The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, due to the popularity of Web 2.0, considerable attention has been paid to the opinion leader discovery in social network. By identifying the opinion leaders, companies or governments can manipulate the selling or guiding public opinion, respectively. Additionally, detecting the influential comments is able to understand the source and trend of public opinion formation. However, mining opinion...
This paper presents an efficient algebraic fault analysis on all four modes of SHA-3 under relaxed fault models. This is the first work to apply algebraic techniques on fault analysis of SHA-3. Results show that algebraic fault analysis on SHA-3 is very efficient and effective due to the clear algebraic properties of Keccak operations. Comparing with previous work on differential fault analysis of...
This paper is a part of work on the attempt to implement the continuous control system which dynamically derives the control law during its operation, on basis of a model-based control algorithm. The measurements obtained from the sensors are dynamically included or excluded depending on the availability of individual sensors. The prototype application was developed in the JADE environment, and its...
Literature evidences have demonstrated the effectiveness of the sampled t-way test suite for defect detection in software testing. The main task in implementing t-way testing strategies is constructing best possibility test case. There are several methods that have been proposed but none of them can be claimed to be the best result because t-way are considered as NP-hard problem. In this paper, the...
A user-orientation behavior profile is present to analyze demand for telecommunication and Internet services. This paper proposed a system for analyzing service demand used to simulate usage under various assumed conditions. A User behavior profile, together with a prototype profile, is simulated and tested. A User behavior profile is constructed in detailed segment to improve the accuracy of services...
By introducing the method of fuzzy algorithm model to the examination and evaluation of advanced mathematics course, the author of this paper tries to put forward an improved scheme for the traditional examination and evaluation system of the advanced mathematics course in colleges and universities, to prove the application prospect and methodology value of the model on the basis of combining the...
In the context of linear search, list accessing problem is a well known research problem. Unsorted linear list of distinct elements and a request sequence are the input to the list accessing problem where access operation is to be performed on each request on an element of the list. The main objective of list accessing algorithm is to minimize the access cost while processing a request sequence on...
Methods of improving analysis of the short circuits (SC) stationary submodes in relation to some basic condition of a concrete electrical grid are considered. The structure, range and quantity of the modes and SC submodes unprecedentedly extend at realization of management processes and technologies especially in smart grid. It is defined by growth of an intellectual component in problems of short-circuit...
Nowadays, web has become widespread in terms of availability of contents related to every field. Also a large repository of web contents is turned up as a most challenging tool for searching and retrieving information. For scientists and researchers, resource or content searching has been very important. Todays, market is full of variant search tools over web having discrepancy in terms of working...
This article provides an effective way to alleviate the long running defect of multi-objective intelligent optimization algorithms and enhance its ability to solve the robust optimization (RO) design. It describes the implementation of parallel computing for intelligent optimization algorithms based on the MATLAB Parallel Computing Toolbox (PCT) and Distributed Computing Server (DCS). In order to...
In this paper, nature inspired firefly algorithm has been used for designing of controllers for set-point response and stability purpose. Using firefly algorithm, we have tuned the parameters of above two controllers. A performance criteria integral square error (ISE) is optimized using firefly optimization technique. For the optimum value of ISE, controller parameters are selected. Routh Stability...
The control algorithm affects the quality of the control system directly, even determines the success or failure of the whole system. When a control system can use a variety of control algorithms, but it is difficult to assess the merits according to precision indicator and time indicator, it needs a new evaluation indicator. This paper puts forward a control accuracy indicator to represent the situation...
Approximate normal parameter reduction of fuzzy soft set is an important problem in fuzzy soft set. While approximate reduction is a combinatorial optimization problem, and harmony search algorithm is a good method to deal with combinatorial optimization problem. Therefore, in this paper we discuss approximate normal parameter reduction of fuzzy soft set based on harmony search algorithm. Firstly,...
Although a quantum computer is the future of computing, its practical implementation is still far off. Programming a quantum computer is also difficult. Thus, using a quantum computer simulator is a way to learn how to use a quantum computer. QCL is one of the quantum computer simulators. It can simulate the quantum environment and execute quantum computer programs. However, the quantum computer simulator...
Applying the ant colony algorithm to select cooperative partners for virtual enterprise doesn't need any artificial intervention. On the contrary, it can find the best scheme which satisfy the constraints intelligently through the interaction of indicators. In this paper, social reputation of companies is considered as a implicit index, which conforms to requirements of contemporary business. At the...
A discrete cosine transform (DCT) is described and a technique to compute it using fast Fourier transform (FFT) is developed. In this work, DCT of a finite length sequence is obtained by incorporating CORDIC methodology in radix-2 FFT algorithm. The proposed methodology is simple to comprehend and maintains a regular structure, thereby reducing computational complexity. DCTs are used extensively in...
The problem of designing of analog network for a minimal computer time has been formulated as the functional minimization problem of the control theory. The design process in this case is formulated as the controllable dynamic system. The optimal sequence of the control vector switch points was determined as a principal characteristic of the minimal-time system design algorithm. The conception of...
Semantic computing is an important task in the research of natural language processing. For the problem of the inaccurate conceptual graph matching, this paper proposed the algorithm based on Conceptual sub-Graph weight self-adjustment. Based on the in tensional logic model of Chinese concept connotation, using Recursive Conceptual Graph as knowledge representation method and combining with the computation...
The methodology for the electronic networks optimization was elaborated by means of the optimal control theory approach. In this case the problem of the electronic system design is formulated as a classical problem of functional minimization of the optimal control theory. The minimal time system design algorithm was defined as a controllable dynamic process with an optimal control vector. By this...
Hybrid Bond Graph (HBG) is a bond graph-based modeling approach which provides an effective tool not only for dynamic modeling but also for fault detection and isolation (FDI) of switching systems. Efficient algorithms exist for fault detection and isolation based on functional redundancy. In a qualitative approach, this redundancy can be captured by a temporal causal graph (TCG), a directed graph...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.