Rough set theory, proposed by Pawlak, has been proved to be a mathematical tool to deal with vagueness and uncertainty in intelligent information processing. In this paper, we propose the concept of knowledge granulat...
详细信息
Neural networks have received much attention in the extraction of fetal electrocardiogram signal in recent years. This paper provides a new method to extract the fetal electrocardiogram signal which uses wavelet denoi...
详细信息
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network servi...
详细信息
The existing service migration methods bring the server cluster heavy burden, and their time spending is so high that seriously affects the service continuity. In order to enhance the survivability of IP network services, the paper puts forward an intent-perceptible service migration model (ISM). In this model, we design a novel trigger mechanism and object selecting method for service migration, and make the service migration intention perceptible for the client with the cooperation of the server. The evaluation results show that ISM model can not only ensure the service invulnerability by maintaining a high randomness of service migration, but also improve the service continuity by reducing the service gap time spending on service migration to the maximum extent. Therefore, ISM model can enhance IP network survivability efficiently.
Combining the universal law of emergency, the important concepts and conceptual relations were obtained through a variety of knowledge acquisition methods, and the emergency domain ontology modeling was studied and co...
详细信息
Combining the universal law of emergency, the important concepts and conceptual relations were obtained through a variety of knowledge acquisition methods, and the emergency domain ontology modeling was studied and completed with the ontology modeling tool Protégé. The results show that the model established describes the semantic relations between knowledge points;the logic between the relations of concepts is strict, support semantic logical reasoning, and has a strong scalab.lity.
A personalized tourism intelligent semantic retrieval system based on domain ontology was studied and designed, and the system general framework and implementation of system functions were given. The domain ontology t...
详细信息
A personalized tourism intelligent semantic retrieval system based on domain ontology was studied and designed, and the system general framework and implementation of system functions were given. The domain ontology technology was applied to realize the modeling of tourism domain knowledge, the domain knowledge base was established, and the technologies of query expansion and semantic reasoning to the information searching process based on ontology were also applied in the system. Furthermore, User's interest model was established according to the tourists' browsing behavior and personal preferences. The results show that the information retrieval on the level of semantic based on domain ontology knowledge base owns better semantic reasoning ability than that of the traditional search engine.
Two major aspects of evolution law in emergencies were studied. One is the lifecycle phase;the other is the sequential relationship between sub events. The ontological knowledge model of incidents was established for ...
详细信息
Two major aspects of evolution law in emergencies were studied. One is the lifecycle phase;the other is the sequential relationship between sub events. The ontological knowledge model of incidents was established for description of the evolution performance, providing a serious of clearly defined specifications for domain information in the form of formal concept. Then, a framework model for the feature extraction of events was established using domain knowledge, and relevant information of unexpected events on the internet was clustered in topics. An evaluation algorithm was presented for the heat of topics, which was based on an overall analysis of theme relevance and coverage frequency. Experiments show that this method is suitable for social security incidents, which can estimate the heat of topics within the specific time slice accurately, and the structure of event chains in a straight-chain and divergent way is found among sub events.
This paper presents a novel particle swarm optimiser (PSO) called PSO with simple and efficient neighbourhood search strategies (NSPSO), which employs one local and two global neighbourhood search strategies. By this ...
详细信息
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping st...
详细信息
An adaptive strategy was proposed for EH system. Modules of attack detection, feedback transmission and adaptive control were added to original EH system. They could help to make threats analysis and adjust hopping strategy in real time, so as to reduce the probability of the system stepping into the attackers' target area. With the experiments proving the anti-attack ability of the prototype system, the feasibility and effectiveness of adaptive strategy were demonstrated for EH system.
Implicit exceptions in service-oriented applications will result in uncertainty of system, incorrect business data, unexpected error pages, or even uncovered disaster situations. This paper proposes a context-based ap...
详细信息
Matrix multiplication is one of the most common and vital numerical operations in the field of scientific computing, which is the kernel routine of Level 3 BLAS. The STI CELL processor is a heterogeneous multiprocesso...
详细信息
暂无评论