In this paper, we will investigate the energy efficient power loading problem in multipleinput multiple-output singular value decomposition (MIMO-SVD) architecture. Most existing power loading schemes are developed on...
详细信息
The ribonucleic acid (RNA) secondary structure prediction has designed to characterize the ensemble of structures, instead of only computing the minimum free energy structure. Clustering methods are brought to aid in ...
详细信息
Range estimation with multifrequency phases is a common practice in localization *** challenge of this method is the phase *** Chinese remainder theorem(CRT)based phase unwrapping algorithms have been proposed to solv...
详细信息
Range estimation with multifrequency phases is a common practice in localization *** challenge of this method is the phase *** Chinese remainder theorem(CRT)based phase unwrapping algorithms have been proposed to solve the problem,where the wavelengths of the multifrequency signals need to be pair-wisely co-prime after they are divided by their greatest common divisor(gcd).This condition may limit the application in *** this paper,a novel way based on a dual-band robust CRT is presented to reconstruct the distance from dual-band wrapped phases,where the pair-wisely co-prime condition is not necessarily *** more wrapped phases are involved to reconstruct the distance,the method can significantly enlarge the reconstruction range compared to the single band solution.
In this study, we address the problem of multi-person detection and tracking in challenging scenes using sparse stereo information. In each frame, only a sparse set of object feature points are extracted. All these fe...
详细信息
How to embed more secret message into web page with keeping good imperceptibility simultaneously is a trade-off problem for information hiding schemes. This paper presents a novel web page information hiding method ba...
详细信息
There not only exists the relation of the functional dependency and multi-valued dependency in XML data constraint,but also exists the relation of data dependency obtained only from a certain existing relationship ins...
详细信息
ISBN:
(纸本)9781138026445
There not only exists the relation of the functional dependency and multi-valued dependency in XML data constraint,but also exists the relation of data dependency obtained only from a certain existing relationship instance that is *** reducing data redundancy,in this paper,the concepts of XML functional dependency and XML multi-valued dependency based on the path expression in the Document Type Definition are *** then the inference rules on the condition of the coexistence of functional dependency and multi-valued dependency in XML are ***,the validity and completeness of the inference rules are *** above-mentioned fundamentally solves the problems of implication of functional dependency and multi-valued dependency in XML data,laying a theoretical foundation for XML database design.
The inuence maximization problem is defined as providing a given initial integer k, mining top-k inuential nodes from a social network such that the spread of inuence in the network is maximized. Some existing studies...
详细信息
The inuence maximization problem is defined as providing a given initial integer k, mining top-k inuential nodes from a social network such that the spread of inuence in the network is maximized. Some existing studies are based on Greedy algorithm, but their time complexity is very high. In this paper, a different method based on Genetic Algorithms, denoted as MAGA is proposed. In the MAGA algorithm, the set of k nodes is seen as a candidate solution, and the expected inuence value as fitness. Use the genetic algorithm to get the optimal solution. Experiments show that the algorithm achieved a balance in inuence spread and running time.
In this paper, we propose a method based on the Weber number to uniformly model and simulate the foam and sprays generated by the fluid motion. We use the SPH to construct the fluid and calculate the Weber number of e...
详细信息
Recommendation algorithm is a kind of method in information filtering and has been widely applied on Internet. Collaborative filtering is widely used in the recommendation systems and has turned out to be successful. ...
详细信息
With widely adoption of online services, malicious web sites have become a malignant tumor of the Internet. Through system vulnerabilities, attackers can upload malicious files (which are also called webshells) to web...
详细信息
暂无评论