In this paper, we first propose a specification ap-proach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching ...
详细信息
In this paper, we first propose a specification ap-proach combining interface automata and Z language. This approach can be used to describe temporal properties and data properties of software components. A branching time logic for ZIAs is presented. We then give an algorithm for model checking this logic on ZIAs with finite domain. Furthermore, we present a mu-calculus logic for ZIAs, and give a model checking algorithm for this logic.
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper ...
详细信息
With the characteristic that the commutativity of modular exponential function makes the specific order of secret distribution process less important and on basis of the abstruseness of discrete logarithm, this paper proposed a new secret sharing scheme. In the scheme, the participants themselves select the private keys, which can avoid the distributor's fraud and reduce the distribution's burden as well as ensure the scheme's reuse. The credible participants can join in or leave the participants collection at any time without restarting the scheme procedures.
The key element in a Deep Web information fusion system is the data source modeling problem, which is the determinant technical factor of the whole system. The query interfaces provided by the Deep Web are the clues t...
详细信息
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrast...
详细信息
As an emerging technology and business paradigm, Cloud Computing has taken commercial computing by storm. Cloud computing platforms provide easy access to a company's high-performance computing and storage infrastructure through web services. With cloud computing, the aim is to hide the complexity of IT infrastructure management from its users. At the same time, cloud computing platforms provide massive scalability, 99.999% reliability, high performance, and specifiable configurability. These capabilities are provided at relatively low costs compared to dedicated infrastructures. This article gives a quick introduction to cloud storage. It covers the key technologies in Cloud Computing and Cloud Storage, several different types of clouds services, and describes the advantages and challenges of Cloud Storage after the introduction of the Cloud Storage reference model.
We propose a fast and simple application system of 3D model reconstruction. We acquire range images by using a combination of a regular camera and two types of depth sensors. The reconstruction of a 3D model consists ...
详细信息
We propose a fast and simple application system of 3D model reconstruction. We acquire range images by using a combination of a regular camera and two types of depth sensors. The reconstruction of a 3D model consists of four key steps: (i) Initial alignment either feature tracking or the 4-points congruent sets algorithm is used to align surfaces captured at different frames. (ii)The iterative closest point (ICP) method is applied to further align the piecewise surfaces from the last step, (iii) The surfaces are merged into a whole 3D model by the volumetric method, (iv) In the refinement step, we fill holes and produce a complete 3D model that approximates the original model with robust repair of polygonal models. At last, we present the experimental results which show that the errors between our reconstructed model and the ground truth are less than 1%.
The efficient markets hypothesis (EMH) maintains that market prices fully reflect all available information such as public or private information. Therefore, the study of analyzing the reaction of stock price to the i...
详细信息
The efficient markets hypothesis (EMH) maintains that market prices fully reflect all available information such as public or private information. Therefore, the study of analyzing the reaction of stock price to the information has attracted more and more attention. Here we proposed an effective measuring method using fuzzy c-means (FCM) for describing the reaction to public information, and further analyzing and quantifying the intensity. Taking the deposit reserve rate, a kind of typical public information, as an example, the clustering results show that there are there prominent characters of reaction in Shanghai A-share market. Furthermore, the empirical results indicate that the clustering technique has a good effect in classifying the intensity of reaction of stock market to public information.
Lifetime optimization and security are two important design issues for multi-hop wireless sensor networks with non-replenishable energy resources. In this research, we propose a novel secure and energy aware (SEAR) ro...
详细信息
Lifetime optimization and security are two important design issues for multi-hop wireless sensor networks with non-replenishable energy resources. In this research, we propose a novel secure and energy aware (SEAR) routing protocol to address these two issues concurrently through balanced energy consumption and probabilistic random walking. SEAR is designed with two configurable parameters, energy balance control (EBC) and security level. EBC is used to enforce energy balance and increase the lifetime. security level is designed to determine the probabilistic distribution of the random walking that provides routing security. The security level can be defined by the message source on a message level, or on a system level. Theoretical analysis and OPNET simulation results show that the proposed SEAR can provide excellent balance between routing efficiency and energy consumption while preventing routing traceback attacks.
An associative memory (AM) system is proposed to realize incremental learning and temporal sequence learning. The proposed system is constructed with three layer networks: The input layer inputs key vectors, response ...
详细信息
An associative memory (AM) system is proposed to realize incremental learning and temporal sequence learning. The proposed system is constructed with three layer networks: The input layer inputs key vectors, response vectors, and the associative relation between vectors. The memory layer stores input vectors incrementally to corresponding classes. The associative layer builds associative relations between classes. The proposed method can incrementally learn key vectors and response vectors; store and recall both static information and temporal sequence information; and recall information from incomplete or noise-polluted inputs. Experiments using binary data, real-value data, and temporal sequences show that the proposed method works well.
Study on approximation capabilities of fuzzy systems has been an important and hot issue for many years. Many existing studies on fuzzy systems based on standard affine TS fuzzy models suffer seriously from curse of d...
详细信息
ISBN:
(纸本)9781424474264
Study on approximation capabilities of fuzzy systems has been an important and hot issue for many years. Many existing studies on fuzzy systems based on standard affine TS fuzzy models suffer seriously from curse of dimensionality though such models are relatively simple to construct;whereas other investigations based on hierarchical fuzzy models have to face the difficulty of relatively more complexity. Through utilizing the dynamic partition along all dimensions, this paper proposes a novel dynamically constructive method in MISO cases to construct fuzzy systems based on standard affine TS fuzzy models, which have simple structures and also can ease the serious curse of dimensionality greatly. Correspondingly, new sufficient conditions for a affine TS fuzzy system as an universal approximator are obtained. The situation in 2ISO cases is derived first which is then extended to general MISO cases. Theoretical analyses comparing to some typical methods and several numerical examples all confirm that the dynamic method in this paper can reduce the fuzzy rules number dramatically and therefore can ease the serious curse of dimensionality to some extent. Some conclusions and discussions on further work are also given.
A person's clothes color information was estimated by using a prototype PC-based system. The novel concept can be divided into 3 stages. First, space-variant color filter is put onto the lens of the monochrome sec...
详细信息
A person's clothes color information was estimated by using a prototype PC-based system. The novel concept can be divided into 3 stages. First, space-variant color filter is put onto the lens of the monochrome security camera. Secondly, when a crime takes place, the camera records suspected person. Finally, just after the crime, characteristics of the space-variant color filter are measured by the police, and the color of the clothes of the suspected person is estimated. In this experiment six kind reference color cloth were used. The result shows using this system to estimate the clothes color is easily, rapidly and precisely.
暂无评论