Aimed to the measuring problem of steam consumption in Dyeing process, a multiple neural network soft sensing modeling of Dyeing steam consumption based on adaptive fuzzy C-means clustering (FCM) is presented. The met...
详细信息
Aimed to the measuring problem of steam consumption in Dyeing process, a multiple neural network soft sensing modeling of Dyeing steam consumption based on adaptive fuzzy C-means clustering (FCM) is presented. The method is used for separating a whole real-time training data set into several clusters with different centers, and the clustering centers can been modified by an adaptive fuzzy clustering algorithm. Each sub-set is trained by radial base function networks (RBFN), then combining the outputs of sub-models to obtain the finial result. This method has been evaluated by a soft sensing modeling of steam consumption in Dyeing process and a practical case study. The results demonstrate that the method has significant improvement in model prediction accuracy and robustness and a good online measurement capability.
The network in case of Mobile Adhoc networks is generally poorly defined or not defined at all. In Such a network the data can be relayed/routed by intermediate nodes whose position keeps on changing. Mobile adhoc net...
详细信息
The network in case of Mobile Adhoc networks is generally poorly defined or not defined at all. In Such a network the data can be relayed/routed by intermediate nodes whose position keeps on changing. Mobile adhoc networks have some challenges like Limited wireless transmission range, broadcast nature of the wireless medium, hidden terminal and exposed terminal problems, packet losses due to transmission errors-Mobility, induced route changes, Mobility-induced packet losses, Battery constraints, Ease of snooping, security problem. In wireless ad hoc networks and sensor networks, energy use is in many cases the most important constraint since it corresponds directly to operational lifetime. This paper presents new topology control protocols that extend the lifetime of dense ad hoc networks while preserving connectivity, the ability for nodes to reach each other. Our protocols conserve energy by identifying redundant nodes and turning their radios off. Cluster-based Energy Conservation (CEC) directly observes radio connectivity to determine redundancy nodes and so can be more aggressive at identifying duplication and more robust to radio fading. In CEC, if the lifetime of any gateway (LTgateway) of the cluster is less than life time of the cluster, then there will not be any connectivity in the network for LTcluster -LTgateway amount of time. Our protocol ensures that the connectivity in the network is maintained even in the case of the above stated scenario while consuming minimum energy. In this protocol(ECEC), those nodes that can hear multiple cluster-heads broadcast velocity, position, and transmission rate and life time information,then cluster-head base on Quality that introduce in session (3.2) sort gateway. after sorting, in this paper we select 2 nodes as gateways,one of them as primary gateway and the other one as reserved gateways. reserved gateway nodes wake up in time Tg, that is smaller than Ts, and notify themselves to cluster-head, if cluster-head don
How to stipulate data consistence is very important when developing software packages for integrating or modifying the existing distributed vision-based traffic surveillance systems into a larger one. We extend our pr...
详细信息
How to stipulate data consistence is very important when developing software packages for integrating or modifying the existing distributed vision-based traffic surveillance systems into a larger one. We extend our previous holonic architecture to verify formally the data consistence of the novel system via an intermediate modular using a STF-based settheoretical approach under the assumption that all existing sub- systems are data consistent.
Directional pattern is a representation of original fingerprint image. This paper proposes one algorithm based on direction mean value difference to detect fingerprint center point. To realize this algorithm mainly in...
详细信息
Directional pattern is a representation of original fingerprint image. This paper proposes one algorithm based on direction mean value difference to detect fingerprint center point. To realize this algorithm mainly includes detecting point direction of each pixel and configuring block patterns with 8×8 and 16×16 ranges. Experimental results show the algorithm has good robustness and can easily wipe off the false center point detected from the fingerprints.
This paper is mainly to investigate the positioning technology. We use Bluetooth and RFID to increase positioning accuracy in house or interior space. RFID technologies have low-cost, low power consumption, small size...
详细信息
This paper is mainly to investigate the positioning technology. We use Bluetooth and RFID to increase positioning accuracy in house or interior space. RFID technologies have low-cost, low power consumption, small size, easy to fabric construction, etc. Ideally, it suited for short-range wireless transmission of leaving. There are two-way communication is superlative for indoor positioning system. Bluetooth can be through radio signals to identify a specific target, and then read or write data. It does not need identification system and the specific goals established between the mechanical or optical contact. Our Experiments showed that RFID devices with RF functionality, the accuracy better than RFID-enabled devices. In the case of no interference with Bluetooth-enabled packet arrival rate of 69% is indeed better than a simple function of only the RFID packet arrival rate of 42% of their good. Then, in the case of interference found that the effectiveness of the two sides have declined in many, but there are still Bluetooth-enabled 52% of the arrival rate, compared with 53% pure RFID features is better.
Classical Differentiated Service (DiffServ) routers have not considered the security problem in their designs, generally, they have no ability to countering Denial of Service (DoS ) attacks because of their simple sys...
