In this paper, considering both of access efficiency, order-picking and storage-space cost, a Evolutionary Algorithm Inspired Particle Swarm Optimization (EA-PSO) Algorithm is developed to solve the Warehouse Allocati...
详细信息
In recent years, research efforts have been aimed at providing methodologies and techniques for secure software engineering. In this direction, UMLsec is proposed as a standard extension of UML for expressing security...
详细信息
In this paper, a new face recognition method based on local binary pattern(LBP) histogram is presented. First, the grey face image is divided into several parts, and then the LBP histogram of each part is calculated a...
详细信息
ISBN:
(纸本)9781612848372
In this paper, a new face recognition method based on local binary pattern(LBP) histogram is presented. First, the grey face image is divided into several parts, and then the LBP histogram of each part is calculated and concatenated together. Second, extract other concatenated histograms using different LBP operators and image blocking patterns. All the histograms above are concatenated into the ultimate vector. The proposed approach was tested using Yale face database on Android platform. Experimental results demonstrate that the combined LBP histogram feature has an encouraging performance for face recognition.
In this paper we employ the Integrated Active Contour (IAC) model of vector-value image segmentation and C-V model based on PDE in the segmentation of two channels DMSP nighttime satellite cloud images. The results of...
详细信息
Wireless sensor and actor networks (WSANs) can be considered as a combination of sensor network and actor network in which powerful and mobile actor nodes can perform application specific actions based on the received...
详细信息
ISBN:
(纸本)9781612848372
Wireless sensor and actor networks (WSANs) can be considered as a combination of sensor network and actor network in which powerful and mobile actor nodes can perform application specific actions based on the received data from the sensors. As most of these actions are performed collaboratively among the actors, so the connected inter-actor network is important to the effectiveness of WSANs. However, such connectivity can be lost due to the failure of actors. To handle this connectivity problem, we present a distributed scheme CCRA to detect possible broken connectivity, and then restore the network connectivity through relocation of actors. The effectiveness of CCRA is validated through simulation experiments.
We propose generalized linear mixed models with linear structural random effects based on generalized linear mixed models. In this article, an Monte Carlo EM type al- gorithm is developed for maximum likelihood estima...
详细信息
ISBN:
(纸本)9781612848372
We propose generalized linear mixed models with linear structural random effects based on generalized linear mixed models. In this article, an Monte Carlo EM type al- gorithm is developed for maximum likelihood estimations of the proposed models. To avoid computation of the complicated multiple integrals involved, the E-step is completed by Monte Carlo techniques. The M-step is carried out efficiently by simple Conditional Maximization. Standard errors of MLEs are obtained via Louis’s identity.
Such advantages as self-adaption, multi-functions, low cost and low power etc make the technology of reconfiguration be the development tread of embedded system. The aim of this paper is to give a reconfigurable, embe...
详细信息
Bloom filter is a space-efficient data with a certain probability of false positive. We present a reusable hardware implementation framework, define a module interface to provide users with a customize module, and int...
详细信息
Bloom filter is a space-efficient data with a certain probability of false positive. We present a reusable hardware implementation framework, define a module interface to provide users with a customize module, and introduce the constraints of hardware resources in the analysis of false positive rate against the traditional Bloom filter hardware design and analysis of the Bloom filter false positives. Finally, we make verification and analysis of our design combined with the the Net Magic platform.
Aiming at the problems of that capital information, project information and enterprise information scattered, and the lack of supporting for the trading platform in Shanxi venture capital management, this paper summar...
详细信息
ISBN:
(纸本)9781612848372
Aiming at the problems of that capital information, project information and enterprise information scattered, and the lack of supporting for the trading platform in Shanxi venture capital management, this paper summarizes the venture system and platform construction contents of Shanxi province. And based on the study on BS rich client technology, the paper brings out a venture capital information platform based on the technology of GWT and AJAX service, which effectively realizes the venture capital information sharing and interaction, and lays a good technical foundation for the implementation of the latter part of the transaction and case management functions and other functions.
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or...
详细信息
ISBN:
(纸本)9781612848372
Security is of critical importance for many potential applications of wireless sensor networks. Broadcasting from base station to nodes is very important in the cases such as distributing secure keys in the network or delivering control commands to nodes. However, the sparse distribution and limited resource of nodes bring difficulties to the efficient and reliable broadcast in wireless sensor networks. A lightweight energy-efficient reliable broadcast tree, or LERBT, is proposed to provide a framework by which to support reliable broadcast while reducing the broadcast coverage overlap and power consumption. Additionally, LERBT can configure itself quickly, allowing the base station to begin broadcasting commands shortly after deployment. Simulation results show the protocol can save significant energy over SBA and LKDT without sacrificing the coverage and reachability.
暂无评论