With the rapid development of wireless communication technology,there is a urge requirement for the con-vergence of wireless and Internet. But the high BER, fading and occasionally occurred handoff in wireless network...
详细信息
With the rapid development of wireless communication technology,there is a urge requirement for the con-vergence of wireless and Internet. But the high BER, fading and occasionally occurred handoff in wireless networksheavily deteriorate the performance of traditional communication protocols such as TCP/UDP. This paper provides anoverview of the techniques which can improve data transmission over wireless links ,defines a taxonomy based on dif-ferent protocol layers ,and finally discusses the trends in this field.
User adaptation is a critical and important problem. For users' specialization, such as Handwriting, Voice,Drawing Styles, the system is hard to adapt to all users. SVM-based incremental learning can find the most...
详细信息
User adaptation is a critical and important problem. For users' specialization, such as Handwriting, Voice,Drawing Styles, the system is hard to adapt to all users. SVM-based incremental learning can find the most basic fea-ture of different users and cast away the special user's character, so this method can adapt the different users withoutover fitting. In this paper, the repetitive learning strategy and other two incremental learning algorithms are presentedfor comparison. Based on theoretical analysis and experimental results, we draw the conclusion that SVM-based incre-mental learning can solve the user conflict problem.
With the development of e-commerce, people are attaching more importance to biometrics authenticationtechniques. Dynamic handwritten signature verification is an effective one. This paper introduces the basic process ...
详细信息
With the development of e-commerce, people are attaching more importance to biometrics authenticationtechniques. Dynamic handwritten signature verification is an effective one. This paper introduces the basic process ofdynamic handwritten signature verification, some algorithms in use and performance evaluation.
The Mobile Agent is thought to be the popular computing model for the next generation's distributed sys-tem. The mobile agent has the following key features: autonomy, collaboration, security and especially mobili...
详细信息
The Mobile Agent is thought to be the popular computing model for the next generation's distributed sys-tem. The mobile agent has the following key features: autonomy, collaboration, security and especially mobility. Agood communication model for mobile agents cooperation is also necessary. In this article, after describing the maincommunication mechanisms, we analyze the methods to solve Agent Tracking and Communication Failure and makeclassification. We also propose a reliable and efficient mechanism named MEFS which uses Detecting methods andthen analyze its performance by giving the experimental data at the end.
暂无评论