The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Let D(n) and H(n) be the fractal dimension and the Hurst parameter of traffic in the nth interval, respectively. Thus, this paper gives the experimental variance analysis of D(n) and H(n) of network traffic based on the generalized Cauchy (GC) process on an interval-by-interval basis. We experimentally infer that traffic has the phenomenon Var[D(n)] > Var[H(n)]. This suggests a new way to describe...
This paper presents a new method for rotation invariant texture classification based on Gabor wavelets. The Gabor representation has been shown to be optimal in the sense of minimizing the joint two-dimensional uncertainty in space and frequency, and the Gabor wavelet can be used to decompose an image into multiple scales and multiple orientations. Two group features, i.e. the global feature vector...
As World Wide Web is more popularized nowadays, it is also creating many problems due to uncontrolled flood of information. The pornographic, violent and other harmful information freely available to the youth, who must be protected by the society, or other users who lack the power of judgment or self-control is creating serious social problems. To resolve those harmful words, various methods proposed...
This paper proposes HVEM Control System, which is the cornerstone for teleinstrumentation infrastructure. The proposed system is oriented for people whose primary work is to get access to a remotely located instrument, a High-Voltage Electron Microscope (HVEM). Our system is implemented to fulfill all the necessary requirements in allowing the user to 1) control every single part of HVEM in a fine-grained...
Recently, computerized testing has revolutionized the testing industry by offering an array of benefits for both the examinees and the test users. It potentially enhances the quality of education at all levels. Computerized testing also makes available new types of data such as item-response time and human response at the individual item level. However, the present models of these responses demand...
Based on ServiceBSP model, a resource load balancing algorithm with Multi-Agent is put forward in this paper which achieves the goal of dynamic load balancing and favorable fault-tolerant. The algorithm calculates the load value according to the status of usage of resources of a node and scheduling tasks relies on the load value, while updating the load information dynamically depending on Multi-Agent...
In order to protect communication security among sensor nodes, a cryptographic method are needed by ad hoc sensor networks. According to that most ad hoc sensor networks are deployed in groups, a group-based multicast key management scheme is proposed to extend RPS scheme in this paper. Compared with RPS, our scheme improves the probability that a shared key exists between two sensor nodes, and reduce...
Location estimation is a crucial component of location-aware applications. Positioning based on received signal strength (RSS) in wireless networks is considered a promising and inexpensive solution. Existing techniques only use RSS from some fixed access points (APs) deployed within the area of interest to estimate user location. Through experiments on the properties of RSS, it is found that RSS...
In the Storage Area Network (SAN), the mature network technology is used to substitute for the IO bus. Usually, the common switch is used in the storage network especially in the iSCSI storage system. Because the common switches are not aware of the environment it is used in, it can not make optimization for the storage network. In this paper, an optimization of storage network is presented which...
Future Internet applications and services should be autonomous, self-evolutionary, and adaptable to the change of different users and network environments. Inspired by the resemble features between biological neuroendocrine-immune system and future Internet, we introduced some key principles and mechanisms to design a bio-network architecture and its middleware. In this paper, asynchronous migration...
Weather forecast is a complex multi-disciplinary problem which requires a cascade of different scientific tools, from differential equation solvers to high-dimensional statistical and data-mining algorithms. The demand for high-resolution predictions is continuously increasing due to the multiple applications in hydrology, agronomy, etc., which require regional meteorological inputs. To fill the gap...
Multi-agent reinforcement learning for multi-robot systems is a challenging issue in both robotics and artificial intelligence. But multi-agent reinforcement learning is bedeviled by the curse of dimensionality. In this paper, a novel hierarchical reinforcement learning approach named MOMQ is presented for multi-robot cooperation. The performance of MOMQ is demonstrated in three-robot trash collection...
To describe spatial and temporal characteristics of the activities of wintertime planetary waves in the northern hemisphere, their numbers and periods were precisely calculated, based on NCAR/NCEP reanalysis data. The objective variables include sea level pressure (SLP) and anomaly stream function at 850 hPa, 500 hPa and 200 hPa. 2D FFT and spectral analysis reveal that: (1) The wave numbers 1 and...
Heterogeneous wireless sensor networks are energy limited and imbalance networks, load balancing and energy efficiency is the most challenging task in these networks. In this paper, we propose a distributed election clustering protocol to prolong the stable region of wireless sensor networks, which is based on remaining energy and communication cost to elect suitable cluster-head nodes. Compared with...
The pest catastrophe prediction in ecology catastrophe is one of important part in expert system of intelligence agriculture and also the guarantee for preventing and controlling the pest catastrophe occurrence efficiently. The paper introduces the basic principles and methods of current catastrophe prediction in ecology catastrophe. According to modeling for the dynamic process of population, up-grown...
Discretization of boundary integral equations leads, in general, to fully populated nonsymmetric linear systems of equations. We research the comparative performances of iterative techniques based on Krylov subspace solvers as GMRES(m), QMR and Bi-CGStab solving linear systems arising from BEM elasticity problems. Several general preconditioners are also considered and assessed. The results of numerical...
With the rapid development of network technologies and deteriorating of network environment, traditional single-net security system can’t satisfy the security requirement. Excellent security performance of biological systems impels bio-inspired network security theory to be a hot topic currently. We advance Bio-inspired Multi-Net Security (B-MNS) system which implements the functional distributary...
Data grids are becoming increasingly important for sharing distributed data and information in collaborative environments. This paper presents a CORBA-based Distributed Resource Navigation system consisting of Resource Agents and Navigation Service. The former one is a middleware that provides applications with a uniform set of operations to access heterogeneous distributed storage resources including...
The conventional Empirical mode decomposition (EMD) method uses envelope mean interpolated by cubic spline fitting, which is sensitive to extrema. An efficient method for finding the local mean is generated by using support vector regression machines. The analysis results indicate that the proposed algorithm has higher performance in the ability of frequency separation, insensitive to the sampling...
In wireless sensor networks(WSNs), as sensor nodes are characterized by having specific requirements such as limited energy availability, low memory and reduced processing power, energy efficiency is a key issue in designing the network routing. In the existing clustering-based routing protocols for the WSNs, the cluster-heads are usually selected randomly and do a lot of work, which may cause unbalanced...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.