The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes an approach using MapReduce-based Rocchio relevance feedback algorithm, which improved the traditional Rocchio algorithm in the MapReduce paradigm, to resolve the problem of massive information filtering. Traditional text classification algorithms have vital impact on information filtering.
A Group Key Agreement (GKA) protocol is necessary for establishing a group key among all of the group members over a public network. The protocol presents a fundamental challenge in secure and efficient group communications. Without the disadvantages of centralized method, Contributory Group Key Agreement (CGKA) is more suitable for dynamic groups. Recently, a Dynamic Asymmetric Group Key Agreement...
Metaheuristic algorithm is efficient for solving NP-complete problems such as scheduling. An algorithm called the exploration control particle swarm optimization (ECPSO) is proposed to solve grid task scheduling, a new velocity update rule on the basis of exploration capability is suggested, an exploration control probability (ECP) parameter is designed to control the search behaviour of particles...
Software Defined Networking has become extremely hot both in academia and industry. Most of the SDN protocol is the OpenFlow protocol in the southbound interface. But bue to different manufacturers may have different understanding to the OpenFlow protocol and lead to the implementation may be different. So OpenFlow protocol conformance testing is becoming more important. This paper first introduces...
Being directed against the bottleneck assignment problem in operational research, a new method called Matrix Elimination Method based on cost matrix transformation is proposed, and an example analysis is used to prove the validity of the algorithm and the resolution is optimal substructure, moreover, the method is illustrated more efficient than other methods by comparison.
Task scheduling in small satellites clusters is an important optimization problem because of limited resources and various constraints. Specifically, automated and dynamic scheduling is necessary for practical schedule and real-time response of exceptions, whereas it makes the problem more complicated. In this paper, a predictive-reactive scheduling model has been proposed for space missions in heterogeneous...
Due to fierce competition, veterinary hospitals have to maintain good relationship with their existing customers and attract new customers. In order to identify critical customers, data mining techniques particularly cluster analysis are viewed as a vital tool to facilitate customer relationship management. This study uses a veterinary hospital located in Taichung City, Taiwan as an example by analyzing...
Aiming at the impulse of the DC bus voltage of the switched reluctance motor under high speed condition, as well as the problem of insufficient power shortage in the medium and low speed state, the regenerative braking process of the switched reluctance motor is analyzed. In low-speed state, the position angle combined with full voltage shut down method, in high-speed state, the angular position with...
With extensive research of clustering algorithm, disadvantages of traditional K-means algorithm have been recognized. In order to overcome these flaws, a novel K-means clustering algorithm based on the modified shuffled frog leaping algorithm and simulated annealing algorithm is presented. In this approach, a new local searching strategy combined with the Particle Swarm Optimization algorithm is introduced...
The security problem of screen image leakage from a display unit has become more and more serious with the rapid speed of signal transmission technology. This paper presents a novel investigation on the characteristics of the power line compromising channel. By introducing an echo-based power line model, a measurement system has been developed to draw a preliminary conclusion on the low-passed and...
As technology developed, the surveillance system has been widely used in our daily lives. Monitoring systems, background filtering is a very important technology. Even so, in that respect are different dynamics in the surrounding ground for background filtering is a challenging problem, for example: leaves of the shaking, water fluctuations, the display flashes, the light changes to easily filter...
MRI (Magnetic resonance imaging, MRI) is a very important contrast in the clinical diagnosis, using radio wave pulses, so that the body of water molecules in the resonance of the hydrogen atom, and change the magnetic field generated by the echo signals into images by a computer. After a long clinical trial, have proved to be harmless. MRI is not invasive to human body, does not produce ionizing radiation,...
The next generation of the Internet is a multi-service network with data, voice, video and multimedia, which puts forward the higher requirements of real-time performance and effectiveness for the end-to-end communication network. However, higher requirements of time delay will lead to higher energy consumption. Since different communication services have different requirements of time delay, an end-to-end...
The link relations of web pages were analyzed to give a final link determination method, and the damage extent of each link-relation was assigned a value, and weighted according to the task and the nature of site. The assessment of a link equal to the sum of the damage extent multiply the weighting of all the related links. Finally, the interference, coding and declassified pages were pre-processed...
A 1.2 V, 10 b, 40 MS/s pipelined ADC fabricated in 0.13µm one-poly eight-metal (1P8M) standard CMOS process with MIM capacitors is presented. This ADC used a novel low-variation on-resistance CMOS sampling switch to improve the nonlinear effect and a two-stage recycling folded-cascode (RFC) amplifier with hybrid frequency compensation for power saving and low voltage supply requirements. By implementing...
Owning to the complex underground mine surroundings, it is extremely hard to treat images with large sums of coal dust noise. So fraction characterization that models with adaptive algorithm in BV space is presented to optimize coal particle image. This article puts on first fractional calculus' theory in BV space for image processing. Pursuant to the regional characteristics, characteristic parameters,...
For the problem that EEG signal is difficult to identify, this paper proposed the method of wavelet transform combined with neural network for signal processing and feature extraction of EEG signal. The original EEG data was processed by wavelet de-noising method, the d wave, q wave, a wave and b wave signal are obtained by db5 wavelet decomposition. Then the energy value of sub-band signal as the...
In the monitoring industry, such as shopping malls, bus stations, etc., it is necessary to analyze the passenger flow system. Traditional statistical method, the influence factors on the performance of the system, such as illumination, occlusion, body posture. This paper presents a new method based on kinect2.0 sensor depth data of passenger flow detection system, are determined by the shape of the...
A fault diagnosis method is proposed for the mine hoist machine fault diversity and redundancy of fault data based on Rough Sets (RS) and Support Vector Machine (SVM). RS theory is used to analyze the stator current fault data of mine hoist machine in order to exclude uncertain, duplicate information. For getting the optimal decision table, the equivalence relationship of positive domains of between...
The accuracy of laser gas detection is influenced by temperature and other environmental factors. A compensation algorithm based on Bayes theory for measuring the concentration of methane sensor (CABTMCMS) is proposed. Based on several implementation tests, the corresponding supplementary theorems are presented and proved. The algorithm considers the methane concentration and the change of ambient...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.