Fractal image compression technology has such characters as high compression rate,high Signal-to-Noise rate and better vision effect etc.,thus becomes an eye-catching topic in the field of digital image ***,the issue ...
详细信息
Fractal image compression technology has such characters as high compression rate,high Signal-to-Noise rate and better vision effect etc.,thus becomes an eye-catching topic in the field of digital image ***,the issue of long compression time poses a hindrance to the development of this technology already becomes a well known fact,the task of how to shorten the compression time attracts more and more *** this paper,we try to apply the fuzzy clustering algorithm and the QPSO algorithm to the fractal image compression in an effort to shorten the compression *** experiment shows that this approach has significantly shortened image compression time.
Semi Supervised methods use a small amount of auxiliary information as a guide in the learning process in presence of unlabeled *** using a clustering algorithm,the auxiliary information has the form of side informati...
详细信息
Semi Supervised methods use a small amount of auxiliary information as a guide in the learning process in presence of unlabeled *** using a clustering algorithm,the auxiliary information has the form of side information,that is a list of co-clustered *** use of Semi Supervised methods may be useful especially in very difficult tasks,such as biological experiments. There are two frequently methods in Semi Supervised clustering:one is constraint-based methods that guide the clustering algorithm towards a better grouping oftbe data,the other is distance-based *** this paper, how to develop new metric learning fuzzy clustering-based is importantly discussed here.
This paper proposes a unified,open,extensible,domain independent,and scalable architecture of ontology learning *** unified functional structure and standardized access interfaces are defined for ontology learning ***...
详细信息
This paper proposes a unified,open,extensible,domain independent,and scalable architecture of ontology learning *** unified functional structure and standardized access interfaces are defined for ontology learning *** architecture consists of resource layer and five main function modules:resource management module,general resource read/write module,data preprocessing module,ontology extraction module and ontology evaluation and editing module. Functions and constitutions of resource layer and all modules are depicted in *** main goal is to provide support for reuse of ontology learning methods and components,ontology industrialization producing, periodical ontology refinement.
In the information era,the network has become not only a primary means of date exchanges and business transactions but also a major target of attackers. Therefore,an intrusion detection technology which can discover a...
详细信息
In the information era,the network has become not only a primary means of date exchanges and business transactions but also a major target of attackers. Therefore,an intrusion detection technology which can discover and report non-authorized access or anomalies of system comes into *** intrusion detection systems are inefficient and unsatisfactory in detecting ability,so in this paper,a new invasion detection system based on mobile agent and fuzzy synthetical assessment technology is *** system can detect not only known attacks accurately but also unknown *** accuracy rate is *** the same time,it can also decrease systematic communication load and improve work efficiency tremendously.
As mobile networks become more common and mobile phones are attacked more frequently,many researchers have paid their attentions to the effect of mobility on epidemic *** build two models to describe the effect of mob...
详细信息
As mobile networks become more common and mobile phones are attacked more frequently,many researchers have paid their attentions to the effect of mobility on epidemic *** build two models to describe the effect of mobility on epidemic spreading on regular lattice and scale-free *** results and simulations show that the mobility leads to the epidemic threshold deceasing and the infected density increasing on both *** conclusion suggests that more efforts should be made for controlling mobile phone's viruses spreading.
Certificateless public key cryptography can be viewed as a model that is intermediate between traditional public key cryptography and identity-based public key *** certificateless cryptography equips certificateless c...
详细信息
Certificateless public key cryptography can be viewed as a model that is intermediate between traditional public key cryptography and identity-based public key *** certificateless cryptography equips certificateless cryptography with instantaneous revocation *** et *** proposed an efficient mediated certificateless signature scheme and claimed that their scheme is *** paper shows that their scheme suffers from the key replacement *** improved scheme is subsequently proposed and formal security proof presented in the paper demonstrates that the improved scheme is existentially unforgeable against fully-adaptive chosen message attack in the random oracle *** our complementary efforts,the improved mediated scheme is provably secure.
As the availability and maintenance costs of the equipments directly links the economic benefits and market competitiveness of the enterprises,more and more attention paid on the condition monitoring and diagnosis of ...
详细信息
As the availability and maintenance costs of the equipments directly links the economic benefits and market competitiveness of the enterprises,more and more attention paid on the condition monitoring and diagnosis of the equipment in the hydropower *** condition monitoring and diagnostic analysis of the excitation system has been *** expert system has been *** configuration and the software architectures of such a system are *** approaches to the condition monitoring and the acquisition of the expert knowledge as well as their experiences are discussed in *** fundamental functions of the diagnosis expert system are descried. This system has been developed and put into practice. The results show it is good.
Search engine is the most effective tool for web information *** article analyses the current situations of search engine ***,it proposes a model of an intelligent mix meta search *** this system,personal search serve...
详细信息
Search engine is the most effective tool for web information *** article analyses the current situations of search engine ***,it proposes a model of an intelligent mix meta search *** this system,personal search serves are provided by analyzing the user ***,an intelligent dispatch strategy of the independent search engines is proposed to resolve the problem that the different independent search engine has a different performance to the same user *** the same time,an improved PageRank algorithm,which is called A-PageRank,is *** algorithm distributes the PageRank value of the source page based on the topic similarity.
A new style 4WS vehicle virtual prototype was established based on *** proportional control relationship of the front and back wheels'angles plus the feedback control relationship of yaw rate were *** transient re...
详细信息
A new style 4WS vehicle virtual prototype was established based on *** proportional control relationship of the front and back wheels'angles plus the feedback control relationship of yaw rate were *** transient response and the steady-state performances of 4WS and 2WS vehicles were analyzed, and the influence of tire lateral stiffness on steering performance was *** simulation results indicate that the 4WS vehicle takes on rather agility at the low speed and excellent stability in at the high speed. The future developing trends with 4WS system control technology was prospected in the end.
The application level multicast tree is constructed on a suppositional overlay network which can be presented as a complete *** finding an optimization multicast routing tree with degree constraint is an optimization ...
详细信息
The application level multicast tree is constructed on a suppositional overlay network which can be presented as a complete *** finding an optimization multicast routing tree with degree constraint is an optimization problem,which can be formulated as minimum average cost spanning tree with a bound problem and is NP-hard.A new multicast routing algorithm based on clone selection strategy is presented to solve the *** utilizes the mutation characteristic to find an optimization solution for the global solution *** simulation results show that the algorithm has a faster converging speed and better ability of global searching with property of stabilization and agility
暂无评论