A behavioral strategy designed for a humanoid robot for the purpose of obstacle avoidance based on four ultrasonic sensors for the learning behavior and performance is proposed and implemented with an autonomous human...
详细信息
Emerging applications in vehicle ad hoc networks (VANETs) not only open tremendous business opportunities and navigation benefits, they also pose formidable research challenges in security provisioning. A critical sec...
详细信息
The knowledge of text patterns in a domainspecific corpus is valuable in many natural language processing (NLP) applications such as information extraction, question-answering system, and etc. In this paper, we propos...
详细信息
The knowledge of text patterns in a domainspecific corpus is valuable in many natural language processing (NLP) applications such as information extraction, question-answering system, and etc. In this paper, we propose a simple but effective probabilistic language model for modeling the indecomposability of text patterns. Under the minimum description length (MDL) principle, an efficient unsupervised learning algorithm is implemented and the experiment on an English critical writing corpus has shown promising coverage of patterns compared with human summary.
SimRank is a well known algorithm which conducts link analysis to measure similarity between each pair of nodes (nodepair). But it suffers from high computational cost, limiting its usage in large-scale datasets. More...
详细信息
SimRank is a well known algorithm which conducts link analysis to measure similarity between each pair of nodes (nodepair). But it suffers from high computational cost, limiting its usage in large-scale datasets. Moreover, Links between nodes are changing over time. It may be desirable to quickly approximate the similarity score between certain nodepair without performing a large-scale computation on the entire graph. In our approach we propose a method to efficiently estimate the similarity score using only a small subgraph of the entire graph. We call this novel algorithm “Local-SimRank”. The experimental results conducted on real datasets and synthetic dataset show that our algorithm efficiently produces good approximations to the global SimRank scores. Meanwhile, we prove that the Local-SimRank score LS(a, b) is always less than original SimRank score S(a, b) mathematically.
Reversible data hiding has drawn considerable attention in recent years. In this paper, we used the tictactoemidlet predictions to achieve a histogram-based reversible data hiding. The histogram is created by exploiti...
详细信息
Reversible data hiding has drawn considerable attention in recent years. In this paper, we used the tictactoemidlet predictions to achieve a histogram-based reversible data hiding. The histogram is created by exploiting all difference values between pixels and their predictive values. Experimental results show that our methods are capable of providing a great embedding capacity without making noticeable distortion. In the one-level hiding, our methods remain image qualities larger than 48 dB and have the best capacity. Moreover, in the multilevel case our methods perform better than other existed methods. Our methods can successfully increase the embedding capacity from histogram-based data hiding and remain the image quality well.
In real-life scenario where users mostly know their destinations a priori, their movement is not purely random (as assumed in random walk model); rather it is somewhat direction-based and depends on the present locati...
详细信息
In real-life scenario where users mostly know their destinations a priori, their movement is not purely random (as assumed in random walk model); rather it is somewhat direction-based and depends on the present location and the final destination. For instance, an office goer often returns home in the evening (i.e., mobility is diurnal). While no existing research has studied direction-based diurnal mobility model which could be of immense importance to cellular operators, we formulate a Markov model for such movement and give a theoretical upper bound of cell boundary crossings (i.e., expected number of handoffs) by the user. We have theoretically calculated the number of handoffs based on our proposed mobility model and verified the result in a simulated environment. We find that a majority of inter-RNC/MSC handoffs [4] comes from only a few cells which should be made dual-homed by the operators for their cost reduction.
The purpose of this study is to build e-learning system for constructivist programming design course. Base on the e-learning system, researchers carried out experimental teaching and investigated how constructivist pr...
详细信息
The purpose of this study is to build e-learning system for constructivist programming design course. Base on the e-learning system, researchers carried out experimental teaching and investigated how constructivist programming design course influenced college students' performance. The results were shown as follows: (1) After eliminating the effects of the pretest, the achievement score of programming design of the collaborative web-based learning group (experimental group) was significantly higher than that of the traditional learning group (control group). (2) After eliminating the effects of the pretest, the attitude toward programming design of the experimental group was significantly positive than that of the control group.
In this paper, we propose an enhanced authentication scheme that aims at the detection of stego-image preventing the fake share offers from the share-holder. Inspired by the past one study of Wang et al. scheme, the s...
详细信息
In this paper, we propose an enhanced authentication scheme that aims at the detection of stego-image preventing the fake share offers from the share-holder. Inspired by the past one study of Wang et al. scheme, the secret reconstruction is not complete in the course of shadow stego-images upon the secret sharing systems. Besides, the PSNR evaluations to the embedded images are furthermore superior to the past studies upon our revised algorithms. In other words, the secret embedding and reconstruction is definitely fulfilled upon the secret sharing systems. The qualities of the stego-images also do meet the requirement of steganography in better fidelity upon human vision systems.
Combinatorial exchanges are double sided marketplaces with multiple sellers and multiple buyers trading with the help of combinatorial bids. The allocation and other associated problems in such exchanges are known to ...
详细信息
Combinatorial exchanges are double sided marketplaces with multiple sellers and multiple buyers trading with the help of combinatorial bids. The allocation and other associated problems in such exchanges are known to be among the hardest to solve among all economic mechanisms. In this paper, we develop computationally efficient iterative auction mechanisms for solving combinatorial exchanges. Our mechanisms satisfy Individual-rationality (IR) and budget-nonnegativity (BN) properties. We also show that our method is bounded and convergent. Our numerical experiments show that our algorithm produces good quality solutions and is computationally efficient.
In wireless and mobile communications, this progress provides opportunities for introducing new standards and improving existing services. Supporting multimedia traffic with wireless networksquality of service (QoS). ...
详细信息
In wireless and mobile communications, this progress provides opportunities for introducing new standards and improving existing services. Supporting multimedia traffic with wireless networksquality of service (QoS). In this paper, a grey-fuzzy controller for radio resource management (GF-RRM) is presented to maximize the number of the served calls and QoS provision in wireless networks. In a wireless network, the call arrival rate, the call duration and the communication overhead between the base stations and the control center are vague and uncertain. In this paper, we develop a method to predict the cell load and to solve the RRM problem based on the GF-RRM, and support the present facility has been built on the application-level of the wireless networks. The GF-RRM exhibits the better adaptability, fault-tolerant capability and performance than other algorithms. Through simulations, we evaluate the blocking rate, update overhead, and channel acquisition delay time of the proposed method. The results demonstrate our algorithm has the lower blocking rate, less updated overhead, and shorter channel acquisition delay.
暂无评论