The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new method to compute the dense correspondences between two images by using the energy optimization and the structured patches. In terms of the property of the sparse feature and the principle that nearest sub-scenes and neighbors are much more similar, we design a new energy optimization to guide the dense matching process and find the reliable correspondences. The sparse features...
Missing data imputation is an important task in cases where it is crucial to use all available data and no discard records with missing values. However, most of the existing algorithms are focused on missing at random (MAR) or missing completely at random (MCAR). In this paper, an information decomposition imputation (IDIM) algorithm using fuzzy membership function is proposed for addressing the missing...
Community detection is an important way to analyze and understand the real networks. In this paper, we not only define Local community modularity and Tightness between local communities for directed weighted networks, but also realize a distributed algorithm that detects overlapping local community in networks. The algorithm is divided into two parts, initial local community detection and similar...
Communication networks are prone to failures due to targeted attacks or large-scale disasters. Networks can be improved to withstand challenges using mechanisms such as diversity, which can simply be improved by adding links, however achieving maximum resilience is not feasible due to limited budget. Therefore, algorithms that improve the diversity of networks cost-efficiently are necessary. In this...
Improving resilience against failures and targeted attacks is an important aspect of network design. The resilience and cost of networks are two opposing objectives in which a designer should consider when building networks. We develop a heuristic algorithm that balances the centrality of networks by adding a set of links that minimizes the variance of graph centrality measures in a least costly fashion...
In the age of information explosion, vast amount of information is now available on the internet. Early warning of breaking events is becoming a popular subject to study. Timeliness is the one of the most important factors to be considered in this subject. However, traditional topic detection approaches are always not so effective for the detection of emerging topics which concentrate all the news...
The technique of shredded documentation reconstruction is widely used in different areas such as military affairs and archaeology. This process, however, can hardly be finished merely by human efforts. Therefore, it is important to develop an effective method basing on intelligent algorithms. Designed for effectively solving this problem, this paper attempts to develop an automatic reconstructing...
An extension of approximate computing, significance-based computing exploits applications' inherent error resiliency and offers a new structural paradigm that strategically relaxes full computational precision to provide significant energy savings with minimal performance degradation.
Network virtualization technology allows multiple virtual infrastructures (VIs) or virtual networks customized to suit user requirements on a shared substrate network without the need for much additional infrastructure. However in such a scenario even a single failure in the substrate can cause large disruptions as it will affect all the VIs mapped on to it. Thus the problem of guaranteeing survivability...
A novel fingerprint matching algorithm based on the matching of lines is introduced in this paper. The algorithm were designed in three steps. In the first phase, an inaccurate set of matched line pairs were built by matching lines between two fingerprints. In the second phase, the spurious pairs were removed from the set by evaluating the similarity of triangles composed by line and central point...
Because of the flexibility of Web Services and dynamical network, QoS is difficult to be assured of reliability, often causing the Web Service selected and invoked by users are often not working properly, not result in high performance Web service composition. In the composition of services for service selection, in order to improve the reliability and performance of composite services need to consider...
With an always growing number of student enrolment in higher education, providing quality feedback in both digital and paper based assessment becomes a heavy burden for teachers and tutors. The use of assessment rubrics can help overcome this burden, defining several criteria including formative feedback within it. However, current computer-assisted rubric systems present some drawbacks that hinder...
This paper first briefly introduces the Mobile Agent technology, then analyzes some other Mobile Agent communication mechanisms by comparing them with each other, based on which we generate Assistant Agent by Mobile Agent with combination of Shortest Path First (SPF) algorithm to receive the message as a new Mobile Agent communication system and give the experimental results to demonstrate.
Embedded systems have become an essential technology in fields that require electronic control. These technologies must work in real time and have high reliability and low cost. Among them, safety verification of embedded systems is very important in fields related to human life. In addition, as multi-core and multiprocessors have spread, the processing power of the hardware has been improved. As...
This paper proposes a reliability-admissible filtering mechanism to generate the reasonable route set for the traditional SUE model. This mechanism still takes into account traveler's cost-susceptivity, which is able to dispel the impact of dimension on the traffic assignment. The filtering formula is presented and further estimated based on the Gumbel distribution assumption for the route disutility...
Large memory cost, low speed of convergence and less accuracy of bounding objective function are three main problem in finding the global optimization. M. sun gives an algorithm that costs less memory [1]. But this method cannot always find the global optimization. Based on this algorithm, this paper presents a more reliable method by increasing accuracy of interval computation. This algorithm has...
Identifying the residues is the most significant process in Goldstein's Branch Cut algorithm. The path-independent-integral criterion is a sufficient and unnecessary condition of residue identification. To overcome this shortcoming, this essay aims to analyze the phase quality of the residues. We find that on the aspect of position, the positions of the residues can typically show the distribution...
The design of adaptive test paper composition algorithm based on the item response theory is proposed and the ultimate goal of adaptive test is to measure the candidates' potential accurately. According to the item response theory, candidates' testing behavior is the reflection of their potential language ability and a potential of a candidate can be estimated directly by his/her item response together...
To the problem of hostile service brought by node anonymity in P2P system, this thesis proposes a reputation aware resource finding algorithm. This algorithm is based on routing indices (RIs) algorithm and adopts the conception of reputation to efficiently restrain the deceiving behavior of hostile nodes in P2P system and reduce the messages load in the system, which can ensure the reliability and...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.