Granular computing which imitates the manner of human thinking is the foundation of artificial intelligence. This paper discusses some operations of granules including quotient intersection, quotient union, quotient c...
详细信息
ISBN:
(纸本)9781615676583
Granular computing which imitates the manner of human thinking is the foundation of artificial intelligence. This paper discusses some operations of granules including quotient intersection, quotient union, quotient complement and quotient difference. Then defines a knowledge space and presents it by a group of basis. Besides we introduce granule spaces and their main properties.
In this paper, we investigate the problem of increasing the threshold value of the Shamirpsilas (t, n)-threshold scheme without the dealerpsilas helps, and present a new secret sharing scheme with the threshold value ...
详细信息
In this paper, we investigate the problem of increasing the threshold value of the Shamirpsilas (t, n)-threshold scheme without the dealerpsilas helps, and present a new secret sharing scheme with the threshold value increasing. In this scheme, the dealer needs not to pre-compute or publish any information in advance, all participants cooperate to take on the dealerpsilas role and to complete the share renewing, and each participant only stores one share as the same size of the secret. The results of analysis show that the proposed scheme is secure, and it is perfect and ideal.
Finding a good similarity algorithm for the use on ontology is important to some techniques such as semantic retrieval, data mining, ontology translations etc. Similarity computation has special characters when applie...
详细信息
Finding a good similarity algorithm for the use on ontology is important to some techniques such as semantic retrieval, data mining, ontology translations etc. Similarity computation has special characters when applied in different domains. However after we learned most of the similarity measures based on ontology, we found that most researchers did not deal with these characters. In this paper we work at the similarity computation based on ontology applied in semantic retrieval. We analyze the characters about this application and problems to be improved, and then we propose an improved semantic similarity computation model. At last, we demonstrate the improvement of this model through experiments.
Identifying protein-protein interaction sites have important connotations ranging from rational drug design to analysis metabolic and signal transduction networks. In this paper, we presented an adapted Bayesian class...
详细信息
Due to a great many redundancy symbols, most of the existing differential space-time-frequency (DSTF) coding schemes suffer very low transmission rates. To overcome the disadvantage and obviously enhance the total tra...
详细信息
Due to a great many redundancy symbols, most of the existing differential space-time-frequency (DSTF) coding schemes suffer very low transmission rates. To overcome the disadvantage and obviously enhance the total transmission rate in a differential multiple-input-multiple-output (MIMO) orthogonal-frequency-division-multiplexing (OFDM) system, a rate embedded doubly directional DSTF coding scheme is proposed for doubly selective fading channels in this paper. High rate differentially coded matrices are embedded into proper time blocks and sub-carriers. In the frequency domain, both high rate non-unitary message matrices and low rate unitary message matrices are differentially transmitted alternately. In the time domain, all message matrices have full rates. Simulation results verify that, compared with those conventional DSTF coding schemes, the proposed scheme can achieve better error performances with higher transmission rates.
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the gro...
详细信息
This paper proposed a threshold RSA signature with traceable signers. In such scheme, there is a trusted center (TC), which generates all system parameters, the secret keys and the corresponding public keys of the group and all members, and exists a designated clerk, which creates a warrant recording the identities of the signers and other import information. Any t members can collaboratively generate the group signature with the help of the clerk, who verifies the validity of the partial signatures and combines them to the group signature. Any one can verify the correctness of the group signature by the public information and trace out to find the identities of the signers by the warrant.
The transport-of-intensity equation describes the internal relationship between the intensity and phase distribution while wave is propagating in the mobile space. So the phase distribution can be solved by the use of...
详细信息
ISBN:
(纸本)9781424452378
The transport-of-intensity equation describes the internal relationship between the intensity and phase distribution while wave is propagating in the mobile space. So the phase distribution can be solved by the use of the equation. It is an important measurement of non-interferometry. A new phase retrieval based on transport-of-intensity equation is presented. This method has the advantage of measuring only the close-up space on the plane of the intensity of light to the reconstruction of phase space. The problem of phase retrieval is translated into minimum of energy functional with linear convolution and total variation regularization. The one and two dimension experiment results show the correctness and validity of the algorithm.
The rapid development of the Web technology makes the Web mining become the focus of the current data mining, and the XML technology also becomes the standard of the data exchange on the Web. The paper introduces the ...
详细信息
ISBN:
(纸本)9781424454112
The rapid development of the Web technology makes the Web mining become the focus of the current data mining, and the XML technology also becomes the standard of the data exchange on the Web. The paper introduces the Web mining technology, implements a frame of the Web mining based on the XML technology according to the advantage of XML in the data description, describes the implementation process of specific Web mining, and puts forward a promoting scheme on solving XML documents with VTD which solves the difficult mining problem on the Web caused by the most of the non-structure information.
EOG is a very effective eye movement recording method, which is not only noninvasive, but also can record any eye movements' information. In order to extract some features come form these information contained in ...
详细信息
EOG is a very effective eye movement recording method, which is not only noninvasive, but also can record any eye movements' information. In order to extract some features come form these information contained in EOG automatically, this paper presents a novel EOG feature parameters extraction algorithm. The proposed algorithm includes three main parts. The first is endpoint detection unit which detects the startpoint and endpoint of EOG signals. The second is a preprocessor which consists of band-pass filter, frame blocking procedure and windowing step. The third is feature parameters extracting part which extracts EOG feature by a linear predictive coding model and converts LPC parameters to LPC cepstral (LPCC) coefficients. Finally, the paper gives experimental results.
To improve the accuracy and efficiency for solving the EFIE (electric field integral equation) by the method of moment, a novel scheme is put forward to improve the calculation precision based on the EFIE. Firstly, th...
详细信息
To improve the accuracy and efficiency for solving the EFIE (electric field integral equation) by the method of moment, a novel scheme is put forward to improve the calculation precision based on the EFIE. Firstly, the inaccurate induced current is obtained by solving the EFIE under coarse mesh grids. Secondly, the scattered magnetic field at any given point on the surface of the object is calculated by the inaccurate induced current. Finally, the accurate induced current at any given point is determined through total magnetic field. The proposed approach is applied to the case of infinitely perfectly electric conducting circular cylinder and square cylinder. The numerical results are presented to demonstrate the high precision and efficiency when the size of mesh grid is large.
暂无评论