The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We propose a Hamming distance based approximate similarity text search (HASTS) algorithm to improve the quality of queries in massive text data. The HASTS algorithm first constructs an index table with the substrings extracted randomly from the feature fingerprints generated by the SimHash algorithm. Then, it assigns weights to text terms to reduce the size of the candidate set. Furthermore, the final...
The article presents the new method of liveness verification with Object-Oriented Timed Petri Nets, which is based on explicit node enumeration and the incidence matrix manner. The bank switching model is illustrated to the new method of liveness verification. OOTPN is proposed, and node symmetry is proposed which reduces the number of nodes by identifying those nodes that are equivalent under the...
Multi-instance model has been employed in image retrieval for its excellent performance to deal with the ambiguities in an image. However, many multi-instance learning methods such as Diverse Density and so on cannot meet the requirement of real-time and the retrieval accuracy, so need to be improved. This paper selects instances from regions to words to make the regions full of semantics and become...
This study developed a load balancing early handoff scheme that use the overlap in base stations in wireless cellular networks. The proposed scheme enables early transfer of part of a heavy base station load, in order to reduce the new call blocking probability (CBP) and handoff call connection dropping probability (CDP) as well as to increase the resource utilization of wireless networks. Since the...
Security corporations and researchers usually employ fuzzing techniques to find hiding bugs of programs. They collect millions of sample files to test target programs with mutating samples' byte randomly. However, it wastes lots of time and computation resources because the programs mostly repeat same paths with these samples. In the paper, we design a flexible and efficient method to calculate the...
Symbolic execution is one of the most important computational intelligence methods in vulnerability detection, delivering high code coverage. The bottleneck of dynamic symbolic execution is its running speed, and few existing works focus on research of the problem. In the paper, we present a taint-based symbolic execution method to improve its efficiency. The property of our method includes: 1) it...
In this paper, the tracking control problem of a 3-input 3-output nonlinear system is investigated and solved. By adopting and generalizing Zhang-gradient (ZG) method, as the novel combination of Zhang dynamics (ZD) and gradient dynamics (GD), in a quite different way (i.e., with GD used additionally once more), a ZG controller group is designed and proposed for the tracking control of the aforementioned...
In this study, a backstepping fuzzy-neural-network control (BFNNC) is designed for the on-line levitated balancing and propulsive positioning of a hybrid magnetic-levitation (maglev) transportation system. In the proposed BFNNC scheme, a fuzzy neural network (FNN) control is utilized to be the major control role by imitating a backstepping control (BSC) strategy, and adaptation laws for network parameters...
Chip Design of a frequency synthesizer with digital calibration and spur reduction method operating at 5.0-GHz band is proposed and fabricated in TSMC 0.18-um CMOS process. The proposed PLL with digital calibration reduces VCO gain, Kvco to achieve better phase noise and spur performance in systems networks and architectures for high end computing. The proposed CP reduces phase error and spur at the...
This paper studied the information overload brought by abundant digital television (TV) program resources and media image which need to adapt to the changing market environment by crowd mining based on audience behavior analysis. When the audience crowd is classified to several levels, personalized audience behavior analysis method and group audience behavior analysis method are proposed separately...
This paper proves the property of Otsu algorithm is equally applicable to two-dimensional Otsu algorithm, the property is that the threshold value of the Otsu method is the average of the means of two classes partitioned by this threshold. On the basis of this property, two-dimensional Otsu method is improved into an iterative method firstly, which reduces the time consumption greatly. Secondly, this...
In past decades, the online solution of inverse kinematics (IK) has always been a mathematically troublesome problem for redundant robot manipulators. Besides, the traditional IK approaches, such as the pseudo-inverse method, have to calculate the computationally expensive inverse (specifically, pseudo-inverse) of Jacobian matrix. To drastically and effectively avoid the Jacobian inversion and to...
Windward area is one of the most important parameters of space station and is affected by several coupled disciplines. To optimize it can lower the operating cost of space station. In this paper, collaborative optimization (CO), a multidisciplinary design optimization (MDO) method, is applied to the windward area optimization of space station in order to improve the design quality and efficiency of...
Extreme learning machine (ELM), as an emergent technology, has attracted tremendous attention from various fields for its fast learning speed. Different from traditional gradient-based learning algorithms for feed-forward neural networks, ELM need not be neuron alike and learns with good generalization performance. However, ELM may require more hidden neurons than traditional tuning-based learning...
Considering the complexity of designing an interval type-2 fuzzy logic system (IT2FLS) and the internal relationship between a type-1 fuzzy logic system (T1FLS) and an IT2FLS, a modified type-2 fuzzy logic system learned by a T1FLS (MT2FLS) is proposed in this paper. The MT2FLS includes a T1FLS and an IT2FLS which is an extension of the T1FLS. The designing process of MT2FLS mainly includes two parts:...
The huge data traffic demand is a challenge for the next generation of wireless network. Since the majority of data is public information, a novel wireless intelligent pushing mechanism is presented by pushing public information in the way of point to multipoint (P2M) in network idle time, using limited spectrum. Analytic Hierarchy Process (AHP) is employed to establish the performance evaluation...
With the development of online social network (OSN), social recommendation approaches have gain more and more momentum. The users' OSN interactions which reflect the social tie strength put forward social recommendation approaches. But most of the previous work just classify the social tie strength into strong one and weak one. The coarse-grained social tie strength can not accurately reflect the...
Load balancing is one of the most important problems in the field of algorithm design. This problem is NP-hard while there exists a polynomial time approximation scheme (PTAS). In order to design an effective approximation algorithm for this problem, we introduce the concept of β-Flatness and a corresponding planarization algorithm (β_PALNM) in this work, and then propose a heuristic algorithm called...
Different from data aggregation, in the process of transmitting data without aggregation from leaf node to the sink, the size of the integrated data increases. In this paper, we define that the lifetime of the node is the rounds of transmitting integrated data, which includes its own data and the received data from its children, in view of the feature of data gathering without aggregation. For different...
Recently, a novel family of unsupervised learning techniques, which is referred to as cluster ensemble, attracts great interest from computational intelligence communities. Cluster ensemble techniques combine multiple individual clustering solutions into a consensus one, and can provide more robust and frequently more accurate partitions when comparing to individual clustering methods. However, although...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.