The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In recent years, with the rapid proliferation of digital images, the need to search and retrieve the images accurately, efficiently, and conveniently is becoming more acute. Automatic image annotation with image semantic content has attracted increasing attention, as it is the preprocess of annotation based image retrieval which provides users accurate, efficient, and convenient image retrieval with...
Premature convergence is the main obstacle to the application of genetic algorithm. This paper makes improvement on traditional genetic algorithm by linear scale transformation of fitness function, using self-adaptive crossover and mutation probability and adopting close relative breeding avoidance method. Simulation results show that the improved algorithm outperforms traditional genetic algorithm...
We propose a sparse probabilistic learning approach for nonlinear channel equalization in wireless communication systems, by using the relevant vector machine (RVM) technique. In particular, we propose two versions of the RVM based equalizer: 1) maximum a posterior RVM (MAP-RVM), 2) marginalized RVM (MRVM). Compared to the standard support vector machine (SVM) method, the proposed RVM approach not...
This paper considers the problem of key management in wireless networks. In particular, we investigate the effect of dynamic key compromise and recovery on connectivity in large networks. A queuing model with a finite buffer is used to model the dynamics of key compromise. The exact distribution of the fraction of keys compromised is obtained. The result of the queuing analysis is used to determine...
Supply chain emergency comes from supply chain risks, and usually interrupts the harmonious operation of supply chain. So it's very necessary to evaluate the dynamic degree of supply chain emergency and then take corresponding measurements to prevent the occurrence of supply chain emergency. This paper tries to set up an evaluation model of supply chain emergency based on unascertained measure and...
This paper is concerned with the problem of a fuzzy filter of nonlinear system with missing measurements. The nonlinear system is represented by a Takagi-Sugeno(TS) fuzzy model. The system measurements may be unavailable at any sample time and the probability of the occurrence of missing data is assumed to be known. The purpose of this problem is to design a linear filter such that, the error state...
In this paper, we combine opportunistic transmission and source/destination cooperation in a decode-and-forward (DF)-based two-hop cooperative diversity network consisting of multiple source-destination pairs and a single relay. Firstly, we consider a special scenario with two source-destination pairs. For this network, there are two possible strategies in each hop: no-cooperation or cooperation....
A possibilistic fuzzy c-means (PFCM)[1] has been proposed for clustering unlabeled data. It is a hybridization of possibilistic c-means (PCM) and fuzzy c-means (FCM), therefore it has been shown that PFCM is able to solve the noise sensitivity issue in FCM, and at the same time it helps to avoid coincident clusters problem in PCM with some numerical examples in low-dimensional data sets. In this paper,...
Distinctiveness of users in biometric authentication can be limited when multiple samples of a user's biometric information differ due to intra-class variability in the acquisition, thus resulting in random correspondence between users. Most of the currently known methods based on error correcting codes, fuzzy vault have been proposed for protecting biometric data against the intra-class variability...
In this paper, the placement of sectionalizers, as well as, a cross-connection is optimally determined so that the objective function is minimized. The objective function employed in this paper consists of two main parts, the switch cost and the reliability cost. The switch cost is composed of the cost of sectionalizers and cross-connection and the reliability cost is assumed to be proportional to...
Inverse analysis of rock displacement is a kind of new way of studying the parameter of physical power of rock, a lot of researchers have carried on research in this respect, and some researchers among them ask solving this question with the genetic algorithm. This paper apply master-slaver model parallel genetic algorithm (MSM-PGA ) to solve inverse analysis of rock displacement, in the course of...
This paper presents the analysis and estimation of effective bandwidth of a router, handling multi-class traffic. Analysis is done with marginal buffering as well as large buffers. Performance of a periodic on-off source is compared with that of a Poisson??s source with marginal buffering. Bandwidth requirement of the sources for a given Quality of Service is worked out. The analysis is then extended...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.