The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC)
Most of the existing community detection (CD) methods are designed primarily for unsigned networks containing only positive links. Therefore, it is significant to explore and design effective CD methods for signed social networks (SNs) with both positive and negative links. In this paper, we first utilize decomposable characteristic of modularity Q to establish a bi-objective model for community detection...
The consensus algorithm is proposed to solve the bounded consensus tracking problems of leader-following multi-agent systems under directed networks, where the control input of an agent can only use the information measured at the sampling instants from its neighbors or the virtual leader. Based on the delay decomposition approach, the augmented matrix method and the frequency domain analysis, the...
The security of public places has been greatly concerned by the government and organizations in recent decades. Detecting the crowd flow in public places can help alerting the congestion of the channel immediately and making an immediate evacuation policy to prevent the occurrence of extrusion stampede. However, the common detection techniques require special additional hardware components that suffer...
Although the Z-domain precoding method for blind separation of spatially correlated sources is proved reliable in theory, it has disadvantages in its implementation since it requires knowledge of precoder zeros at the receiver beforehand. A new method is proposed in this article to find these precoder zeros and estimate the separation vectors of the coded signals at the same time by exploiting the...
Recommender systems have proved to be an important response to the information overload problem, by providing users with more proactive and personalized information services. Collaborative filtering is the most popular method in implementing a recommender system. The Slope One algorithm, which is one of collaborative filtering algorithms, is not only easy to implement, but also efficient and effective...
Most of the existing population behavior studies are about the analysis of the population dynamic behavior of genetic algorithm, while there is little analysis of the population dynamic behavior of particle swarm optimization (PSO). Therefore, there is an urgent need for a new method to characterize the population dynamic behavior of PSO in the search process. In this paper, we propose some metrics...
Multiobjective optimization aims to simultaneously optimize two or more objectives for a problem, with multiobjective evolutionary algorithms (MOEAs) having become a popular research topic in evolutionary multiobjective optimization. We first define the multiobjective optimization problem and briefly summarize multiobjective optimization methods based on the evolutionary algorithm. Representative...
Unconstrained binary quadratic programming problem (UBQP) is a well-known NP hard problem that consists in maximizing a quadratic 0-1 function. It is considered as a unified model for a variety of combinatorial optimization problems. Recently, a multi-objective extension of UBQP is defined and a set of benchmark instances is proposed. This paper proposes a decomposition-based multi-objective tabu...
The development of smart phone software industry has brought high demands for mobile developers. The skills of developers have a great influence on the quality of software product and the success of software projects. It is necessary to examine what soft skills are important for mobile applications development while it remains unknown. In this article, based on related mobile application development...
Human walking contains important physiology, kinematic and dynamic information. There are many application prospect of human gait analysis in real life, such as monitoring the patient's recovery progress in clinical practice, the control strategy of bionic robot, etc. A wearable gait analysis platform (GaitSense) has been established based on wearable inertial/magnetic sensor and body sensor network...
In view of the traditional saliency detection method gets imprecise and vague region boundary, so that the detected object is not connected, the paper proposes image visual saliency feature extraction based on multi-scale tensor space. The method introduces the tensor space, using multiple low-level image features to construct the tensor space, after reducing dimension the image space structure and...
In this paper, a novel firefly algorithm (FA) is presented to reduce the dependency on parameters. The new FA algorithm is called dynamic step factor based FA (DSFFA), in which the step factor is not fixed and it is dynamically updated during the evolution. Experimental study on several classical benchmark functions show that DSFFA is superior to the basic FA and three other FAs.
With the increasing popularity of social media, the Sentiment Analysis (SA) of the Microblog has raised as a new research topic. In this paper, we present WDCRF: a Word2vec and Dynamic Conditional Random Field (DCRF) based framework for Sentiment Analysis of Chinese Microblog. Our contributions include: firstly, to address drawbacks of Microblog message such as the length and Lexicon limitations,...
Web attacks are increasing and the scale of malicious URL continues to expand with the rapid development of the Internet, so that the network security situation is increasingly grim. In this case, this paper studies the URL multi-classification problem, which is a continuation of the reference [1] and follows the data sets and most of feature selection methods in it. Firstly, different types of URL...
The load-balanced clustering is a most significant problem for WSNs with unequal load of the sensor nodes but it is known to be an NP-hard problem. This paper introduces a new model for the problem in which the objective function is to maximize the overall minimum lifetime of the cluster heads. To solve this model, we propose a novel estimation of distribution algorithm based dynamic clustering approach...
The energy of the sensor network nodes is limited, and in order to save the energy consumption of the sensor nodes, a compressed sensing method based on the spatial-temporal correlation of nodes is proposed. The LEACH algorithm is used to cluster the network nodes and select the cluster head. Then, the cluster head node is sampled by the compressed sensing theory. The sampled data is passed to the...
This paper is aimed at solving the problem in the data acquisition process of WSN network, such as energy problem, the correlated problem of data acquisition and the dynamic problem of network topology. An efficient data collection solution based on TRIZ contradiction matrix and innovation principle is presented in the paper. Firstly, the contradiction matrix is used to obtain the corresponding principle,...
Radio Frequency Identification (RFID) technology is a contactless automatic identification technology. With the wide application of this technology in many fields, anti-collision algorithm to solve the problem of multi-tag identification becomes more and more important. The current RFID anti-collision algorithm is mainly divided into two categories: ALOHA based algorithm and tree based algorithm....
Name ambiguity arises when one retrieves publications written by distinct author entities who share the same name. During the past decades, a myriad of supervised and unsupervised methods have been proposed to resolve the ambiguity of author names and boost retrieval performance for digital libraries and other similar websites such as Citeseer1 and WanFang2. However, most of them either need large...
Geo-replicated cloud storage provides good scalability, availability and fault-tolerance for managing big data of high-volume, velocity and variety nature. However, the prickly trade-off between consistency, cost and response time, which is brought in by geo-replicated cloud storage, poses great challenges to big data management. The goal of this work is to allow geo-replicated cloud storage used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.