The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Standard CLA-EC which is introduced recently is an evolutionary computing model obtained by combining cellular learning automata (CLA) model and evolutionary computing (EC) model. Some drawbacks of this model are low convergence speed and low accuracy for some optimization problems. In this paper a new version of CLA-EC called Continuous Action Set CLA-EC or in short Continuous CLA-EC is proposed...
So far, engineers have proposed many authentication protocols to repair drawbacks of GSM system. Among them, Peinado's method can solve those and provide an anonymous channel for mobile users, an intruder therefore is unable to trace the identity and the location of the user. However, we find that authenticating VLR does not be performed at the first time when MS joins into a new visiting VLR to ask...
A novel application to the optimization of neural networks is presented in this paper. Here, the weight and architecture optimization of neural networks can be formulated as a mixed-integer optimization problem. And then a mixed-integer evolutionary algorithm (Mixed-Integer Hybrid Differential Evolution, MIHDE) is used to optimize the neural network. Finally, the optimized neural network is applied...
A secure and trusted execution environment is a fundamental requirement for distributed network, so that the integrity of service provider platform should be verified prior to services' distribution in order to assure that the platform is free from a malicious modification and attack. In this paper, we proposed an implementation of trusted execution environment based on the combination of trusted...
In this paper, we propose a new architecture for improving the efficiency of specialized vertical search engine based on GPGPUs (General-purpose Graphics Processing Unit), so that the efficiency of information retrieval can be improved. The advantages of GPGPUs in programmability, high parallel processing ability, and floating-point computing power, etc. are utilized in the new architecture. Thus...
With the rapidly growth of wireless sensor networks (WSN), more and more services provide people up-to-date information such as weather forecast, earthquake reports, fire alarm, even for the surveillance system, and so on. The raw data are usually hard to be understood by users. We had proposed an innovated sensor observation service with web-based and GIS-based architecture, which is named WSN Application...
This paper presents an investigation into a new peer-to-peer network architecture for real time tele-haptic operation in distributed virtual environments (DVEs). A novel force collaboration and position synchronization algorithm is developed in order to support networked haptic interactions. Network impairments such as time delay, jitter and packet loss each have different (and severe) impacts on...
Telematics systems are becoming important digital products in near future. However, the most of current telematics systems are isolated from the networks. All of the services are embedded on one single system that has caused lack of diverse information services, and want a more powerful embedded system to support. In this paper, an architecture of cloud computing platform served telematics services...
With the deepening and extension of the business management requirements, information resource planning (IRP) theory is playing an increasingly important role in the enterprise development. This paper analyzes the main elements of integrated information system and information resource planning process, describes the main methods of enterprise information planning and gives integrated information system...
Emergency management system is a special kind of e-Government system. It needs good data integration and application integration for the existing applications, and it is very effective for a given period of time. This paper discusses how to establish the cross application system and rapid integration through the shared service architecture based on Web Service. The architecture has important reference...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.