This paper makes a study on content-based image retrieval algorithm for document image database. Given a query image the system returns overall similar images in database. For document images, we propose the algorithm...
详细信息
Because of the confidential and important information contained inside the local area network (LAN) of the companies or government departments, the network interior's security problem highlights gradually. On the ...
详细信息
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then...
详细信息
In a collaborative design, especially in an internet-based collaboration, the implement of real-time collaboration is difficult to achieve as a result of many factors such as network bandwidth constraints. HSF files p...
详细信息
To solve the issue that traditional web visit statistical method in hits as the standard expresses the web visit amount inaccurately, both of the existing methods are analyzed, an improved visit statistical method is ...
详细信息
A method to determine (Cγ), the hyper-parameters, range for Radial Basis Function Support Vector Machines (RBF SVMs) is proposed. The γ range is determined by the extreme Squared Euclidean Distance (SED) quantiles o...
详细信息
Application of multi-objective optimization method, the issue of portfolio risk is analyzed and simulated and the feasibility of the scheme is validated under the uncertain investment environment. Proposed the use of ...
详细信息
Application of multi-objective optimization method, the issue of portfolio risk is analyzed and simulated and the feasibility of the scheme is validated under the uncertain investment environment. Proposed the use of multi-objective optimization genetic algorithm portfolio risk measurement methods, this work educe the estimation Model of Risk-Minimization for Portfolio Investment Using such as Benefits and risks as Target, then gives a specific evolutionary algorithm, and finally, a simulation example.
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then...
详细信息
Security has become an important issue in Web Services application, which has been widely concerned. This paper introduces several security policy models that widely applied and analyzes the basic principles. And then a simple comparison was made for the scope and merits of these models, finally this paper points out the Web Services security research.
This paper is concerned with the problem of how to share distributed resources. Based on a distributed resource sharing application in schools, an HRRP(k) network is proposed and its properties studied. It is proven t...
详细信息
This paper is concerned with the problem of how to share distributed resources. Based on a distributed resource sharing application in schools, an HRRP(k) network is proposed and its properties studied. It is proven that the HRRP(k) network has better performance than a 2-D mesh in group communication. Then, to improve the quality of service (QoS) of the education resource sharing network, several key strategies are proposed, including the strategy for a node to join or leave the system, the strategy for searching for resources, and the strategy for setting up connections between nodes. To realize local and global resource retrieval, several algorithms based on the HRRP(k) network are proposed. Finally, the advantages of the HRRP(k) network and the effectiveness of proposed strategies are established by theoretical analysis and comparison. Based on these findings, a prototype of a resource sharing application is proposed, which shows the HRRP(k) network has a better performance than alternative network architectures.
暂无评论