generation for the best individual, which can improve the global...
Software requires change throughout its lifetime which has been found to be a particular problem in terms of schedule, budget, and quality. The problems are most extreme important for critical software that needs to be validated if the changed requirements will affect safety. Therefore, the change impact analysis is so important in safety-critical system. This paper proposes a method to analyze the...
The method of representing the uncertain information in the ordinary XML document is investigated, so the probabilistic XML document framework is established to represent uncertain information and the probabilistic DTD document as the schema is drawn out. The definition of probabilistic XML document tree is given that atom probabilistic XML element is the basic information unit. The node probability...
A feature extraction approach for printed Tibetan character based on fractal moments is proposed. After analyzing present feature extraction approaches-image projection approach and directional line element approach, the fractal moments theory is applied in the proposed approach. The extracted features using the new method can describe the local and global properties of the character, and decrease...
Progress in wireless communication has made possible the development of low cost wireless sensor networks. In recent years, as the development of wireless sensor networks, people have done some research on cluster-based protocol, about the proongation of the lifetime of WSN and decrease of energy consumed by the sensors. Clustering sensor nodes is an effective topology control approach, but these...
Diagnosis of diseases is well known problem in the medical field. Past research shows that medical database of disease can be train by using various neural network models. Many medical problems face the problem of curse of dimensionality due to the excessively large number of input attributes. Breast cancer is one such problem. We propose the use of modular neural network for effective diagnosis....
Some problems about the connectivity of wireless sensor networks (WSNs) are always important and difficult topics in research, especially the trade-off between connectivity and energy control. In this paper, we present a novel and effective method to calculate nearest neighbor nodes in three-dimensional WSNs using Poisson point field theory, which enables each node to find the kth nearest neighbor...
We describe an active contour based local energy minimization point distribution, behavior of orientation, relaxation iterative algorithm that estimates feature points of static target in image sequence. In our approach, we build a contour model of a target to get some of low-energy points kernels. The use of snake based line model results in more reliable convergence of the point local energy minimization...
As an effective tool for the analysis of internet glance behavior, Markov chain prediction method has an optimistic future in the applications such as internet intrusion detection, information security evaluation, etc.. However, it is usually difficult to get satisfactory results due to the small quantity of the state partition while dealing with actual problems. Applying the concept of fuzzy transition...
This paper presents a fault diagnosis method for power transformer. Fault diagnosis plays an importance role in the efforts for transformer diagnosis to shift form “preventive maintenance” to “condition based maintenance” (CBM), and consequently to reduce the maintenance cost. Ever since its birth, numerous techniques have been researched in this field, each method however, has its own advantages...
A solution is urgently expected to meet the higher-quality web service requirements of various applications on the limited bandwidth of internet. This paper presents a new scheme of load balance of web cluster servers, making possible the service of the two-class priority station polling system under the mixed policy of exhaustive and gated services, optimizing the services of the system in time of...
Aiming at broadband CDMA mobile communication system, we define a way which constructs the link equation of viral mobile communication network based on cross entropy. Through defining the call model of mobile users, this method constructs the link equation of viral mobile communication, introducing the conception of the cross entropy, simulates and analyzes the impact which is the handover probability...
This paper proposes a resolution of overlapping ambiguity in Tibetan word segmentation, which is based on forward-backward scanning identification method and improved maximum probability algorithm. Finally, an experiment is conducted, and the results prove the algorithm is effective.
Uncertainty in data is caused by various reasons such as data generated and transmitted in sensor networks, data mapping in uncertain data integrating environments, and data in some specific applications considering privacy and confidentiality, etc. To describe the uncertainty in data, probabilistic approaches are widely used among other approaches. This paper gives a survey study on some probabilistic...
Cluster analysis becoming increasingly essential in data mining field, and is mainly used to discover the valuable data distribution and data mode in the potential datum. Based on the pheromone studies on basic clustering model, the theory of information entropy and two classical clustering analysis algorithms, an algorithm of K-means based on the pheromone is presented firstly. The algorithm works...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.