This paper proposes one kind nonlinear sequence node coverage optimization algorithm based on the mobile strategy, which establishes the sensor node and the target node mapping relation *** uses geometric graphic in t...
详细信息
ISBN:
(纸本)9781467315241
This paper proposes one kind nonlinear sequence node coverage optimization algorithm based on the mobile strategy, which establishes the sensor node and the target node mapping relation *** uses geometric graphic in the square makes target nodes planning to the inner square region, through to the mobile node scheduling strategy for the entire coverage region for effective coverage, achieving the goal node complete coverage of the *** algorithm uses probability expectation values are obtained to meet under the conditions with minimal sensor nodes, and gives the optimal coverage and connectivity probability models and *** experimental results show that the algorithm can not only use nodes complete the effective target region to be covered, and in reducing the network energy consumption is also greatly improved, simultaneously reduces the network source configuration and improves the network life cycle.
In this paper, we propose an efficient projection-based algorithm to discover high sequential utility patterns from quantitative sequence databases. An effective pruning strategy in the proposed algorithm is designed ...
详细信息
In this paper, we propose an efficient projection-based algorithm to discover high sequential utility patterns from quantitative sequence databases. An effective pruning strategy in the proposed algorithm is designed to tighten upper-bounds for subsequences in mining. By using the strategy, a large number of unpromising subsequences could be pruned to improve execution efficiency. Finally, the experimental results on synthetic datasets show the proposed algorithm outperforms the previously proposed algorithm under different parameter settings.
BTT(Bank-to-Turn) vehicle is a kind of typical nonlinear system which has parametric uncertainty and heavy exogenous *** paper presents a partial linearization method use of robust guaranteed cost control techniques f...
详细信息
ISBN:
(纸本)9781467315241
BTT(Bank-to-Turn) vehicle is a kind of typical nonlinear system which has parametric uncertainty and heavy exogenous *** paper presents a partial linearization method use of robust guaranteed cost control techniques for the design and analysis of BTT vehicle control laws to make the model closer to the actual *** the practical model of BTT vehicle, we employed partial linearization rather than complete linearization in system modeling, in order to prevent the system errors caused by low accuracy in complete *** the circumstance of satisfying Lipschitz conditions, Lyapunov function was employed to get the sufficient condition for the robust control law of the BTT vehicle system to exist, and transformed into a feasible solution with linear matrix inequalities *** numerical simulation results show the algorithm can makes up the characteristic distortion of nonlinear system for excessive simplification model, so that the designed control law becomes more reasonable and effective.
A lymph node (LN), which can resist virus and germs, is part of the lymphatic system that exists in the human body and every apparatus inside it. There are many kinds of pathological changes in LN. Metastatic is one o...
详细信息
A lymph node (LN), which can resist virus and germs, is part of the lymphatic system that exists in the human body and every apparatus inside it. There are many kinds of pathological changes in LN. Metastatic is one of the important indexes to estimate the stage of malignant tumors. One convenient tool to observe LN is the use olf ultrasonic images. Clinical physicians judge a nosology by biopsy and experience. Shortcoming of the method is that it requires lots of precious time of clinical physicians. In this paper, we propose a method that classifies lymph node with different pathological changes in ultrasonic images. Features are extracted and selected from ultrasonic images. A feature selection method, which integrates the particle swarm optimization neural network (PSONN) with Boltzmann probabilistic, is proposed. Then, a support vector machine (SVM) is adopted for Lymph node classification. Experimental results show that the proposed approach decreases the number of the selected features and achieves a high accuracy in classification.
Modern micro-architectures employ superscalar techniques to enhance system performance. The superscalar microprocessors must fetch at least one instruction cache line at a time to support high issue rate and large amo...
详细信息
ISBN:
(纸本)0769509541
Modern micro-architectures employ superscalar techniques to enhance system performance. The superscalar microprocessors must fetch at least one instruction cache line at a time to support high issue rate and large amount speculative executions. In this paper, we propose the Grouped Branch Prediction (GBP) that can recognize and predict multiple branches in the same instruction cache line for a wide-issue micro-architecture. Several configurations of the GBP with different group sizes are simulated. The simulation results show that the branch penalty of the group size 4 with 2048-entry is under 0.65 clock cycle. In our design, we choose the two-group scheme with group size 4. This feature achieves an average of 4.9 IPC f (the number of instructions fetched per cycle for a machine front-end). Furthermore, we extend the GBP to achieve two cache lines predictions with two fetch units. The scheme of the 2048-entry 2-group with group size 4 can produce an average of 8.4 IPC f. The performance is approximately 66.5% better than the original 2-group GBPs. The added hardware cost (41.5 k bits) is less than 40%.
The paper studies two methods for detecting and removing channel error patterns in images transmitted by two-dimensional differential-pulse-code-modulation (2-D DPCM) with fixed-length words. The methods are based on ...
详细信息
The paper studies two methods for detecting and removing channel error patterns in images transmitted by two-dimensional differential-pulse-code-modulation (2-D DPCM) with fixed-length words. The methods are based on statistical classification and filtering procedures. For the predictions A + (C - B)/2 and A + (D - B)/2 in combination with 4-b DPCM, it is demonstrated experimentally by computer simulation that the effect of channel errors can effectively be reduced at bit-error rates (BER's) up to approximately 0.1%.
A GMH (generalized Merkle-Hellman) cryptosystem is presented, and two theorems are proved to ensure its correctness. The GMH cryptosystem is very suitable for those application domains in which data protection is need...
详细信息
A GMH (generalized Merkle-Hellman) cryptosystem is presented, and two theorems are proved to ensure its correctness. The GMH cryptosystem is very suitable for those application domains in which data protection is needed. The authors apply the GMH cryptosystem to access control and obtain a new single-key access control scheme. The data security achieved by the new scheme is very good, and thus it can make the information protection system more reliable. It is shown that, when data security is the most important factor in designing an information protection system, this scheme is the best choice.< >
暂无评论