The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problem of that the initial investment of truck dispatching system is vast and how to quantify scientifically to analyze the technical factor of truck dispatching system. A truck real-time dispatching model was built based on two minimization dispatch criterion. The method of "Comparing different index setting Simulations Used by the Same Shift (CSUSS)" was put forward...
In this paper, a new iterative algorithm for determination of direction cosine matrix (DCM) is presented, it can be expressed as two forms, matrix exponential and six scalar differential equations respectively, corresponding to each form, related algorithms used for the orthonormalization are derived, although the simulations and algorithm analysis are omitted here, the Van test results verified its...
To make the members for group discussions well-mixed, the compound variable of four weighting factors is used to meet the quantification of the four judging criteria. Exclusion force is introduced here to evaluate whether a certain member should be assigned into a certain group or not. Then the algorithm is realized with the use of computer programs with the current state be used. Analysis of the...
This paper researched on KEELOQ algorithm and presented a wireless anti-theft system based on the KEELOQ technology. The system has one central controller and no more than eight monitors. When the whole wireless anti-theft system were designed, a physical testing about one hundred days was made. The results showed that the system works stably.
Motion estimation for video coding problem, a prediction based on the triangle - a small cross algorithm. The algorithm is mainly used in small cross on the static template blocks and blocks of small campaign focused search, the search for large sports block with triangle template. With the classic diamond search algorithm and square - diamond search algorithm comparison, the search speed increased...
Efficient concept lattice generation algorithm is a major problem for the applied research of formal concept analysis. Based on the basic property of concept, this paper put forwards and proves a theorem about the relationship of concepts, and then proposes an incremental concept lattice algorithm based on basic concepts. An example shows that the algorithm is feasible and effective.
The equivalence relation in the theory is defined by the complete equal relation, which will result in complexity of computation of the knowledge reduction in the real world in rough sets theory (RST). In order to overcome this shortage of general rough set theory, the elementary concept of tolerance rough sets theory is proposed in this paper, and the theory is employed to build objects' tolerance...
The Maximum power point tracking algorithms is essential to improve the efficiency of PV system. In order to improve the efficiency of PV system, a new algorithm is proposed based on conventional perturbation and observation method. The algorithm proposed a variable perturb step that can be changed automatically and PV system can adjust the step length according to the changed power. So the response...
Web text classification is the process of determine the text types automatically under a given classification, according to the text content. Web text categorization system is the use of machine learning, knowledge engineering and other related fields of knowledge, access to the web on the text, after text preprocessing, Chinese word segmentation and training classifier, using classification algorithm...
As urban road intersections are prone to traffic congestion and traffic accidents, monitoring the crossing of vehicles and predicting the state is needed to reduce traffic congestion, regulate driver behavior and prevent accidents. Background subtraction and mean shift tracking are used to track vehicles. The whole monitoring process is as following. Firstly, secondary selected strategy is used to...
Research on unconstrained and constrained optimization has been separately conducted for a long time. Normally, constrained optimization, especially the nonlinear equality constrained optimization problem is much more difficult to be researched. People became to recognize that both unconstrained optimization and constrained optimization are actually the optimization problem on Riemannian manifolds...
A capacitated multi-facility Weber problem (CMFWP) is widely used in both theoretic and practical environments. The most studies in this field tackled the problem either by deterministic or probabilistic orientation. Nevertheless, in the real world, some parameters (e.g., demand) are usually imprecise (fuzzy) in nature. Thus, in this paper, we address the CMFWP with fuzzy demands. To solve this problem,...
The recent interest in Wireless Sensor Networks has led to a number of clustering algorithms that use the limited energy available at sensors more efficiently. In this article, we present a heritable clustering algorithm based on HEED for low energy wireless sensor network. It brings in appointment mechanism to reduce the cluster head reelect overhead efficiently. In the cluster, TDMA communication...
Feature selection techniques have become an apparent need in many bioinformatics applications. In this article, taking into account the protein-protein interactions in sequence and spatial structure of protein, we propose a new correlation based method to capture these correlations between features to check feature redundancy, and implement a corresponding feature selection algorithm CBPFS. Features...
In the orienteering problem (OP) a set of locations is given, each with a score. The goal is to determine a route, limited in length, that visits some locations and maximize the sum of the collected scores. The orienteering problem is often used as a starting point for modeling many combinatorial optimization problems. This paper studies the time-dependent orienteering problem taking into account...
The K-NN query algorithm is a widely used algorithm in the spatial database, effectively carrying on K-NN query algorithm has become the focus problem of the spatial database, the traditional query algorithm will adopt the measurement distance and pruning strategy to improve the query performance by using the tree index, it needs to carry on a large amount of distance calculation to exclude the unnecessary...
Surface integrity of 3D medical data is crucial for surgery simulation or virtual diagnoses. However, undesirable holes often exist due to external damage on bodies or accessibility limitation on scanners. To bridge the gap, hole-filling for medical imaging is a popular research topic in recent years. Considering that medical image, e.g. CT or MRI, has the natural form of tensor, we recognize the...
Vehicle routing problem is an important combinatorial optimization problem. It has an important position in logistics optimization and supply chain management theory. Due to traffic flow, traffic incidents and other factors, the travel speed and travel time of road has large time-variability and randomness in real transport network. The study of vehicle routing problem in time-dependent network has...
Researched on the characteristic of the traffic flow, a new method of abnormal data detection on traffic flow based on the curve-fitting is presented. First, the historical data on traffic flow are divided into the traffic flow with high speed and the traffic flow with low speed by the clustering analysis. Then, the algorithm on the determination safety zone scope is obtained by the curve-fitting...
On-time circuit fault diagnosis is very important. This paper offers a new algorithm of fault recognition knowledge acquisition based on simulation evolutionary algorithm. This algorithm is efficient to locate and recognize fault. The simulation result has proved the feasibility and efficiency of this algorithm.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.