Particle swarm optimization (PSO) is a new stochastic population-based search methodology by simulating the animal social behaviors such as birds flocking and fish *** improvements have been proposed within the framew...
详细信息
Particle swarm optimization (PSO) is a new stochastic population-based search methodology by simulating the animal social behaviors such as birds flocking and fish *** improvements have been proposed within the framework of this biological assumption. However,in this paper,the search pattern of PSO is used to model the branch growth process of natural *** provides a different poten- tial manner from artificial *** illustrate the effectiveness of this new model,apical dominance phenomenon is introduced to construct a ncvel variant by emphasizing the influence of the *** this improvement,the population is divided into three different kinds of buds associated with their ***,a mutation strategy is applied to enhance the ability escaping from a local ***- ulation results demonstrate good performance of the new method when solving high-dimensional multi-modal problems.
GML has been a standard in geographical information area for enhancing the interoperability of various GIS systems for data mining. In order to share geography information based on GML, problems in application schema ...
详细信息
Question classification is an important step in a question answering system, the accuracy rate of question classification has great impact to a question answering system's following module. This paper proposed a q...
详细信息
Virtualization technologies are becoming more and more widely-used in the distributed computing area. In order to organize and manage various virtual machines in the SOA (Service-Oriented Architecture) environment mor...
详细信息
As we are moving along with emerging technologies the storage of data will no longer be in our conventional single dimensional raw data. The relational data can be further identified with spatial and non-spatial relat...
详细信息
ISBN:
(纸本)9780863418877
As we are moving along with emerging technologies the storage of data will no longer be in our conventional single dimensional raw data. The relational data can be further identified with spatial and non-spatial relationship. This is to examine whether clustering approach has any role to play in spatial data mining. This paper explains spatial clustering under statistical method of analysis for discovering the knowledge which is encapsulated in the spatial database. This study emphasis the spatial clustering approach accomplished through algorithms such as PAM and CLARA and let us to come across the limitations of PAM method. To the end, This work ushers that spatial data mining is a promising field, with fruitful research results and carries many challenging issues.
Extraction of features from images has been a goal of researchers since the early days of remote sensing. While significant progress has been made in several applications, much remains to be done in the area of accura...
详细信息
Digital airborne cameras play a significant role for aerial Photogrammetry development from analog to full-digital age. Because of the gap between digital sensor performance and Photogrammetry request, digital airborn...
详细信息
Due to the limited power supply, sensors have to switch between sleeping mode and awake mode at a low duty cycle to extend the network life-time. Therefore, when localizing a mobile node, it is possible that a seed no...
详细信息
Due to the limited power supply, sensors have to switch between sleeping mode and awake mode at a low duty cycle to extend the network life-time. Therefore, when localizing a mobile node, it is possible that a seed node is passed by the mobile node during its sleeping mode, so that the mobile node cannot collect enough seed information and fails to be localized consequently. In this paper, a dynamic sleep scheduling mechanism, namely P-SWIM is proposed. In P-SWIM, each seed is proactively notified if a mobile node is moving toward it, so that only these seeds should remain active in full duty when the mobile node passes by them, while the other seeds can still stay in the low duty cycle mode. P-SWIM can ensure enough seed connectivity around the mobile node, which is necessary for successful mobile localization. Simulation results indicate that localization algorithms based on P-SWIM can achieve better localization performance than those based on the other two sleep scheduling mechanisms, RIS and GAF. Moreover, P-SWIM causes least running overhead to the network overall power consumption among the three mechanisms, at most 47.6% and 60.2% less than RIS and GAF.
In order to overcome the shortcomings of Garcia's watermarking algorithm, an improved adaptive synchronous audio watermarking algorithm is proposed. In this algorithm, both the psychoacoustic model and the auditor...
详细信息
In order to overcome the shortcomings of Garcia's watermarking algorithm, an improved adaptive synchronous audio watermarking algorithm is proposed. In this algorithm, both the psychoacoustic model and the auditory masking threshold are used to determine the embedding positions of watermarking for the purpose of ensuring the imperceptibility of watermarking, the synchronization code is embedded in die audio signal in time domain to withstand synchronous attacks, and the audio signal is segmented and the watermarking is self-adaptively embedded in each segment. Moreover, a sequence number is embedded in the front of each segment to discriminate different segments. Experimental results show that the proposed algorithm is robust against synchronous attacks and effective in processing common audio signals, and that it obviously improves the imperceptibility of watermarking.
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfe...
详细信息
Radio Frequency Identification (RFID) is a new technology. In recent years, it is convenient and feasible in many applications. However, it also addresses many security issues which are worth discussing. The Counterfeit imposes a menace to industry worldwide, and the problem is not specific for certain products or countries. In 2003, Koh et al. describe a RFID system based on "track and trace" solution to apply into pharmaceutical supply chain management to fight the counterfeit. Moreover, there are applications to solve malicious manner were presented. But there always still existed some disputes and not conform Class 1 Generation 2 (C1G2) standards. Unfortunately, the trick is changeable. The Koh et al.'s scheme is at premise rather primitive. In order to tackle this problem, we propose an anti-counterfeit ownership transfer protocol for low cost RFID system. We only use a tag to be a storage media. The proposed scheme can ensure a secure transaction.
暂无评论