The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Automatic text summarization is the task of deriving a meaningful and concise brief from a given text while retaining the concept and key information conveyed by the original text. So far, numerous approaches and algorithms have been devised to achieve this goal with certain accuracy and effectiveness. One key aspect of text summarization is accurate identification of keywords from the given textual...
In this paper, we propose an approach to select top-k cloud services. Our approach combines the trust, determined by the reputation of the provider, and the QoS. We present different algorithms for processing such selection queries and evaluate them through a set of experiments.
The proposed algorithm presents a solution to improve the grey wolf optimizer performance using weighted distance and immigration operation. The weight distance is used for the omega wolves movement is defined from fitness value of each leader (alpha, beta and delta). The traditional grey wolf algorithm has only one pack and has opportunity to trap in local optimum so the wolves in our proposed algorithm...
In this work, we propose a paradigm for constructing a sparsely-connected multi-layer perceptron (MLP). Using Orthogonal Least Squares (OLS) method for training, the proposed method prunes the hidden units and output weights based on their usefulness to design a sparsely connected MLP. We formulate second order algorithm to obtain the closed-form expression for hidden unit learning factors thereby...
This paper presents the results of a comparison of the well-established power-flow algorithms Gauss-Seidel, Newton-Raphson, Dishonest Newton-Raphson, Decoupled Load Flow, Fast Decoupled Load Flow, DC Power-Flow and the new Holomorphic Embedding Load Flow Method (HELM). The algorithms are assessed using 21 PQ-powerflow test cases with numbers of nodes ranging from 2 to 3120. The focus of the analysis...
Due to the non-linearity of current-voltage of solar cell model, the conventional methods are incapable to extract the parameters of solar cell with high accuracy. The implicit nonlinear equation describing the single and double diodes solar cell in five and seven parameters is rewritten as optimization problems with constraint functions and it is solved by using a firefly algorithm optimization....
A new algorithm of diagnosis strategy based on fault mode criticality is proposed, aiming at the lack of consideration to possible damage to the equipment in fault diagnosis and negative impact of test sequence in existing algorithms. The proposed algorithm is mainly composed of heuristic function based on fault mode criticality and optimal single-step search strategy. The optimal tests are selected...
Structured sparse optimization is an important and challenging problem for analyzing high-dimensional data in a variety of applications such as bioinformatics, medical imaging, social networks, and astronomy. Although a number of structured sparsity models have been explored, such as trees, groups, clusters, and paths, connected subgraphs have been rarely explored in the current literature. One of...
Music score scanning recognition system, to identify musical notes through hand-held device by scanning five-line staff. Most of the music score scanning equipment equips with linear sensors, acquires the binary image according to the intensity of reflection of light with the irradiation of the front LED. However, because of the influence of illumination and differential rotation of this method, the...
Energy efficiency has become a main challenge in Wireless Sensor Networks (WSNs) and their applications. Localization is one of the indispensable stages in WSN. Localization generally refers to the process of locating the position of one or more node(s) in a network. This paper develops and evaluates an improved energy aware localization algorithm in WSNs. Clustering techniques have been intensively...
The control algorithm affects the quality of the control system directly, even determines the success or failure of the whole system. When a control system can use a variety of control algorithms, but it is difficult to assess the merits according to precision indicator and time indicator, it needs a new evaluation indicator. This paper puts forward a control accuracy indicator to represent the situation...
Cognitive radio networks (CRNs) is an emerging paradigm to exploit the spectrum holes very intelligently. To start communication in CRNs, users need to establish a link on a channel which in not occupied by licensed user. Rendezvous is an essential operation in cognitive radio networks (CRNs) to establish a link on common channel for data communication and control information exchange. To achieve...
Early detection of faults in power lines allows improve the service quality and therefore a reduction in high operating costs that a failure of this type implies. This paper describes a method used to determine the type of failure occurs in a three-phase over time, using tools as Hilbert transform and fuzzy classifier for successful detection is done. The algorithm developed uses each of the power...
This paper presents an output feedback shared-control algorithm for fully-actuated, linear, mechanical systems. The feasible configurations of the system are described by a group of linear inequalities which characterize a convex admissible set. The properties of the shared-control algorithm are established with a Lyapunov-like analysis. Simple numerical examples demonstrate the effectiveness of the...
Viral Marketing, the idea of exploiting social interactions of users to propagate awareness for products, has gained considerable focus in recent years. One of the key issues in this area is to select the best seeds that maximize the influence propagated in the social network. In this paper, we define the seed selection problem (called t-Influence Maximization, or t-IM) for multiple products. Specifically,...
The traditional PID controller parameters are hard to tune timely under the rapid changes of the dynamic network circumstances, which affect the PID algorithm's control effects on network data flows. To alleviate the problem, a novel AQM algorithm based on PID controller is proposed, called the improved expert intelligent PID algorithm (IEI-PID). By combining expert knowledge with PID and adding more...
Given the full consideration of the characteristics of the three-dimensional container-packing problem in this paper, we build a multi-constrained and multi-objective mathematical model, with the constrains of safety and carrying capacity, under the objectives of packing maximum weight of the goods, as well as having the highest stability. Solving the model with Discrete Particle Swarm Optimization...
Binary quadratic residue (QR) codes, which have code rates greater than or equal to 1/2 and generally have large minimum distances, are among the best known codes. This paper considers a modified algebraic decoding algorithm for the (89,45,17) binary QR code that utilizes the Berlekamp-Massey algorithm. It identifies the primary unknown syndromes and provides methods to determine these on a case-by-case...
Networks-on-Chip (NoC) is the promising communication architecture for next generation SoC. The buffer size of on-chip router impacts the silicon area and power consumption dominantly. Optimizing the buffer usage is important for an efficient NoC design. In this paper, we propose an buffer optimization algorithm for application-specific NoC design. More precisely, given the application traffic parameters...
In order to over the shortcoming of the incomprehensive of summarization, a new lexical-chain-based keywords extraction and automatic summarization algorithm from Chinese texts based on the unknown word recognition using co-occurrence of neighbor words is proposed in this paper, and an algorithm for constructing lexical chains based on Hownet knowledge database is given in the method, lexical chains...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.