A capacity using covert channel mitigation method (CUCCMM) was proposed. This method uses capacity as metric for channel danger measure according to trusted computersystem evaluation criteria (TCSEC) and multiple pro...
详细信息
A capacity using covert channel mitigation method (CUCCMM) was proposed. This method uses capacity as metric for channel danger measure according to trusted computersystem evaluation criteria (TCSEC) and multiple probabilities based protocol selection policy (MPBPSP) to guide die application of secure concurrency control protocol. The algorithms of channel's capacity measure and policy's parameter computing are also presented. Experimental results show that CUCCMM implements the restriction criterion on channel's capacity effectively and accurately, and the MPBPSP significantly decreases the influence of restriction operation on real-time performance.
Understanding the primatespsila visual system has been one of the challenging problems of different groups of scientists for years. Though many studies, from physiology and neuroscience to computer vision, are done on...
详细信息
Understanding the primatespsila visual system has been one of the challenging problems of different groups of scientists for years. Though many studies, from physiology and neuroscience to computer vision, are done on different aspects of visual processing in the cortex, a comprehensive computational model of visual cortex is still missing. We have implemented a computational model of object recognition in ventral visual pathway in our previous work. This hierarchical model covers visual areas V1/V2, V4/PIT, and AIT sending inputs to the Prefrontal Cortex (PFC) for categorization. To extend our model, in this work, we have added a simple model of motion detection in neurons of areas V1 and MT of the dorsal stream to our previous model. This has enabled the model to perform another principal function of the visual cortex, i.e., motion perception.
As the Web increase drastically, more and more entity information come to appear on Web, including their profile information, their web log containing their idea, activity, speech and so on. However, there are many en...
详细信息
As the Web increase drastically, more and more entity information come to appear on Web, including their profile information, their web log containing their idea, activity, speech and so on. However, there are many entities sharing same names. Such entities include persons, locations and so on. This paper presents an approach to estimate the number of entities sharing same name by employing many-to-one features. The basic idea is that the entities are not likely to share all other features even if they have the same name. We list some strategies for selecting key features, present an approach to extract the features on Web, and combine them to estimate the entity number. What is more, we also give a method to identify the fake information which will confuse us and filter them.
In this paper, we propose the basic framework of point- wise topological logic on completely distributive lattices and explore approximate reasoning in it. The logic of this paper is based on pointwise characterizatio...
详细信息
In this paper, we propose the basic framework of point- wise topological logic on completely distributive lattices and explore approximate reasoning in it. The logic of this paper is based on pointwise characterization, therefore the pointwise conception is pervasive. We explore approximate reasoning in abstract logical framework Fl on completely distributive lattice L. We propose the structure of point- wise topological logic F TL , the structure of matching function sigma. and the structure of matching neighborhood group. We investigate approximate reasoning in pointwise topological logic F TL with matching function sigma, develop pointwise topological algorithm of simple approximate reasoning, introduce the essential characteristics of this scheme.
Decision trees are one of the most transparent methods probably most often used for solving classification, tasks. In the process of decision tree induction a lot of input parameters have to be fine-tuned in order to ...
详细信息
Decision trees are one of the most transparent methods probably most often used for solving classification, tasks. In the process of decision tree induction a lot of input parameters have to be fine-tuned in order to obtain good results. However the most important and probably most influential parameter in top-down induction method is a splitting criterion, which can vary from one classification task to another. In this paper we empirically tested four of them, based on well known purity measures, on 54 UCI databases. Although none of the proposed splitting criterion in the literature has proved to be universally better than the rest, they are not always suitable for solving any classification task. Therefore we propose two new splitting criteria: hybrid linear combination of purity measures and voting of purity measures, which obtain at least comparable results to other well-known criteria used in greedy decision tree induction method, while their structure makes them ideal for non-expert users. Boosting was also applied as one of the most successful ensemble methods, which once again proved the ability to significantly improve the classification accuracy on many databases.
Low-power design is one of the most important issues in wireless sensor networks (WSNs) , while reliable information transmitting should be ensured as well. Transmitting power (TP) control is a simple method to make t...
详细信息
Low-power design is one of the most important issues in wireless sensor networks (WSNs) , while reliable information transmitting should be ensured as well. Transmitting power (TP) control is a simple method to make the power consumption down, but excessive interferences from potential adjacent operating links and communication reliability between nodes should be considered. In this paper, a reliable and energy efficient protocol is presented, which adopts adaptive rate control based on an optimal TP. A mathematical model considering average interference and network connectivity was used to predict the optimal TP. Then for the optimal TP, active nodes adaptively chose the data rate with the change of bit-error–rate(BER) performance. The efficiency of the new strategy was validated by mathematical analysis and simulations. Compared with 802.11 DCF which uses maximum unified TP and BASIC protocol, it is shown that the higher average throughput can achieve while the energy consumption per useful bit can be reduced according to the results.
The need to examine and manipulate large surface models is commonly found in many science, engineering, and medical applications. On a desktop monitor, however, seeing the whole model in detail is not possible. In thi...
详细信息
The need to examine and manipulate large surface models is commonly found in many science, engineering, and medical applications. On a desktop monitor, however, seeing the whole model in detail is not possible. In this paper, we present a new, interactive Focus+Context method for visualizing large surface models. Our method, based on an energy optimization model, allows the user to magnify an area of interest to see it in detail while deforming the rest of the area without perceivable distortion. The rest of the surface area is essentially shrunk to use as little of the screen space as possible in order to keep the entire model displayed on screen. We demonstrate the efficacy and robustness of our method with a variety of models.
As 3G became the general tendency of mobile industry, new mobile handsets are challenged to show more and more functions. In order to process high-resolution images, the high-speed data transfer technology that was or...
详细信息
Distributed estimation based on measurements from multiple wireless sensors is investigated. It is assumed that a group of sensors observe the same quantity in independent additive observation noises with possibly dif...
详细信息
Distributed estimation based on measurements from multiple wireless sensors is investigated. It is assumed that a group of sensors observe the same quantity in independent additive observation noises with possibly different variances. The observations are transmitted using amplify-and-forward (analog) transmissions over nonideal fading wireless channels from the sensors to a fusion center, where they are combined to generate an estimate of the observed quantity. Assuming that the best linear unbiased estimator (BLUE) is used by the fusion center, the equal-power transmission strategy is first discussed, where the system performance is analyzed by introducing the concept of estimation outage and estimation diversity, and it is shown that there is an achievable diversity gain on the order of the number of sensors. The optimal power allocation strategies are then considered for two cases: minimum distortion under power constraints;and minimum power under distortion constraints. In the first case, it is shown that by turning off bad sensors, i.e., sensors with bad channels and bad observation quality, adaptive power gain can be achieved without sacrificing diversity gain. Here, the adaptive power gain is similar to the array gain achieved in multiple-input single-output (MISO) multianterma systems when channel conditions are known to the transmitter. In the second case, the sum power is minimized under zero-outage estimation distortion constraint, and some related energy efficiency issues in sensor networks are discussed.
Predicted particle swarm optimization is an enhanced version aiming to increase the utilization ratio of velocity information, and the performance heavily relies upon the parameters settings. According to control theo...
详细信息
Predicted particle swarm optimization is an enhanced version aiming to increase the utilization ratio of velocity information, and the performance heavily relies upon the parameters settings. According to control theory, the trajectories of position and velocity vectors of each particle can be both viewed as oscillatory links, and the relationship between inertia weight and accelerator coefficients is obtained. Thus, a self-adjusting parameter strategy is proposed. Simulation results show the new proposed strategy is powerful and useful.
暂无评论