The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Many classical algorithms for node importance estimating have already been developed over the past decades. However, these algorithms face difficulties in complex networks because of their large-scale nodes and complex relationship. We introduce a concept of i-level importance based on which we present a hierarchical method for estimating relative importance in complex networks. Most of complex networks...
This paper deals the reconstruction of generalized periodic Jacobi matrices from eigen-pairs of the matrix and its largest leading principal matrix. The expression and an algorithm of the solution of the problem is given, and a numerical example is provided.
To supply chain network design problems with considering E-commerce of scale and further demand fluctuations, a reliability evaluation method is developed to evaluate the performance of plants under demand fluctuations. In addition, a mathematical programming model is developed to determine the optimal adjustment decisions regarding production reallocation among plants under different fluctuating...
In the last decade, the use of artificial neural networks (ANN) has become widely accepted in medical applications for accuracy for predictive inference, with potential to support and flexible non-linear modelling of large data sets. Feedforward neural network (FNN) is a kind of artificial neural networks, which has a better structure and been widely used. But there are still many drawbacks if we...
The classification for similar features classes is quite difficult task in many existing pattern-recognition systems. When the amount of samples is insufficient, neural networking training is hard. The dimension reduction, classification, clustering etc serial steps in recognition process takes such much time that the practical recognizing application is ease to meet the real time requirement. The...
Car plate recognition is a very important issue in many traffic related applications, and the enhancement process of car plate image is the key step at the very beginning. Its effect relates to the efficiency and precision of car plate localization and recognition directly. This paper brings forward a new car plate image enhancement method based on a simplified PCNN with the parameters determined...
Combining the failure practical example, neural network analysis is used for diagnosis. Using the neural network in MATLAB to simulate the circuit fault system, this is using two different kinds of training functions. For the better analysis of failure diagnosis problems, firstly, using MATLAB software to simulate failure problems such as the emergence of regular power, short circuit and broken circuit...
Effective management of a supply chain requires the ability to detect unexpected variations at an early stage, which brings the possibility of taking preventive decisions to mitigate the variations. This paper proposes a methodology that monitors the dynamic trends of supply chain performance indicators, and gives early-warnings for potential risks. Initially, a supply chain model is built using system...
Multicast communication is one of the most significant collective communication operations and is highly demanded in data communications and scalable parallel and distributed computing systems. In this paper, we consider the issue of supporting multicast in the far and wide used well-known three-stage Clos network C(N, n, m; f2). We make use of Hwang??s unifying approach and Pattavina and Tesei??s...
The key issue for parallel cluster computing is the stability of load balancing method, the unstable behavior such as oscillatory action which caused by delay can intensely influence the performance of load balancing algorithm. In such a case, a linear dynamic load balancing model is proposed in this paper. By analyzing the stability of this linear model, we can not only obtain the relation between...
In view of importance of teaching quality evaluation, the process and results are fully concentrated on considering entirety and dynamics. A method of teaching quality evaluation calculation is proposed on the basis of grey relation analysis and implemented by way of VB program. The no-strictness and no-accuracy results of conventional calculating methods are analyzed. Discusses how to calculate the...
We apply the random-matrix approach to undress the noise of the cross correlation matrix constructed from Shanghai Stock Exchange (SSE) for the period 2001-2008. The empirical evidence shows that, about 7.4% of the eigenvalues fall out the RMT bounds, and the eigenvalues within the bounds agree with the universal properties of random matrix, implying a large degree of noise in the correlation matrix...
The Multi Expression Programming (MEP) and Neural Network (NN) is applied to the crack fault diagnosis of structure. The inherent frequency and the position of the crack obtained by ANSYS are used as parameters of the neural network. This approach employs MEP to evolve the architecture and the parameters encoded in the NN. This framework allows input variables selection, over-layer connections for...
This paper presents an attack scenario based approach for software security testing at design stage. Attack scenarios are represented as extended activity diagram (EAD) and new unified threat model (NUTM). Security test cases are derived from attack scenarios automatically according to coverage criteria of complex attack path. These test cases are applied to test the security of system. According...
Based on an analysis on the Web log mining algorithm of predecessors, this paper presents the Web site structure optimization technology to improve customer interest. The technology proposes similar customer groups and clustering algorithms of relevant Web pages based on interest matrix of customers accessing a Web site to discover the hidden customer access patterns. Experiment results demonstrate...
This paper presents a new method based on bootstrap technique for modulation recognition under the low SNR and multi-path conditions. The bootstrap method is performed when only few samples are available at the receiver. A new neural network is also proposed to select effective features and classifies signals. Extensive simulations show that the new method has preferable performance in low SNR and...
The controlled plant can be tackled with intelligent control always a complex system and often can not be easily controlled with traditional control strategy, single intelligent control maybe inadequate for some complex system. So the integrated intelligent control is needed and often can combine with traditional control, with take advantages respectively. And intelligent control is scramble for it...
The objective of this study was to develop a computerized empty glass bottle inspection method in an attempt to replace manual inspection. The inspection system structure based on machine vision was illustrated in the article. Morphologic methods and wavelet transform were used to extract features of the bottle body and the finish from images. The fuzzy support vector machine neural network was adopted...
Multi-source information fusion was introduced for the evaluation on driver fatigue which is divided into sub-systematic and systematic evaluation by integrating information from visual cues in common use and steering wheel behavior and vehicle??s trajectory information. Neural network is combined with Dempster-Shafer evidence theory to finish character fusion and decision fusion. In the phrase of...
There was a close relationship among network traffic, network user and network application in the complex network environment. We use Gini coefficient in economics to describe elephant and mice phenomenon the network traffic. A new model of network traffic which was comprised of network traffic, network user and network application was built on the basis of Gini coefficient. The result of experiment...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.