The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Outdoor unit of household air conditioner is studied widely in household air conditioner parts. Optimizing it may improve air conditioner' EER (Energy Efficiency Ratio) better and make its cost lower than optimizing other parts can. To reduce the cost of the household air conditioner and improve its EER, this paper first studies the correlation among configuration of outdoor unit and heat transfer...
System anomaly detection is very important for development, maintenance and performance refinement in large scale distributed systems. It's a good way to obtain the troubleshooting and problem diagnosis by analyzing system logs produced by distributed systems. However, due to the increasing scale and complexity of distributed systems, the size of logs must be very large. Thus, it's inefficient for...
This article first introduces the basic principle and model of ant colony algorithm which is a kind of swarm intelligence algorithm, then analyzes the defect in large-scale optimization problems of basic ant colony algorithm, and concludes with an improved algorithm to improve execution efficiency and solution quality in solving large-scale problems.
In SaaS model, because of adopting the “single-instance multi-tenancy”, the action of malicious tenants will greatly affect other tenants of the performance and reduce the satisfaction of them. This paper presents the credibility evaluation algorithm of tenants based on the experience. According to tenants access history, it can calculate the credibility of the tenants, assign access control rights...
This paper discusses the anti-collision algorithm that can simultaneously identify multiple tags in the RFID system, and analyses the characteristics of two types of anti-collision algorithm: BIBD (4,2,1) and the binary tree. Then we advance a novel and fast anti-collision algorithm based on the regressive-style RFID of BIBD (4,2,1). Not only does this anti-collision algorithm methodology have the...
It has become an important objective as well as a key technology for improving the effectiveness of modern logistics systems that how to dispatch the various sub-systems in AS/RSs to achieve optimal performances. This paper gave a main focus on the analysis and comparison for a variety of algorithms, of which, the Genetic Algorithm (GA), the Ant Colony Algorithm (ACA) and the Petri Net (PN) were emphatically...
This paper combined the dependence of statistical features of pixels and the low-level features of image to complete image modeling. Using interactive image segmentation principle, through the posterior probability of maximum labelling field to obtain global energy function. Applying Graph Cut method to minimize the energy function and calculating optimal segmentation labeling of the whole image....
LORA plays an important role in the supportability analysis of vessel equipment. There are much less LORA models dealing with few data, so, an optimization model based on LINGO is offered to solve the 3I3R vessel equipment, which is solved by programming. Finally, the model of LORA is practical and effective validated by a case.
In many multivariate statistical techniques, a set of linear functions of the original variables is produced. But this kind of model derived is difficult to interpret, Such as principle component regression (PCR) and partial least squares regression (PLSR), they cannot select variables. The approach least absolute shrinkage and selection operator (LASSO) can easily produce sparse solutions and select...
Most of real-time task scheduling algorithm of embedded real-time systems are based on the worst time for the implementation of scheduling, which will be a waste of resources. Aiming at network system for real-time multimedia application requirements and the current scheduling algorithm lack of real-time performance(ability), this paper analyzes the typical dynamic EDF(Eealiest Deadline First) scheduling...
Message-Passing is the main decoding algorithm for Low-Density Parity Check (LDPC) Codes, in which Logarithmic Belief Propagation (Log-BP) algorithm is the most popularly used one. Particle Swarm Optimization (PSO) can also be regarded as an optimization algorithm by message-passing, which makes it possible to combine Log-BP algorithm with PSO. PSO was introduced into Log-BP algorithm by regarding...
In this paper, we propose an improved independent component analysis(ICA) based CDMA receiver for multiple access communication channels. ICA is a statistical method for transforming an observed multi-dimensional random vector into components that are statistically as independent from each other as possible. We apply Noisy-ICA as a post processor attached to a subspace based CDMA receiver in the presence...
Particle filter (PF) is one of the most important nonlinear filtering methods and has received much attention from many fields over the past decade, but the degeneracy phenomenon and large computation amount of PF have significant negative impacts on its filtering accuracy and real-time performance. In order to solve the problems of PF, this paper integrates distributed genetic algorithms (DGAs) and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.