Clustering algorithm is an important method of researching neural *** paper introduces a method to implement this algorithm,under the FPGA, implement K-means clustering algorithm,accelerating the arithmetic by hardwar...
详细信息
Clustering algorithm is an important method of researching neural *** paper introduces a method to implement this algorithm,under the FPGA, implement K-means clustering algorithm,accelerating the arithmetic by hardware,more rapidness,more *** result shows that implement this algorithm take advantage of hardware better than software.K-means clustering algorithm is a kind of clustering algorithm which can be dealt with FPGA, because it is a parallel algorithm,it will be completely get faster by FPGA than it used to *** that is all the reason why we implement K-means clustering algorithm by FPGA.
The communication mechanism is the foundation of Mobile Agent systems,but there are some problems such as reliability and efficiency exist in former communication *** this essay,I bring forward a mobile agent communic...
详细信息
The communication mechanism is the foundation of Mobile Agent systems,but there are some problems such as reliability and efficiency exist in former communication *** this essay,I bring forward a mobile agent communication mechanism *** includes Mobile agents' creation, addressing and communication mechanism,I use AgentID to give Agents unique names,adopt name resolver to achieve transparent addressing,and make use of mailbox to ensure message cache and *** on the above features we can solve the problem of invalid communication,so as to achieve mobile agent system's reliability and efficiency.
A circular object recognition method utilizing a group of geometric feature parameters is ***,Canny operator is used to extract edges and the edge points are traced to form series of sequential *** points in each set ...
详细信息
A circular object recognition method utilizing a group of geometric feature parameters is ***,Canny operator is used to extract edges and the edge points are traced to form series of sequential *** points in each set are fitted to a ***,the fitted polygon is normalized to obtain invariant features and their corresponding parameters are *** the end, those targets with the feature parameters satisfying certain conditions are recognized as circular objects. Experiments on synthetic images and real images and comparison with RHT method show that the proposed method has the merits of fast recognition rate and high recognition efficiency.
The last decades of the twentieth century witnessed a considerable expansion of supply chain into international *** and efficient global supply chain coordination is crucial way to sharpen the edges for the firms to w...
详细信息
The last decades of the twentieth century witnessed a considerable expansion of supply chain into international *** and efficient global supply chain coordination is crucial way to sharpen the edges for the firms to win the international competition. To address this need,this paper used multi-agent theory to construct an architecture based on the requirement for enabling dynamic interoperation of members within a supply chain for successful global *** definition and internal structure of single agent were presented in details and the communication structure of agents was ***,a multi-agent coordination mechanism was proposed to determine the best decisions.
With the analysis of user requirements about the coal mine excavating and joining,the overall framework based on *** platform and the technology of WebGIS was explored in the *** key techniques such as components,SSO(...
详细信息
With the analysis of user requirements about the coal mine excavating and joining,the overall framework based on *** platform and the technology of WebGIS was explored in the *** key techniques such as components,SSO(Single Sign On) and so on are used in the developing ***-layer distributed application model and OO(Object Oriented) thoughts are adopted to design each *** functions of the system such as Web browsing of map data,thematic map making,analyzing the excavating and joining,managing the maps,the exchange visits of graphics and database,*** ***'s an example used for reference to the application of coal mine excavating and joining.
With the rapid development of computer technology and mobile communication,at the same time,mobile data value-added service is widely used for it's efficiency and ***,security is still an overwhelming problem rela...
详细信息
With the rapid development of computer technology and mobile communication,at the same time,mobile data value-added service is widely used for it's efficiency and ***,security is still an overwhelming problem relating to *** studying elliptic curve cryptography and analyzing security features of mobile network,an effective wireless security protocol is presented,then security analysis of this improved protocol is *** the end of this article,we can safely draw a conclusion that the improved protocol,which we put forward in the article can preferably meets the demands of mutual authentication,anonymity, confidentiality,non-repudiation requirements.
Sensor optimal management is very important to the performance of multi-sensor system in target assignment *** solve it effectively,main old algorithms for solving this problem are discussed first,based on Dynamic Wei...
详细信息
Sensor optimal management is very important to the performance of multi-sensor system in target assignment *** solve it effectively,main old algorithms for solving this problem are discussed first,based on Dynamic Weight *** Optimization algorithm,a new method is put forward *** algorithm simulation is given in the end;the result shows the new target assignment method is valid, especially for the problem of large scale target assignment the new method shows faster convergence rate and higher precision.
The kernel of unhealthy network information filtering is to identify the web page *** overcome the shortages of traditional algorithm,we proposed a new method based on text analysis and color recognition.A mathematica...
详细信息
The kernel of unhealthy network information filtering is to identify the web page *** overcome the shortages of traditional algorithm,we proposed a new method based on text analysis and color recognition.A mathematical model was established which combines text and image to judge the properties of web-pages. The new method dramatically improved the recognition rate and reduced the false accept rate.
Though Java was first used in an embedded system,due to some technical reasons Java language is not widely applied to embedded *** change the situation, Sun defines some new Java specifications for embedded applicatio...
详细信息
Though Java was first used in an embedded system,due to some technical reasons Java language is not widely applied to embedded *** change the situation, Sun defines some new Java specifications for embedded application *** the Real-Time Specification for Java(RTSJ)proposed,more and more programmers begin to devote to real-time Java *** paper gives an overview of Java-based embedded real-time systems and analyzes future work about Java-based embedded real-time technology.
Identity authentication,as the first step to realize the network security,is the key technology for secure exchange of the online commercial information. Moreover,if there is any leak in the authentication protocol,se...
详细信息
Identity authentication,as the first step to realize the network security,is the key technology for secure exchange of the online commercial information. Moreover,if there is any leak in the authentication protocol,secret information will leak out *** is necessary to adopt some formalized method to describe and prove the authentication *** this paper the colored Petri Net is employed to describe the authentication protocol, and simultaneously the combined strategy of 1-reachable analysis and conversing analysis has been put forward to verify the security of this authentication protocol.
暂无评论