The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Visibility graph method is a main method for finding a geodesic path within a polygonal domain. Rotation tree method is a simple and efficient approach to construct visible edges. However, this approach is unable to distinguish whether a visible edge is inside a polygonal domain or not. This paper presents an inside / outside determination algorithm within O(1) time. Based on this algorithm and rotation...
This paper presents a new association rule mining algorithm called MFP. The MFP algorithm can convert a transaction database into an MFP_tree through scanning the database only once, and then do the mining of the tree. The MFP algorithm usually is more efficient than FP_growth. We used it for mining some formulas of synthetic perfume essence and obtained the success.
This paper discusses the anti-collision algorithm that can simultaneously identify multiple tags in the RFID system, and analyses the characteristics of two types of anti-collision algorithm: BIBD (4,2,1) and the binary tree. Then we advance a novel and fast anti-collision algorithm based on the regressive-style RFID of BIBD (4,2,1). Not only does this anti-collision algorithm methodology have the...
Focusing on the software security risk assessment, this paper adopts the combination of the attack tree model analysis and the Bayesian Network analysis, which takes the advantage of both qualitative analysis and quantitative analysis to assess risks of software security. By the construction and pruning of the attack tree model, this method narrow down the scope of threats that are generated by software...
With the growth of supercomputer's scale, the communication time during executing is increasing. This phenomenon arouses the architecture researchers' interests. In this paper, based on the fat-tree topology, which is widely used in Infiniband, we present an one-to-all broadcast communication time model. After classifying applications into two kinds, we establish the ideal model and the bandwidth-limited...
Pipelined operator tree (POT) scheduling is an important problem in the area of parallel query optimization. A POT is a tree with nodes representing query operators that can run in parallel and edges representing communication between adjacent operators that is handled by sending long streams of data in a parallel-pipelined fashion. The problem is to assign operators to processors so as to minimize...
In software testing and maintenance, how to obtain useful information and relationships from large amounts of information quickly becomes an urgent problem which is required to be solved. Visualization technology is one of the effective tools. The tree structure of hierarchical graph can effectively display hierarchical structure of software testing and maintenance information, and which can help...
With rapid development of GPS and wireless techniques, there accumulates a huge volume of trajectory data with long path in many applications. Thus, detecting outliers from trajectory data has become an attractive and interesting research topic. Like pattern matching, current researches on detecting outliers from trajectory data mainly focus on comparing trajectory's shape. This paper proposes a new...
We first propose a basic Concept Vector, and then we define the Relevancy Node of a given node in a tree, and improved the basic vector through paths between the compared nodes and their Relevancy Nodes in WordNet hierarchy. The similarity of two concepts is obtained by computing cosine similarity between their concept vectors. The vector contains structure information inherent in WordNet. We show...
Aiming to miss-detection of internal tiny flaw of workpiece for cross wedge rolling, it is proposed a new ultrasonic signal testing method based on dual-tree complex wavelet transform (DT-CWT). By constructing new dual-tree complex wavelet bases, and by taking advantage of near shift-invariance of DT-CWT, it can improve common wavelet analysis methods for ultrasonic signal testing based on real orthogonal...
In this paper a new method is designed to account price of military software, which is based on option pricing models. Firstly, it is introduced about the basic knowledge of option pricing model. And then the military software pricing model is provided based on Black-Scholes option model and binomial tree model. Several variables in reference to military software price are redefined in the related...
Classification and prediction of different cancers based on gene expression profiles are important for cancer diagnosis, cancer treatment and medication discovery. The k nearest neighbor algorithm (k-NN) is one easy and efficient machine learning method for cancer classification and the parameter k is crucial. In this paper, we integrate minimum spanning tree (MST) and k nearest neighbor algorithm...
In the multi-objective transportation (MOT) optimization problems, it is quite necessary to consider the tradeoff between all conflictive sub-objectives, consequently it leads to difficulties in solving. So this paper proposed a new Fuzzy Multi-Population Cooperative Genetic Algorithm, called fmc-GA. We firstly infuse the combination of fuzzy rule, which is convenient to express the explicit knowledge,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.