The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Document image distortion often appears when captured by the camera; this may induce recognition mistakes by OCR. In this paper, a robust and fast dewarping method of document images is proposed. Compared with traditional method, the computation of the correction baseline and the distance for vertical displace in this method is independent of the document's content, so it can guarantee the precision...
In this paper, we use a modified version of the incidence matrix of an un-oriented graph so as to enumerate all the spanning trees. In particular, we formally describe the problem and then enumerate the spanning trees, also Showing how to use this method in finding the symbolic determinant of a passive circuit.
Using symbolic algorithms for small signal circuit parameter extraction could make possible implementing extraction programs which, unlike those based on pure numerical methods, no longer require initial (“start”) values for the parameters being extracted, thus ensuring that the final result corresponds to the true global minimum of the error function. Solving the extraction problem, in the particular...
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2.
This brief proposes a novel multi-objective heuristic. It is a transformation of a mono-objective heuristic into a multi-objective one by addition of an archive and some non dominance computing routines. Performances of the proposed heuristic are demonstrated thru test functions. An application to the optimal sizing of a class AB second generation CMOS current conveyor is presented. Comparison with...
Session identification is an important step in data processing of web log mining. To solve the defects in traditional session identification, an improved session identification algorithm was proposed. After identifying specific users, a great deal of frame pages were filtered, the relatively reasonable access time threshold for each page was made up according to contents of each page and all web structure...
Fuzzy clustering is an important problem which is the subject of active research in several real world applications. Fuzzy c-means (FCM) algorithm is one of the most popular fuzzy clustering techniques because it is efficient, straightforward, and easy to implement. However FCM is sensitive to initialization and is easily trapped in local optima. Particle swarm optimization (PSO) is a stochastic global...
Composite Web services are often long-running, loosely coupled and cross-organizational applications. They always run in a highly dynamic environment. For the applications and environment, advanced transaction support is required to ensure the quality of reliable execution. Towards composite service adaptive mechanism unavailable for lacking transaction support, this paper proposes a self-healing...
Web services are self-describing, platform independent applications that can be accessed over the Internet. Web services enable us to dynamically find, bind and consume the needed functionality. Semantic Web services are being developed with the vision of automating this process and to facilitate interoperable machine to machine interaction with no/minimal human intervention. Semantic descriptions...
Nowadays, how to efficiently compose Web services has become a hotspot. In this paper, we introduce a method of recommending an optimal service sequence based on the original service sequence for a composite service. This method uses a Bayesian-based approach and selects the service sequence that has the largest probability as the best choice. Compared with existing methods, this method has two advantages:...
Mining data streams for knowledge discovery is important to many applications, including Web click stream mining, network intrusion detection, and on-line transaction analysis. In this paper, by analyzing data characteristics, we propose an efficient algorithm SWSS (Sequential pattern mining with the weighted sliding window model in SPAM) to mine frequent sequential patterns based on the weighted...
One of the key challenging aspects of peer-to-peer systems has been efficient search for objects. To achieve this, we need to minimize the number of nodes that have to be searched, thereby use minimum number of messages during the search process. This can be done by selectively sending requests to nodes having higher probability of a hit for the queried object. In this paper we present an algorithm...
These wireless ad hoc sensor networks (WSNs) have received considerable academia research attention at present. The main purpose of a sensor network is information gathering and delivery. Therefore, the quantity and quality of the data delivered to the end-user is very important. The energy-constrained sensor nodes in WSNs operate on limited batteries, so it is a very important issue to use energy...
This paper presents a global optimal technique based on moving least square (MLS) fitting technique and improved differential evolution algorithm (IDEA) for inverse problems on optimizing electromagnetic equipments. In the proposed method, MLS are firstly used to simulate complex objective functions as a response surface model (RSM) in multidimensional space, for transforming an implicit function...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.