The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, many new applications, such as sensor data monitoring and mobile device tracking, raise up the issue of uncertain data management. Compared to "certain?? data, the data in the uncertain database are not exact points, which, instead, often reside within a region. In this paper, we study the ranked queries over uncertain data. In fact, ranked queries have been studied extensively in traditional...
In this paper, a novel structure is derived for digital filter which is robust against the FWL errors. This structure, denoted as SIMP, is actually an improved version of the one reported in the work of Li et al. (2000) in terms of implementation efficiency and reducing quantization errors. The expression of transfer function sensitivity measure is derived for each structure. Two numerical examples...
In the paper, the authors propose a novel algorithm for synthesis of 2-D lossless FIR filter transfer function matrix. The synthesis based on 2-D embedding technique is used to obtain a FIR filter transfer function matrix which possess lossless properties. The matrix is composed of desired 2-D linear phase, quadrant symmetry transfer function and additional nonlinear phase transfer functions. A Newton...
Many engineering applications requires solving the fuzzy equations. A method to solve first order fuzzy linear equations using modal interval approach is suggested. The modal interval arithmetic is applied to solve these fuzzy equations, for each ??-cut, which is computationally efficient. Some basic definitions and operations of modal interval arithmetic are included here. Simulation examples validates...
Motivated by the growing demand of accuracy and low computational time in optimizing functions in various fields of engineering, an approach has been presented using the technique of parallel computing. The parallelization has been carried out on one of the simplest and flexible optimization algorithms, namely the particle swarm optimization (PSO) algorithm. PSO is a stochastic population global optimizer...
In the present study we propose a new hybrid version of differential evolution (DE) and particle swarm optimization (PSO) algorithms. In the proposed algorithm named as hybrid differential evolution (HDE) a `switchover constant' called ?? is defined. HDE starts as the basic DE algorithm which switches over to PSO when ?? is activated. The constant ?? on the other hand is activated at a point where...
The authors have recently introduced a new generalised derivatives operator ????1,??2n,m, which generalised many well-known operators studied earlier by many different authors. The trend of finding new operators such as the differential or the integral operators has attracted many researchers and in fact, has become necessary to some of the researchers. The aim of this paper is to use the equality...
Optimization problems are ubiquitous and consequential. In fact every sphere of human activity that can be quantified can be formulated as an optimization problem. The focus of this work is on Global Optimization which is not only desirable but also necessary in many cases. In the past few decades several Global optimization algorithms have been suggested in literature out of which stochastic, population...
The weapon target assignment problem can be modeled as an optimization problem in which the objective is to assign weapons to target in order to maximize the optimum target damage value. The mathematical model of the problem is subject to various constraints depending on the availability of weapons The objective function of the problem is non linear and the constraints are linear in nature. Also,...
The coexistence of multimedia services in e-communication systems, with varying bandwidth utilization characteristics, impedes the efficiency of rate control and thereby impacts on the Quality of Service (QoS), in terms of low throughput. As such, the rate control for multimedia flows remains an open problem. This paper proposes a memetic optimization approach to rate allocation of multiclass services...
The fractional Fourier Mellin based correlators can be used in detecting or controlling specific range of movements. Also, both the conventional and the fractional based correlators can be easily implemented optically in lense, thus providing correlation images directly at image acquisition time. In this paper two-dimensional fractional Mellin transform is extended to the distribution of compact support...
SOA have been deployed as a mean to offer a better flexibility, to increase efficiency through reuse of services and also to improve interoperability by providing new opportunities to connect heterogeneous platforms. However, those benefits make security more difficult to control. Fortunately, new standards are proposed to treat this issue, but their current use makes the architecture much more complex...
This paper proposes a new token structure for efficient handling of identity access management for online composite software services. With the requirement of ??Single Sign-On (SSO)?? for atomic services in a given composite service, this token structure binds service attributes, including workflow, providers, users, operator permission, and operation environment, together in its creation process...
Service-oriented computing advocates the development of new software or services on the basis of existing services. This paradigm shows a great potential of achieving high productivity and low cost, but it faces a challenge in efficiently and correctly using existing services in producing a new application and ensuring its reliability. Building a formal model using a formal specification language...
Service process usually needs to be tailored for reuse because of change of context. In this paper, we present a mining approach to mining process change sequences based on different context using partial derivatives of the factors affecting the change context, thus finding the best feasible sequence.
Differential Evolution (DE) is generally considered as a reliable, accurate and robust optimization technique. However, the algorithm suffers from slow convergence rate and takes large computational time for optimizing the computationally expensive objective functions. Therefore, an attempt to speed up DE is considered necessary. This research introduces a modified differential evolution, called Ant...
Most optimization problems have constraints of different types (e.g., physical, time, geometric, etc.), which modify the shape of the search space. We propose an ecologically inspired invasive weed optimization (IWO) algorithm to solve the constrained real-parameter optimization problems. Central to our approach is a parameter-free penalty function that we introduce. The adaptive nature of the penalty...
What is a cloud application precisely? In this paper, we formulate a computing cloud as a kind of graph, a computing resource such as services or intellectual property access rights as an attribute of a graph node, and the use of a resource as a predicate on an edge of the graph. We also propose to model cloud computation semantically as a set of paths in a subgraph of the cloud such that every edge...
Nowadays, how to efficiently compose Web services has become a hotspot. In this paper, we introduce a method of recommending an optimal service sequence based on the original service sequence for a composite service. This method uses a Bayesian-based approach and selects the service sequence that has the largest probability as the best choice. Compared with existing methods, this method has two advantages:...
Web services hold a great promise of implementing the B2B e-commerce by dynamically integrating business processes over the Internet. It is necessary to automatically and accurately select appropriate Web services satisfying client requirements before and after integrating business processes. However, current Web services standards do not well support it. We propose a formal method to select appropriate...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.