The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
For many years, spatial (3D) sound using headphones has been widely used in a number of applications. A rich spatial sensation is obtained by using head related transfer functions (HRTF) and playing the appropriate sound through headphones. In theory, loudspeaker audio systems would be capable of rendering 3D sound fields almost as rich as headphones, as long as the room impulse responses (RIRs) between...
There will be different stable states or attractors in ecosystem under the same external conditions. In this paper, one stochastic logistic model under external fluctuations was established. The existence of the alternative attractors and regime shift are investigated. Also, the mean first passage time is studied using stochastic dynamics theory. Results showed that there are different stable attractors...
In this paper, a new face detection algorithm based on fractal theory and complexion model is proposed. On the basis of the traditional face detection, the new algorithm estimated the fractal dimension of face area to exclude the non-face area and extract the face area fast and accurately. Furthermore, its calculation is simple and it can realize multi-angle detection in the complex background. As...
When simulating mixed-signal systems, designers are often dissatisfied either with performance or accuracy. A state-space based precomputation method for analog circuits at electrical level allows for a considerably faster simulation than with SPICE-like simulators. Utilizing an automatically generated SystemC interface, our simulation kernel analyzes mixed analog/digital circuits where the digital...
A significant body of work in multiagent systems over more than two decades has focused on multi-agent coordination. Many challenges in multi-agent coordination can be modeled as Distributed Constraint Optimizations (DCOPs). Many complete and incomplete algorithms have been introduced for DCOPs but complete algorithms are often impractical for large-scale and dynamic environments which lead to study...
Node clustering has wide-ranging applications in decentralized P2P networks such as P2P file sharing systems, mobile ad-hoc networks, P2P sensor networks, and so forth. This paper proposes an approach to construct clusters in unstructured P2P networks based on small-world theory. In contrast to centralized graph clustering algorithms, our scheme is completely decentralized and it only uses the knowledge...
Image diffusion on implicit surfaces is solved by the concepts of intrinsic gradient and intrinsic divergence along with the expression of implicit surfaces using zero level set of a continuous signed distance function. But the finite difference scheme of the relevant gradient descent equations is complex and its computation efficiency is low. The Split Bregman algorithm for the nonlinear variational...
Shibboleth, a growing popular solution to Single Sign-On (SSO), can simplify the user's operation process and reduce the resource provider's overhead. The multi-level security of Shibboleth has become a topic of concern. The basic Shibboleth infrastructure was introduced based on the current SSO solutions. Then we summarized the BLP model, which is considered the basic security axiom in our work....
The Hind marsh-Rose (HR) Neuron not only contained the features of cell biological physical model, but also included the traits of non-linear dynamical system model. The paper analyzed the HR model by computing manifold. It computed the equilibria, simulated the bifurcation phenomenon of the parameters, estimated the unstable local manifold and computed the global manifold using the angle constraint...
Trust quantification is an important issue of dynamic trust management. Trust is fuzzy and dynamic, if exact math tools are used to calculate trust, there is information missing in the calculation. In this paper, we use fuzzy comprehensive evaluation method to quantify trust and propose a trust quantification algorithm. Simulation results show that the trust quantification algorithm can effectively...
In order to better understand system, modeling is necessary. In software development process, the UML is usually used as a standard method to model related products. This paper introduces the UML and its modeling process, and then uses object-oriented technology to model the information platform for basic education.
The nonlinear circuit models for power BAW resonators, which reproduce both amplitude-frequency and intermodulation effects, are presented. The “frequency warping” effect in high Q circuit simulation is analyzed.
The hardcore model is a model of lattice gas systems which has received much attention in statistical physics, probability theory and theoretical computer science. It is the probability distribution over independent sets I of a graph weighted proportionally to λ|I| with fugacity parameter λ. We prove that at the uniqueness threshold of the hardcore model on the d-regular tree, approximating the partition...
Network intrusion detection is one of the hottest research issues on the network security recently. In the paper, three kinds intrusion detection model are introduced. By using Bayesian methods, Fuzzy Decision Engine and Immunity-Based Model, we can improve the performance of intrusion detection system and effectively reduce the false positive alarm. Based on the three models, some drawbacks of NIDS...
The purpose of the research on DBH growth model was to provide a scientific basis for the management and development of larch in northeast (DBH is the abbreviation of diameter at breast height). The six growth equations of Richard, Korf, Schumacher, Clare, Levakovic, Mitscherlish were used to fit DBH growth model of larch in northeast. The weights of these models were determined by means of variation...
In order to ensure the security of the sharing service in grid, a dynamic authorization model based on trust mechanism is presented, which is based on role-based access control. In the model authorization is obtained while the trust worthiness of the bargainers exceeds the trade threshold; it also introduces the concepts of task and condition into the authorization model so that it can achieve dynamic...
With the increasing development of e-commerce application, e-commerce system security is facing the heavy challenge. To solve the purpose of intensifying the behavior trustworthiness and controllability of e-commerce system, we focus on building the trustworthy model between e-commerce system and user behaviors and strengthening the manageability of e-commerce systems. This paper by setting up the...
The identification of defect parameters in thermal non-destructive test and evaluation (NDT/E) was considered as a kind of inverse heat transfer problem (IHTP). However, it can be farther considered as a shape optimization problem then a structure design optimization problem, and the design results should meet the surface temperature profile of the apparatus with defects. A bacterial colony chemotaxis...
The application of Missing Data Technique (MDT) has shown to improve the performance of speech recognition. To apply MDT to cepstral domain, this paper presents a weighted approach to compute the reliability of cepstral feature based on sigmoid function and introduces a weighted distance algorithm. It is deduced that the reliability compensates the Gaussian variance in hidden Markov model (HMM) frame...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.