The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the parallel alternating algorithm for solving the system of linear equations Ax = b is investigated. The convergence result for the method is given when the coefficient matrix is a nonsingular H-matrix.
In this paper, An approach for generating multidirectional grid chaotic attractors from a third-order Jerk system is proposed via constructing a series of staircase functions, including two-directional and three-directional multi-scroll chaotic attractors. Its dynamical behaviors are investigated by means of theoretical analysis as well as numerical simulation.
Suppose that x1, y1, x2 and y2 are four integers. For a given Cayley digraph Omega=Cay(G, {a, b}), where G=Z2/K, a=(1, 0)+K, b=(0, 1)+K, K=<alpha, beta>, alpha=(x1, y2), beta=(x2, y2), an algorithm is given to compute the four parameters l, h, m, n of its L-shape tile. Thus the diameter of this Cayley digraph can be calculated by d(Omega)=max{l+h-m-2, l+h-n-2}.
Information systems' centralizing is an inevitable direction. To solve the problem that enterprise users could remotely and securely share software resources in data center, a secure access platform (SAP) based on remote desktop protocol (RDP) was proposed. According to the characteristics of software resources sharing, the software resources sharing model (SRSM) and the secure access platform model...
In this paper, a genetic accelerated trust region algorithm without constraints presented, which can deviate saddle point, and quickly reach more excellent point by using probabilistic optimization approach. While trust region algorithm can only converge to partial optimum, the new algorithm can converge to global optimum with an example proved the validity.
The increasing use of multi-database technology has led to the development of many multi-database systems for real-world application. Large companies may have to confront the multiple data-source problem,so multi-database mining has been an important research area. Negative association rules (NARs) play important roles in decision-making. But nowadays the techniques of NARs mining focus on mono-database...
All of the existing threshold signature schemes cannot withstand conspiracy attacks. Its reason is that the secret of any subgroup shares is the group secret key, and any t or more group members can cooperate to reveal the group secret key with high probability. Therefore, any subgroup can forge the valid signature stand in other subgroups; the design of an efficient scheme is remained open. Lu et...
Construct one kind of new strengthening buffer operator which is close to the law of indices, and the examples have shown that the new strengthening buffer operator can enhance the forecasting simulation precision of GM(1,1) in shock disturbed system. When disturbance from the factor of the shock disturbed system affect to the primary data, then can use the new strengthening buffer operator to eliminate...
Residuated lattice is an important non-classical logic algebra, and L-fuzzy rough set based on residuated lattice can describe the information with incompleteness, fuzziness and uncomparativity in information system. In this paper, the properties of L-fuzzy rough sets based on residuated lattice are given as the expansion of ref.
Certificateless public key cryptosystem overcomes the problem of the certificate management in the certificate-based public key cryptosystem and the inherent key escrow problem in the identity-based public key cryptosystem. Signcryption is a cryptographic primitive that combines both the functions of digital signature and public key encryption in a logical single step with lower computational costs...
Firstly, the author generalizes the indiscernible relation to similarity relation, gives a definition of lambda-discernibility matrix; secondly, an attribute reduct algorithm of decision table with continuous condition attributes is put forward; thirdly, an algorithm of computing significance of each condition attribute is put forward according to the properties of lambda-discernibility matrix; at...
On the basis of the mathematic model for the optimizing of distribution routing of farm produce, this article presents genetic algorithm (GA) to solving this problem. This method can find the optimal or nearly optimal solution to the vehicle routing effectively, which is proved by an experiment provided by this paper.
A variety of cluster analysis techniques exist to group objects having similar characteristics. While there have been recent advances in algorithms for clustering data, some are unable to handle uncertainty in the clustering process while others have stability issues. This paper proposes a new algorithm for clustering data based on rough set theory, which has the ability to handle the uncertainty...
The energy of a graph is defined as the sum of the absolute values of its eigenvalues. Let be the class of connected bipartite graphs with exactly two vertex-disjoint cycles. The graphs with minimal energies in is determined by [18]. In this paper, we determine the second to sixth graphs with minimal energy in the above ordering.
Traditional transportation problem was limited to solving the case that the output and sales were constant. It was largely different from actual situation. Generally speaking, the sales of any goods are not constant forever, which is the demand unfixed. Based on the actual situation, a new problem model is established and the solution is solved, by considering the demand as a space, simultaneously,...
A visual cryptography scheme (VCS) for general access structures is a method to encode a secret image into n shares for n participants. Only qualified subsets of participants can recover the secret image. The yet known schemes omitted the deference between primary information and secondary one in secret image, and its best known upper bound on the share size is exponential. Besides its information...
This paper proposes an improved Grey-Markov forecasting dynamic method based on unbiased grey system theory and fuzzy classification. The new forecasting method is named unbiased Grey-fuzzy-Markov Chain method, which can take advantage of the prediction power of conventional Grey-Markov forecasting method and at the same time eliminate grey bias and improve anti-jamming performance. As an example,...
This paper introduces an image segmentation algorithm of weighted with neighborhood gray difference fuzzy c-means clustering (WFCM) and experiments with the samples on two-dimensional histogram between the original image and its median filter image. Experimental results demonstrate that this scheme can not only effectively segment the low contrast object, but also reduce the noise from the background.
In this paper, by employing bivariate cubic C-1 B-splines, a bivariate B-spline finite element method is presented to solve bending problems of rectangular plates. In comparison with analytical solutions, it is found that, for various boundary conditions and different loading conditions, the accuracy of the present numerical method is very satisfactory.
In this paper, a numerical method based on non-polynomial spline functions is presented to solve the one-dimensional heat equation. The new method is unconditionally stable. The accuracy order of the new method is of O(k5+h4),where k and h denote the mesh parameters for t and x, respectively. The accuracy of the present method is much higher than previous known methods.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.