Wireless sensor networks(WSNs), which is utilized in a broad region, is able to monitor and collect various information of different objects. location plays a critical role in WSNs. Currently, many localization algori...
详细信息
there is not a good method to find k value when using LSI to reduce dimension of Vector Space Modal. to solve the problem above, an improved LSI dimension reduction algorithm called Dimension Reduction Parameter Produ...
详细信息
According to the China39;s aviation fuel market, the article constructs a supply chain model including three upstream firms and three downstream firms to solve China39;s aviation fuel security. Then, we analyze th...
详细信息
Load-balancing is an important technology for improving performance of distributed system. We are based on the analysis of distributed process communication protocol, then we design a load balancing solution for the a...
详细信息
Requirements engineering (RE) is one of the important disciplines of software development. With the passage of time, software development process changed from traditional approaches to agile approaches. RE techniques ...
详细信息
With the rapid increase of XML application, XML is becoming the standard of Semi-structured information exchange on Internet. The existed access control becomes more complicated for each operation as a new operation i...
详细信息
In recent years, with the wide application of UAV, as an important component of the UAV system, ground monitor and control system for UAV is also in constant updates. In order to satisfy people with higher requirement...
详细信息
Localization is one the key technologies of wireless sensor networks, and the problem of localization is always formulate as an optimization problem. Particle swarm optimization (PSO) is easy to implement and requires...
详细信息
The quality of the general commodities can be measured by three indicators: whether commodity production enterprises have the authenticated production capacity;whether the goods could be tested as qualified by the tru...
详细信息
In order to protect the normal operation of social networks from the influence of malicious communication, we established a system to help evaluate information and users. On one hand, based on behavior recognition tec...
详细信息
暂无评论