The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The ability to discover patterns of interest in criminal networks can support and ease the investigation tasks by security and law enforcement agencies. By considering criminal networks as a special case of social networks, we can properly reuse most of the state-of-the-art techniques to discover patterns of interests, i.e., hidden and potential links. Nevertheless, in time-sensible scenarios, like...
Every successful action performed in NTFS leads to update of $MFT. However, there is a chain or set of chains of transactions behind every single activity of NTFS. However, $MFT updation only shows the end product of action and corresponding chain or set of chains of transactions are not documented by it. $Logfile is the file which logs all said transactions. $MFT is a well researched area but $LogFile...
In this paper, through by using the AHP (Analytic Hierarchy Process) method's basic theory analysis in online-teaching platform, analyzing ability of students' self-learning, and establishing the evaluation index system, according to expert criteria derived the value of influence factors. With it calculated every level index's weight by using the square root method, and implements the weight by given...
Topic model, latent Dirichlet allocation (LDA), is an effective tool for statistical analysis of large collections of documents. In LDA, each document is modeled as a mixture of topics and the topic proportions are generated from the unimodal Dirichlet distribution prior. When a collection of documents are drawn from multiple classes, this unimodal prior is insufficient for data fitting. To solve...
Free-riding phenomenon is overwhelming in nowadays P2P network which causes researchers to investigate and develop many approaches to combat it. However, almost all the studies neglect the role of relative contribution of peers, namely willingness of contribution (WoC) in our paper. The ignorant to the ratio of peer's actually contribution to its physical capability would undoubtedly lead to unfairly...
The evaluation of human resource management performance can promote commercial banks to perfect and improve human resource management comprehensively, directionally, and intentionally, which is of practical significance. The core of fuzzy evaluation on the performance of human resources management is membership degree transformation. But the existing transformation methods should be questioned, because...
The next generation of wireless networks will simultaneously support any data and voice users. These users or UEs (User Equipment) will share the uplink and downlink radio resources and so, in each frame, the basestation must signal which UEs are being allocated resources and the location within the frame of the associated data. In the case of the Long Term Evolution (LTE) wireless standard, this...
We study task-allocation problems where cooperative robots need to perform tasks simultaneously. We develop a distributed negotiation procedure that allows robots to find all task exchanges that reduce the team cost of a given task allocation, without robots having to know how other robots compute their robot costs. Finally, we demonstrate empirically that our negotiation procedure can substantially...
As the number of users increases, the amount of required feedback Channel State Information (CSI) at the base station becomes huge and prohibits the feasibility of conventional adaptive resource allocation algorithms in fairness-aware downlink OFDMA systems. Thus, this paper presents a novel mechanism making use of multi-user diversity to greatly reduce the feedback CSI while maintaining almost the...
In the military conflict, the defending side may suffer threats from different attackers at the same time. This kind of situation is called campaign between single-kind arms and multi-kind arms in this article. By introducing the campaign superiority parameter(CSP), the optimal military strength allocation problem is studied for campaign between single-kind arms and multi-kind arms. Firstly, the general...
Supply chain alliance as a new model of enterprises business cooperation, fair and reasonable mechanism of profit allocation is related to its success or failure. Based on the research at home and abroad, this paper applied fuzzy decision theory into improving traditional Shapley Value and introduced the parameter of integrated corrected factor to present the influences of risk and capital appreciation...
The performance of the existing non-contiguous processor allocation strategies has been traditionally carried out by means of simulation based on synthetic workload models to generate streams of incoming jobs. To validate the performance of the existing algorithms, there is need to evaluate the algorithms' performance based on real workload traces. In this paper, we evaluate the performance of several...
In this paper, a new resource allocation scheme is proposed for a two-way OFDM relay network. In the proposed scheme, two terminals exchange information with the help of multiple relays, and subcarriers and their power are successively allocated to the relays to maximize sum capacity. To achieve fairness for the relays, power constraint on each relay is imposed. Simulation results show that the proposed...
This paper proposes a novel semi-dynamic inter-cell interference coordination (ICIC) scheme for multi-cell OFDMA systems. The objective of the novel scheme is to strike a balance between ICI minimization and frequency reuse factor (FRF) maximization. Firstly, we divide cell-edge users into non-overlapping user groups based on users' geometry, and classify each group's available bandwidth, which includes...
This paper considers the following stochastic control problem that arises in opportunistic spectrum access: a system consists of n channels where the state (??good?? or ??bad??) of each channel evolves as independent and identically distributed Markov processes. A user can select exactly k channels to sense and access (based on the sensing result) in each time slot. A reward is obtained whenever the...
The unfair interest distribution of virtual enterprises will cause their members' loss of trust in the justice of interest distribution, lead to the disharmony among the members of virtual enterprises, and result in conflict and confrontation during cooperation. Based on HeXie management theory, the HeXie mechanism is established from the angel of justice so as to settle the problem of unfair interest...
In a recent study, Lin proposed the LCS for short-term stock forecast. Gershoff proposed the extended Classifier system (XCS) agent to model different traders by supplying different input information. Announcement made by Morgan Stanley Capital Investment (MSCI) regarding the additions, removals, and even the weights of the component stocks in its country indices every quarter generally would cause...
In this study, we analyze the impact of different types of frame traffic on the self-similar behavior of the aggregated frame traffic, collected from the IETF 2005 conference. Our measurement results show that the different types of frame traffic have various impacts on the self-similarity of the aggregated frame traffic in different session periods, and these impacts are simultaneously related with...
This paper proposes an optimal Var resource allocation framework for power transmission system in such a manner that both voltage profile and security margin for future operation is considered. The risk index is used to represent the uncertainty in this framework. The conception of Var gap is proposed to cover the voltage profile issue and the security margin issue when the Var allocation is performed...
In this paper, we investigate register multimapping as a technique to reduce register bank conflicts for processors with large register files, but relatively slow clock speeds. Register multimapping involves mapping an architectural register to multiple physical registers belonging to different banks. Reads can proceed using any of the physical registers, thereby minimizing read bank conflicts. Write...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.