With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this resea...
详细信息
ISBN:
(纸本)9781467390880
With the bursting and rapid development of computational science and ZigBee engineering related techniques, it is becoming capital research area. The network of wireless sensors which is to be considered in this research deals with fixed and mobile wireless sensors and treated with mesh and tree topologies. This paper takes up the effect of Acknowledgement technique to search for better throughput and end to end delay of wireless sensors network. The results show that the acknowledgement technique has different effects on the performance of the network depending on the type of topology and state of sensors (fixed or mobile). The usage of Acknowledgement gives better performance in terms of throughput and end to end delay for tree topology with mobile stations, and mesh topology with fixed stations. Further potential research topics are also discussed with case study and simulation.
Hand posture classification is a key problem for many human computer interaction ***,this is not a simple *** this paper,we propose to decompose the hand posture classification problem into 2 *** the first step,we det...
详细信息
ISBN:
(纸本)9781424467860
Hand posture classification is a key problem for many human computer interaction ***,this is not a simple *** this paper,we propose to decompose the hand posture classification problem into 2 *** the first step,we detect skin regions using a very fast algorithm of color segmentation based on thresholding *** segmentation is robust to lighting condition thank to a step of color normalization using neural *** the second step, each skin region will be classified into one of hand posture class using Cascaded Adaboost *** contributions of this paper are:(i) By applying a step of color normalization,the posture classification rate is significantly improved under varying lighting condition;(ii) The cascaded Adaboost technique has been studied for the problem of face detection(2 classes).In this paper, it will be studied and evaluated in more detail in a problem of classification of hand postures(multi-classes).
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,th...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Role Based Access Control(RBAC) has become the de facto access control model in recent *** order to deploy RBAC,organizations have to define a set of roles from the existing user-permission assignment relationships,the process of which is called role *** have been many role mining algorithms proposed to devise a complete and correct set of roles which may not be necessary because the user-permission assignment(UPA) relationships are *** this paper,we define the evaluation criterion and the 8-Approx Important Role Mining Problem(δ-IRMP) which is proved to be NP-complete first,then we propose a heuristic bottom-up role mining approach that reduces the total number of roles with important assignments and permissions ***,we carry out the experiments with public datasets to evaluate our approach and the experimental results compared with other algorithms demonstrate the effectiveness of our proposed approach.
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
In distant-water fishing industry, production, supply and distribution activities are realized in a dynamic environment including uncertainties of resources in fishing grounds and demands from global markets. Moreover, the capacity of the port cold storage is of great importance to the cold chain network as most of catch is handled and temporarily stored at seaports. Here, a multi-product, three-echelon and multiperiod network model is applied to a distant-water fishery cold chain design problem based on capacities. This network-design includes optimal cold storage facility locations and optimal flow amounts. And a two-stage stochastic programming method is used to handle the uncertainties.
As we all know, research continues in the areas of image classification development in computer vision. People eagerly hope to achieve a perfect classification accuracy, however,many results of these experiments are l...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
As we all know, research continues in the areas of image classification development in computer vision. People eagerly hope to achieve a perfect classification accuracy, however,many results of these experiments are less than satisfactory because of many complex factors. Therefore, in order to find these factors and improve the classification accuracy, we describe the details of classification methods with logistic regression and support vector machine algorithm, then discuss the impact of different methods on classification results and the factors that affect the classification accuracy in one *** that we briefly introduce the image feature extraction which plays a necessary role of image classification.
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objecti...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The distribution of online news comments can reveal the rules of users behavior and laws of regional association, and facilitate governance of website society. This study takes comments of hot news as research objectives, and derives futures of comment distribution from three aspects, i.e., quantity, time and spa psychological rhythms and time arrangement. And the space of comment distribution is associated with regional economic levels, geographical locations and statuses. The study also finds that news with different themes or events has remarkable differences in comment distributions.
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family ...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
The problem of incomplete requirements has been one of the most critical issues in requirements *** requirements in the software product line establish the foundation to implement the core functionalities of a family of software *** this paper,we propose a framework to detect the missing common requirements in the context of software product *** framework mainly consists of two parts:a set of rules to extract the common requirements,the dependency relationships among them and a procedure for detecting the omission in an incoming set of *** experiments are conducted on a group of medical applications to validate our *** results indicate that our proposed framework is effective.
Learning from fast data stream is one of the most challenging tasks in data stream mining. The fact that data streams are unbounded sequences, highlights exclusive challenges in contrast to classifiers from batch data...
详细信息
ISBN:
(纸本)9781538619797;9781538619780
Learning from fast data stream is one of the most challenging tasks in data stream mining. The fact that data streams are unbounded sequences, highlights exclusive challenges in contrast to classifiers from batch data. Most of methods aren't naturally parallel and thus their scalability is limited. This paper proposes a scalable data stream Bayes classifier utilizing a new estimation(DIB). The new estimation takes conjugate Dirichlet prior as parameter's prior distribution and thus improves the predictive accuracy. Meanwhile, this paper proposes a new distributed implementation of DIB on Flink. Experiments show that DIB classifier significantly outperforms Na?ve Bayes in terms of accuracy. Also, the experiment proves parallel DIB running on Flink enhances the throughput and reduces execution time.
The article presents an algorithmic model of sound propagation in rooms to run on parallel and distributed computer systems. This algorithm is used by the authors in an implementation of an adaptable high-performance ...
详细信息
ISBN:
(纸本)9781509034840
The article presents an algorithmic model of sound propagation in rooms to run on parallel and distributed computer systems. This algorithm is used by the authors in an implementation of an adaptable high-performance computer system simulating various fields and providing scalability on an arbitrary number of parallel central and graphical processors as well as distributed computer clusters. Many general-purpose computer simulation systems have limited usability when it comes to high-precision simulation associated with large numbers of elementary computations due to their lack of scalability on various parallel and distributed platforms. The more the required adequacy of the model is, the higher the numbers of steps of the simulation algorithms are. Scalability permits a use hybrid parallel computer systems and improves efficiency of the simulation with respect to adequacy, time consumptions, and total costs of simulation experiments. The report covers such an algorithm which is based on an approximate superposition of acoustical fields and provides adequate results, as long as the used equations of acoustics are linear. The algorithm represents reflecting surfaces as sets of vibrating pistons and uses the Rayleigh integral to calculate their scattering properties. The article also provides a parallel form of the algorithm and analysis of its properties in parallel and sequential forms.
Dispatching Automation System (DAS) has been widely used in many critical areas such as power dispatch, transport dispatch, and water dispatch. It provides a reliable guarantee for the development of social economy, w...
详细信息
ISBN:
(纸本)9781538676721
Dispatching Automation System (DAS) has been widely used in many critical areas such as power dispatch, transport dispatch, and water dispatch. It provides a reliable guarantee for the development of social economy, which in turn puts forward higher quality requirements for DAS. Thus, security protection, which provides a basis for safe and stable operation, plays a crucial role in DAS. Although a number of studies focus on improving the protective ability of security on DAS, there is no comprehensive research on these techniques. To fill this gap, we conduct a preliminary research on DAS protection. In this paper, we present the DAS security risk taxonomy and reviews the corresponding protective works. Moreover, we also point out the future directions in DAS protection.
暂无评论