The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Link prediction is widely used in many applications in complex networks and it is also an alternative tool for community detection. Based on many kinds of hypotheses, lots of efforts have been made to solve the link prediction problem and research has shown that some link prediction heuristics are successful because they effectively estimate the similarity between nodes in some latent space. In this...
To improve the efficiency of Cyber-Physical Systems (CPSs), based on Quantum Particle Swarm Optimization (QPSO), a new optimization algorithm named K-means Multigroup Quantum Particle Swarm Optimization (KMQPSO) for actuator node deployment in CPS is proposed in this paper. The algorithm clusters M sensor nodes into N classes by using K-means algorithm, and then generates an initial solution of algorithm...
Wireless statistic division multiplexing (WSDM) is a multiplexing scheme that transmits multiple signals simultaneously in the same frequency band over wireless channels. Based on the capacity of WSDM system when sources are just two, we extend the WSDM system model and analyze the capacity under multiple sources condition. Computer simulations show that WSDM method can raise the bandwidth efficiency...
Considering that the traditional gateway can't meet the requirements of the increasingly strict network security management, here we propose a design of security gateway based on firewall technology. We realize the real-time, dynamic and fine-grained control of the internal and external network of the gateway. This article introduces a method for gateway to be built, and it's based on the firewall...
The characteristics of cloud computing such as on-demand provisioning of virtual machines in a pay-as-you-go manner have attracted more and more scientific workflows deploying on cloud platforms. Since there are many types of virtual machines which are charged by time intervals, the difficulties of resource provisioning hinders efficient execution of scientific workflows on cloud platforms. To address...
Aiming at time resource allocation in the phased array radar, a scheduling method over chaos adaptively genetic algorithm was proposed. The optimal scheduling model based on the pulse interleaving technique was established, and the chaos adaptively genetic algorithm was used to search solutions. The initial population was generated by the chaos theory and the adaptive crossover and mutation operators...
Apriori algorithm is a classical association rule mining algorithm, but it has problems about frequently scanning database and generating a large number of candidate sets. To solve these problems, an improved DC_Apriori algorithm was proposed, which restructured the storage structure of the database, improved connection of frequent item sets, the generation of k-frequent item sets is only need to...
The paper proposes a series of novel routing algorithms to the issue of accessing the large-scale heterogeneous information over the Internet. Different from traditional ones, the perspectives of the routing are updated in terms of the quality of information accessing, the types of resources, the dominant driver and the expected consequences. The human capital is connected to form the social capital...
The observation of the gigapixel image is the current research hotspot and how to view the image in short time is a big challenge. So in this paper we present an on-line viewing system of the distributed gigapixel image. We construct the MPI programming framework and use the MapReduce data processing model to stitch the subgraphs distributed in the different servers. Based on the size and location...
Over the last two decades, researchers developed many software, hardware, and hybrid Transactional Memories (TMs) with various APIs and semantics. However, reduced performance when exposed to high contention loads is still the major downside of all the TMs. Although many strategies and methods have been proposed, contention management and transaction scheduling still remains an open area of research...
Mobile reading ranks No.4 on the permeate proportion of the mobile Internet applications and is increasing gradually. Understanding user behaviors of mobile reading is important for service provider. However, few work has been done on reading analysis. In this paper, we provide an approach to solve this problem based on cloud computing platform including HDFS and Apache Pig. Our study is carried out...
In recent years, recommender system has been one of the hottest topics in both industry and academia. The ability of providing personalized user experience has been a pivotal evaluation criterion to determine weather a company can be successful or not. In this paper, we fetch the first hand data from a Video Communication Co Ltd, and put forward a new recommender system framework for TV video. Based...
Internationalization of hospitality industry requires hotel talents to operate hotels with international vision and abilities. But at the same time hotel talents should adapt themselves to local environment. This paper, from the perspective of globalization and localization, analyzes the four abilities of hotel international talents with local features, i.e. communication ability, ability of applying...
This paper introduces the mechanism analysis of the large beacon calibration errors how to decrease the navigation performance for the AUV (Autonomous Underwater Vehicle). Generally, when the vehicle using inertial navigation system is performing specific tasks in the water, the navigation error accumulates as time goes on; sometimes the navigation algorithm may fail because of a lot of disturbances,...
Social anxiety (SA) would cause substantial distress and functional impairment. People who falls into SA would produce excessive catecholamine, leading to the elevation of arterial blood pressure (ABP). Moreover, pulse transit time (PTT) has a high correlation with ABP. This paper puts forward to use the PTT series to evaluate SA. The subjects' high anxiety state and low anxiety state are respectively...
The development of Internet of Things (IoT) is expected to be more rapid after the introduction of IEEE 802.11ah wireless local area network (WLAN) standard. IEEE 802.11ah standard is applicable to high-density WLAN system operating at sub 1 GHz band. In order to deal with the serious channel contention, collisions and hidden-node problems in the legacy distributed coordination function (DCF) protocol...
Performing scientific workflows on IaaS cloud may face the problem of uncertain task runtime, meaning that tasks' real execution time are different from their given or evaluated time. So the pre-determined scheduling scheme can not perform as expected, causing that scientific workflows can not be completed within deadline or the total cost is far beyond users' budget. To address this problem, we proposed...
S ample Adaptive Offset (SAO) is a new component of in-loop filter in High Efficiency Video Coding (HEVC), the newest video coding standard. The SAO provides a superior image reconstruction quality at the cost of much higher computational complexity and it is more difficult to realize real-time coding when the image size is large, such as for high definition (HD) videos or ultra-HD videos. In this...
Aiming at the characteristics of tunnel construction, this paper analyses the present situation of management of tunnel construction and puts forward collaborative management of cross river tunnel construction based on BIM. The purpose of this paper is to share and analyze information of whole life cycle project. The whole process of tunnel construction and information of all participants are all...
Along with the increasing trend of data-centric view in safety-related systems and the popularity in use of data-driven systems, data safety has become a significant part of system safety. This paper gives a detailed definition of intrinsic nature of data, based on which this paper reviews the concept of data safety, its related literatures, standards, process framework and several data safety analysis...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.