The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The grid index is an important class of indexing technique in the spatial database. Grid index is widely used in the K - nearest neighbor algorithm, the algorithm proposed in this paper is based on the grid index, find the data objects intersecting with the given circle area or contained in the given circle area and cluster the grids which these data objects are in, the remaining grids will be used...
Baltic Capesize Index is very important for market operators to grip the change of Dry Bulk Shipping Market. This paper is trying to build a forecasting model for BCI (Baltic Capesize Index) based on ANN (Artificial Neural Network) optimized by GA (Genetic Algorithm). The result shows that the model can excellently extract the trend of BCI, and reflect changes in actual value with less error.
In this brief, a Maximum Generalized Fisher Criterion (MGFM) based on manifold learning is presented. The proposed algorithm integrates both class information and the manifold information with the aim at finding an optimal subspace to maximize a Fisher form, which can characterize the intra-class compactness of the neighboring points with identical class and the inter-class separability of the other...
An improved LBG algorithm for vector quantization is introduced in this paper. Its basic idea is classifying the input vectors based on space partition with a variational distance threshold. Firstly, set the value of distance adjusting factor and cipher out the initial distance threshold, and then the input vectors will be classified into the corresponding cells or to be new clustering vectors. After...
Since various XML query applications have come to the fore recently, performance optimization becomes the research hotspot. With the popularity of multi-core computing condition, parallelization appears as an important optimization measure. The paper presents a parallel solution to XML query application through the combination of parallel XML parsing and parallel XML query. The XML parsing is based...
The cryptographic properties of a class of Boolean functions with maximum algebraic immunity are investigated. Its algebraic normal form is described, its Walsh spectrum is determined and its resistance to fast algebraic attacks is observed by computer experiments. The maximum algebraic degree of this class of Boolean functions is n - 1. It has always the same nonlinearity, which is the minimum nonlinearity...
Based on the semiconductor heterojunction theory and three-layer model of Si-SiO2, the expressions of electroluminescence intensity ratio of interface layer to silicon core were deduced. The result can explain the low electroluminescence efficiency and the phenomenon of multi electroluminescence peak of nano-porous oxidized silicon well. Simulation results show that: 1) ΔE has a great influence on...
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of hiding methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from...
A huge number of routing protocols have been proposed for ad hoc networks to improve the networks' performance. Because of the large number of designs, it's difficult to track all the designs and choose the optimal protocol for an ad hoc network under various scenarios. Fortunately, a novel architecture named Orchestra has been proposed by Dr. Yaling, Virginia Tech, USA. The architecture decomposed...
Nonparametric diffusion mixing estimator (DME) based blind signal separation (BSS) algorithm is proposed under the framework of natural gradient optimization method. In order to improve the performance of signal separation by BSS, the probability distributions of source signals must be described as accurately as possible. In this paper, we use the new data-driven bandwidth selection method based MDE...
The preheat time of central air-conditioning system preheating space is not only affect the comfort of environment, but also affect energy consumption. A preheat time model is established based on the thermodynamics principle, and an optimum stat-up algorithm of central air-conditioning system is proposed based on the NN (neural network), the simulation result shows that this method can predict the...
The paper explores the methods on decision of optimal strategy for online maintenance for Internetware through static Game Theory. An Online Maintenance Game Model (OMGM) is put forward, which simulating the trend of consuming resource and involving the dependent relationship and characteristics of the procedure maintenance among fault Internetwares. In the case of single fault Internetware and double...
This paper is concerned with the state feed-back guaranteed cost fault tolerant control of networked control systems with both network-induces delay and data dropout. Using LMI approach, The sufficient condition for the existence of the networked guaranteed quadratic cost controller is obtained in terms of matrix inequalities, and the controller design method is deduced in terms of linear matrix inequalities...
Under the competition pressure and driven by the technology development, the number of value-added services will increase very rapidly to improve the ARPU (average revenue per user) of the telecom industries. That makes the feature interaction (FI) problem more serious in the emerging telecom system. Besides, to make the creation of a feature easier, service design is open to the third party in a...
Based on the evolutionary game theory, this paper mainly analyzes the formation of innovation networks, and discovers the formation rule of innovation networks, then finds the key factors which affect the formation of innovation networks. The result shows that evolutionary game promotes the formation of innovation networks. One of the key factors which affect the formation of innovation networks is...
As the candidate for the next generation information infrastructure, The grid is catched the close attention of research workers in recent years. Grid resource management makes up of resource discovery, resource allocation, resource location, resource monitoring, and resource renew and so on. In the middle of them, that resource discovery, resource allocation and resource location are implemented...
Image inpainting is a technique to automatically recover the damaged or missing regions in images. This paper presents a simple but fast approach for recovering the damaged regions of digital images. It uses a unique idea of dynamic weighted kernels. It proposes kernels of different sizes and weights to fill in the damaged regions with different width. The proposed technique has been tested for quality...
Recent researches have highlighted the long-range dependence and impulsive nature of the aggregated network traffic, and consequently long-range dependent α-stable processes model has been widely used to capture the network traffic. This paper presents an analytical demonstration of aggregated network traffic converging to long-range dependent α-stable processes, which provides inherent mechanism...
The degree to which a cryptographic protocol is susceptible to successful attacks or penetrations cannot be accurately calculated because of the more fine and fast algorithms to break ciphers, being introduced. To deal with the issue, analysis of a cryptographic protocol becomes more vital; and more exhaustive search for vulnerabilities is required. Kerberos is a widely used security protocol for...
The hardware of a real-time data acquisition system for infrared drying fruits and vegetables is designed. The hardware system includes a strain gauge mass transducer, two AD590 temperature sensors, a PCI8310 data acquisition board and corresponding circuits. The mass sensor with strain resistances is fixed on a support beam which is outside of drying chamber, thus the temperature of mass sensor elastomer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.