The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Civil Experimental System consists of electric-hydraulic servo-controlled machine and the data recorder in which the recorded data are saved. In Electro-hydraulic servo controller, a exterior trigger signal is used to remote control the data recorder working, and the problem of simultaneously data recording is solved by on-line processing of servo testing machine and data recorder, which quicken the...
A challenging problem in oil field development project is the optimization of multi-wells placement because of the increasing in optimization variable quantities and searching space size. To overcome the limitation of traditional optimization with strict definitive objective function, a new method based on Niche Particle Swarm Optimization (NPSO) is proposed in this paper for oil field development...
Seeking global optima of an unconstrained and multi-modal global optimization problem by constructing a filled function is tackled in this paper. by analyzing the property of the existing filled functions, a new filled function is proposed, and its properties are proved. Moreover, the numerical experiments show that the proposed filled function method is more effective than the compared one.
The paper presents a hybrid algorithm for solving nonlinear system of equations through combining Artificial Bee Colony algorithm and Particle Swarm Optimization algorithm together. Numerical computations show that the hybrid algorithm has feasibility and validity in solving nonlinear system of equations.
As community detection having been a hot issue in recent years, firstly the correlate clustering technologies based on local information are studied and summarized. Secondly, the label propagation algorithm that is short for LPA is researched and analyzed in depth. Finally, for the random strategy of LPA results that the network partition is always not optimal, we introduces the concept of the similarity...
Based on needs analysis of University Teacher's files management system, this paper proposed the construction content, goals and function set. It used the Visual Studio 2005 development platform, C # Programming Language, SQL Server 2005 database management system. In the design process, it applied modular management, iterative development, and realized a viable system ultimately that met the design...
In order to solve the view redundant problem in existing research work, we propose an approach based on a single view for 3D model shape feature measuring, and the similarity between models is calculated through dynamic programming algorithm. This method implements single view feature description and shape matching for 3D model. The algorithm is composed of three steps: Firstly, the pose of a 3D model...
The Laplacian matrix is the difference of the diagonal matrix of vertex degrees and the adjacency matrix of a graph G. In this paper, we first give two sharp upper bounds for the radius of the Laplacian spectrum of G in terms of the edge number, the vertex number, the largest degree, the second largest degree and the smallest degree of G by applying non-negative matrix theory and graph theory. Then,...
Feature selection only using wrapper method in high-dimensional data space is always time-consuming. A new feature selection method, named fast static particle swarm optimization, is proposed for tackling this problem. It treats the whole initial feature set as a static particle swarm in which no new particle would be generated in high dimensional space, and the proposed method takes filter and wrapper...
To accurately and actively provide users with their potentially interested information or services is the main task of a recommender system. Collaborative filtering is one of the most widely adopted recommender methods, whereas it is suffering the issue of sparse rating data that will severely degenerate the quality of recommendations. To address this issue, the article proposes a novel method, named...
A computer measurement and control system of test device for grain drying is designed by combining virtual instrument technology and computer measurement and control technology. Working done by hand or half hand system is solved by the automatic system. The hardware is designed with computer and ADAM module as its core, and the software is developed by Lab Windows/CVI. Digital incremental PID control...
A novel Schmitt trigger with controllable hysteresis using neuron-MOS transistors is presented. By selecting the ratio of capacitive coupling coefficients, a Schmitt trigger with different hysteresis characteristics can be achieved. By only varying the external input control signals, the hysteresis window can be conveniently moved without changing its width. The proposed Schmitt trigger has considerable...
Molecular dynamics (MD) simulations are useful in various areas. In this paper, we parallelize and optimize the grid-based MD algorithm on Many Integrated Core (MIC) Architecture. To get full play of the hardware and accelerate computation of MD simulation, we design the parallel structure using multi-threads with OpenMP. Also, various or method such as Array Notification, intrinsic and so on are...
Capturing behavior of malware is one of the essential prerequisites for dynamic malware analysis. In this paper, we study and design a system called Osiris, which makes use of virtual machine technique to capture malware behavior. In particularly, we monitor Windows API calls invoked by the process under analysis (or target program) to rebuild its behaviors. The monitor is implemented at the virtual...
For the difficulty of pseudo-random sequence generation, on the basis of construction research of the first class m subsequence, this paper realizes m subsequence based on shift register theory and deduces feedback function expression of m subsequence and analyses linear complexity of sequence by applying B-M algorithm. The analysis shows that linear complexity of m subsequence is larger than linear...
Since more sensitive data are stored and shared on third-party sites, we may need a system capable of one-to-many communication and data encryption without knowing specific recipients. However, the traditional public key crypto system and broadcast encryption system can't solve both of the problems at the same time. Attribute-Based Encryption (ABE) offers both of the desired abilities. In this paper,...
As an active and dynamic security-defense technique, intrusion detection can detect the interior and exterior attacks, and it plays an important role in assuring the network security. A radial basis function (RBF) neural network learning algorithm based on immune recognition algorithm which based on the clonal selection principle recognition principle was studied. In the algorithm, the input data...
Constructing linear combinations of idem potent matrices is one of important issues. This paper firstly proposes the definition of n - by - n idem potent matrix of k. Then, the conditions that linear combination of idem potent matrix is idem potent matrix are proposed, also by using these properties, constructing method of idem potent matrix is given. Finally, the power of linear combination of idem...
Cognitive radio (CR) is a novel technology that promises to improve spectrum efficiency by allowing secondary users (SUs) to dynamically access spectrum without using by primary users. With offering great flexibility and software reconfigurability, unsecured CR can be easily manipulated to attack legacy users on both control and data channels. In this paper, we explore anti-jamming schemes based on...
Keyboard is the main input device of computer systems. Electromagnetic waves will be emitted while the keys are stroked. These waves may reveal the keystroke information, and it brings about information security problems. Electromagnetic compromising emanations of PS/2 keyboard are studied through laboratory test and mechanism analysis. The testing probe is placed under the control circuit to test...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.