详细信息
ISBN:
(纸本)9781849192408
Classical Differentiated Service (DiffServ) routers have not considered the security problem in their designs, generally, they have no ability to countering Denial of Service (DoS ) attacks because of their simple system structures. DoS attacks against DiffServ clients are more targeted and require less attack bandwidth than current attacks for classical DiffServ routers due to the per-client and perclass bandwidth limitations, since they must be imposed to ensure QoS guarantees. To solve the problem, in this paper, we present the design of new ingress DiffServ edge router(IDER) for defeating DoS attacks on DiffServ clients. The classifier and access control model of ingress DiffServ edge routers(IDERs) secure the Quality of Service (QoS) by policing traffics and limiting the data rate and access number of traffics, and distinguish the traffics with higher priorities from malicious traffics. The algorithms of secure TCP AQM and UDP AQM are derived from two fluid models. The network behaviors of proposed secure IDERs have been simulated by several to two fluid models with the traffic policing.
The main activity of an information Retrieval System (IRS) is the gathering of pertinent archived documents that better satisfy the user *** to retrieval required information is the key problem in this kind of informa...
详细信息
The main activity of an information Retrieval System (IRS) is the gathering of pertinent archived documents that better satisfy the user *** to retrieval required information is the key problem in this kind of information retrieval *** this paper we present a new information retrieval system based on prioritized fuzzy information and T-Conorm,for dealing with such a *** advantage of this system with respect to others is that the use of the prioritized weighting information facilitates the expression of information needs and improves the latter *** to our approach of modelling priority weighting information is that the importance of lower priority criteria will be based on its satisfaction to the higher priority criteria,and that a T-Conorm operat ooorrr is used to calculate the priority in the process.
Time table problem is a multifactor optimized decision problem and is typical problem in constitution and planning. It has been proved as a kind of NP-complete problem. Genetic Algorithm (GA) is based on the biologica...
详细信息
Time table problem is a multifactor optimized decision problem and is typical problem in constitution and planning. It has been proved as a kind of NP-complete problem. Genetic Algorithm (GA) is based on the biological mechanism of natural selection and heredity, leveraging colony searching technology, and is particularly applicable for the resolution of complicated on-linear problems intractable with traditional searching methods. This paper designs the genetic arithmetic about the time table problems, a new method chromosome encoding is designed. This method mainly aims at in the test time arrangement the concrete question to propose each kind of corresponding heredity operation strategy. The experiment proved this algorithm in the test time cell and the examination place number is all not in the very big situation, reduced the average evolution algebra enormously, and can guarantee obtains the overall situation optimal solution in the two number random situation.
With the world coming into the information age, computer basis course has become the public basic course which must be set up in colleges and universities and the increasing popularization of computers makes the compu...
详细信息
ISBN:
(纸本)9781424465392;9781424465422
With the world coming into the information age, computer basis course has become the public basic course which must be set up in colleges and universities and the increasing popularization of computers makes the computer basis education in university facing with more and more higher request. That requires teachers to answer questions in time, but a teacher usually teaches hundreds of students. After class, teachers have no enough time to communicate with students. How to improve communication between students and teachers is being more important. The ubiquity of mobile phones provides a new communication platform for students and teachers. In order to strengthen communication between students and teachers, we design the computer-aided education platform based on mobile communication and cloud computing technology. In client, we develop the smartphone software based on the open source JavaME UI framework (kuix) and Jaber which is an open source instant message protocol. In order to help teacher use the system conveniently, we develop the web site based on Google App Engine. Through the communication platform, the students can communicate with their teacher at any convenient time. This helps teachers know the situation of teaching and student's knowledge level of the course. The teacher also can answer questions or send messages to students through this communication platform freely. In practice, through these technical means it narrows the gap between students and teachers and produces satisfactory results.
Mathematical analysis of current congestion control algorithms [1, 2] reveals that, as the delay-bandwidth product (BDP) increases, TCP becomes more oscillatory and prone to instability, regardless of the queuing sche...
详细信息
ISBN:
(纸本)9781617822629
Mathematical analysis of current congestion control algorithms [1, 2] reveals that, as the delay-bandwidth product (BDP) increases, TCP becomes more oscillatory and prone to instability, regardless of the queuing scheme. To address this problem, a novel approach to Internet congestion control is developed recently. This new eXplicit Control Protocol (XCP) delivers the highest possible application performance over a broad range of network infrastructure, including extremely high speed and very high delay links that are not well served by TCP. We analyze the performance of XCP and make comparation with TCP. Extensive simulations show that XCP achieves fair bandwidth allocation, high utilization, small standing queue size, and near-zero packet drops, with both steady and highly varying traffic. In this paper, we investigate the XCP in deep sight;also present a simple network in which XCP is locally stable but globally unstable in the presence of latency. The simulation results verify that XCP remains fairness, high utilization for future high bandwidth-delay product network.
暂无评论