The efficiency of transferring a pack of small-sized flies or a large-sized file is very low in FTP based file transfer system. To solve this problem, we have studied the optimized method of different types of file tr...
详细信息
The efficiency of transferring a pack of small-sized flies or a large-sized file is very low in FTP based file transfer system. To solve this problem, we have studied the optimized method of different types of file transfer and present an adaptive transfer algorithm. Based on this algorithm. We design and implement the file transfer subsystem of global distributed storage system.
With the information explosion speeds up the increasing of computing complexity rapidly, the traditional centralized computing patterns are under great pressure to process those large-scale distributed information. Ho...
详细信息
With the information explosion speeds up the increasing of computing complexity rapidly, the traditional centralized computing patterns are under great pressure to process those large-scale distributed information. However, the agent-based computation and high-level interaction protocols foster the modern computation and distributed information processing successfully. The multi-agent system (MAS) plays an important role in the analysis of the human-interaction theory and model building. This study focuses on the formal description of MAS, the conflict-resolving mechanisms and the negotiation in MAS. In this paper, we present a formalism for reasoning about the interaction of multi-agent system, which is MAS model based on negotiation axiom system of capability and thought (CTN system). We first present the semantic frame and define the global states, the class of the CTN system, the running and reachable states for the CTN system. Then we present the axiomatic of negotiating logic. We also prove the Logical Consistency and Completeness of the CTN system and discuss the conflict-resolving mechanisms. The semantic of CTN model is intuitive, rational and natural, and the CTN model is a formal description by integrated the ability and thought status of Agent.
Data mining has become of great importance owing to ever-increasing amounts of data collected by large organizations. This paper propose an data mining algorithm called ant-miner (I),which is based on an improvement o...
详细信息
Data mining has become of great importance owing to ever-increasing amounts of data collected by large organizations. This paper propose an data mining algorithm called ant-miner (I),which is based on an improvement of ant colony system (ACS) algorithm. Experimental results show that ant-miner (I) has a higher predictive accuracy and much smaller rule list than the original ant-miner algorithm.
The subject of this work is to establish a mathematical framework that provides the basis and tool for synthesis and evaluation analysis in decision making, especially from the logic point of view. This paper focuses ...
详细信息
The subject of this work is to establish a mathematical framework that provides the basis and tool for synthesis and evaluation analysis in decision making, especially from the logic point of view. This paper focuses on a flexible and realistic approach, i.e., the use of linguistic assessment in decision making, specially, the symbolic approach acts by direct computation on linguistic values. A lattice-valued linguistic algebra model, which is based on a logical algebraic structure, i.e., lattice implication algebra, is applied to represent imprecise information and deal with both comparable and incomparable linguistic values (i.e., non-ordered linguistic values). Within this framework, some known weighted aggregation functions are analyzed and extended to deal with these kinds of lattice-value linguistic information.
Simulation, e.g., in the field of computational fluid dynamics, accounts for a major part of the computing time on highperformance systems. Many simulation packages still rely on Gauss–Seidel iteration, either as the...
The purpose of this paper is to develop a numerical algorithm to track the preheat interface motion driven by radiation transfer in high-intensity laser experiments. Our front-tracking algorithm is coupled to a radiat...
详细信息
A dynamic multi-secrets sharing threshold scheme is presented to apply to a large scale electronic voting system with many talliers (tallying authorities). Even if there exists adaptive adversaries, this scheme can gu...
详细信息
A dynamic multi-secrets sharing threshold scheme is presented to apply to a large scale electronic voting system with many talliers (tallying authorities). Even if there exists adaptive adversaries, this scheme can guard the ballot's producing, encrypting, transmitting, decrypting and final tallying in spite of the adversaries's attack, so the scheme guarantees robustness. In this paper, the verifiability of the voters' qualification and talliers' identification will be solved by a dynamic multi-secret sharing scheme without invoking more zero knowledge proof to maintain privacy, universal verifiability, and anonymity of ballots. It holds more communication efficiency and more security than the proposed schemes in early time.
Priority dropping mechanism (PDM) to random early detection (RED) algorithm to protect the video layers selectivity from performance and throughput deterioration was applied. A receiver oriented multicast congestion c...
详细信息
Priority dropping mechanism (PDM) to random early detection (RED) algorithm to protect the video layers selectivity from performance and throughput deterioration was applied. A receiver oriented multicast congestion control algorithm SPLIT was introduced. A packet classification scheme (PCS) implemented in SPLIT makes all lost packets concentrated in video layers of lower priority. It was shown that with varying queue length packet loss in the Base high layer less when compared to the remaining enhancement high layers.
A study on layered video multicast algorithm, one of the most important Internet application is discussed. A challenging problem for video multicast is heterogeneity and scalability of the Internet. The availability t...
详细信息
A study on layered video multicast algorithm, one of the most important Internet application is discussed. A challenging problem for video multicast is heterogeneity and scalability of the Internet. The availability to transmit live video, such as video conferencing and telecommuting, is expected to open up new opportunities for multicast video. Since network conditions are dynamic and there is no quality of service guarantee in the current Internet technology, bandwidth adaptation becomes very essential for video distribution over the Internet. Various solutions are also proposed to improve the QoS in IP-based networks.
The use of computational-intelligence-based techniques in the optimization of agent initial positions in land combat simulations is studied. A novel method for the reduction of support vectors in the support vector ma...
详细信息
The use of computational-intelligence-based techniques in the optimization of agent initial positions in land combat simulations is studied. A novel method for the reduction of support vectors in the support vector machine (SVM) is presented. The optimization on the width of the Gaussian kernel function and the combination of the SVM with the radial basis function neural network are performed in the proposed method. Simulation results show that the proposed method can improve the running efficiency drastically compared with that using the traditional SVM with the same precision. We also summarize and present some experiences and trends in the study on the optimization problem in land combat simulation.
暂无评论