The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Using symbolic algorithms for small signal circuit parameter extraction could make possible implementing extraction programs which, unlike those based on pure numerical methods, no longer require initial (“start”) values for the parameters being extracted, thus ensuring that the final result corresponds to the true global minimum of the error function. Solving the extraction problem, in the particular...
In this paper we introduce a new cardinality constraint: Ordered Distribute. Given a set of variables, this constraint limits for each value v the number of times v or any value greater than v is taken. It extends the global cardinality constraint, that constrains only the number of times a value v is taken by a set of variables and does not consider at the same time the occurrences of all the values...
A significant body of work in multiagent systems over more than two decades has focused on multi-agent coordination. Many challenges in multi-agent coordination can be modeled as Distributed Constraint Optimizations (DCOPs). Many complete and incomplete algorithms have been introduced for DCOPs but complete algorithms are often impractical for large-scale and dynamic environments which lead to study...
Saving energy and prolonging network lifetime are key problem of wireless sensor networks (WSNS). In this paper, Maximum Lifetime data gathering in WSNS is considered, in which the WSNS is consists of a collection of aggregation trees together with the number of rounds each such tree which is required to be small, given the limited computation and communication resources of sensor nodes. We describe...
In linear space, the classical perceptron algorithm is simple and practical. But when concerning the nonlinear space it is severely confined mainly on its signal layer structure. This paper analyzes the geometry characteristic of solve region in the pattern set, and presents a new algorithm based on the solve region. The new algorithm could find the better solve vector in the solve region on condition...
Aimed at the research on freeway detection algorithm has great significance for improving efficiency and effectiveness of freeway traffic management, this paper based on the freeway traffic flow's characteristics, in accordance with the incident detection's basic principle, researches on freeway incident detection based on Support Vector Machine (SVM). This paper designs four different simulation...
A improved algorithm based on UMHexagonS is proposed in this paper. Experiment results show that, the improved algorithm can improve the search efficiency and reduce the search time by about 14% on average, at the same time, ensure the signal to noise ratio basically unchanged.
Under the emergency accidents, implementation of the rescue measures is directly related to the traffic state identification. However, lacking of information collecting caused by road damage would lead to the results of identification by conventional fixed detector had a larger deviation. Although the existing way of probe vehicle with a large coverage area but also from an environmental impact, the...
This paper utilized the arrangement points of AES_256 key, analyzed the difference features of AES_256, and found a method of collision attack. This paper also made use of connection differential features and collision method of AES_256 to analyze the 72 bytes of the initial key of AES_256, with a complexity of 2.
This brief proposes a novel multi-objective heuristic. It is a transformation of a mono-objective heuristic into a multi-objective one by addition of an archive and some non dominance computing routines. Performances of the proposed heuristic are demonstrated thru test functions. An application to the optimal sizing of a class AB second generation CMOS current conveyor is presented. Comparison with...
Artificial bee colony (ABC) algorithm is a new population based metaheuristic approach inspired by intelligent foraging behavior of honeybee swarm. Since microelectronic circuit design deals with highly complicated nonlinear equations, obtaining optimal solution of these equations due to particular constraints in short time and acceptable error is of prime concern. Simpler structure and better result...
This paper proposes a method for the design of adaptive scalar quantizer based on the source statistics. Adaptivity is useful in applications where the statistics of the source are either not known a priori or will change over time. The proposed method first determines two quantizer cells and the corresponding output levels such that the distortion is minimized over all possible two-level quantizers...
Recently, a block encryption scheme based on dynamic sequences generated by multiple chaotic systems has been proposed. This paper points out some defects of the scheme and its related security problems. Furthermore, the paper gives out the details of a chosen plaintext attack and verifies it through experiments. The result of experiment shows that the encryption scheme cannot resist the chosen plaintext...
We initiate the study of testing properties of images that correspond to sparse 0/1-valued matrices of size n × n. Our study is related to but different from the study initiated by Raskhodnikova (Proceedings of RANDOM, 2003), where the images correspond to dense 0/1-valued matrices. Specifically, while distance between images in the model studied by Raskhodnikova is the fraction of entries on which...
Spatial interpolation of scalar data is widely used in some fields such as partition of biological type distribution and land-use planning. Usually, this kind of spatial interpolation is based on the nearest neighborhood interpolation. In this paper, some shortages of traditional spatial interpolation method based on amalgamation of voronoi polygons, such as non intelligence, large consumption computation,...
Multi-parallel architecture for MD5 (Message-Digest Algorithm 5) implemented on FPGA (Field-Programmable Gate Array) is presented in this paper. To accelerate the speed, a general architecture for Host Computer and FPGAs is proposed. The MD5 implementation is presented. Besides the internal parallelization of MD5 modules, FPGAs can be easily duplicated and connected to Ethernet LAN. The design was...
The Covering algorithm is proposed by Professor ZhangLing and ZhangBo in the 20th century, which simulates the structure of human learning, building a Constructive Neural Network Learning Model. Covering algorithm has been widely used to solve massive data classification problem, because its performance. The covering classification algorithm has fast learning, high recognition rate, massive data processing...
Information Hiding is a good method to transmit important information secretly. Video sequences usually include many frames, so they have more room to hide information. In the paper, in order to increase the amount of hiding information, we choose MPEG sequences as hosts, and we present a practical method to hide information in MPEG compressed video. Generally, there are many B-frames in each GOP...
The purpose of digital image scrambling technology is to put a meaningful image into a disordered one to enhance the resistance ability against illegal attacks so as to improve security. This paper proposes an image scrambling transformation method based on the idea of inverse transformation in finite integer domain. It includes gray transformation and position transformation. At the same time, it...
Through analysis of the development of information retrieval and information push services in digital library, this paper brings forward an intelligent analysis algorithm of reader's information retrieve interest. The main idea is getting the resembling degree between reader's access behavior and built-in specific behaviors classified by information retrieve interests through fuzzy matching of reader's...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.