A multi-cluster tool is composed of a number of single-cluster tools linked by buffering modules. The capacity of a buffering module can be one or two. Aiming at finding an optimal one-wafer cyclic schedule, this work...
详细信息
A multi-cluster tool is composed of a number of single-cluster tools linked by buffering modules. The capacity of a buffering module can be one or two. Aiming at finding an optimal one-wafer cyclic schedule, this work explores the effect of two-space buffering modules on the performance of a multi-cluster tool. The tool is modeled by a kind of Petri nets. The dynamic behavior of robot waiting and tasks, process modules, and buffers is well captured by the net model. With the model, this work shows that there is always a one-wafer cyclic schedule that reaches the lower bound of the cycle time of a process-dominant tool. Furthermore, a constant-time algorithm is revealed to find such a schedule for the first time for such multi-cluster tools. An illustrative example is given to show the application and power of this new method.
The real-time traffic parameters are necessary to dynamic traffic light control at intersection due to the serious traffic congestion. In this paper, we describe an approach for the real-time vehicle queue length meas...
详细信息
Supervisory control reconfiguration has been paid more attention due to its capacity of handling the uncertainties including resource failures, capability degradation, and task changes in discrete event systems. Howev...
详细信息
This paper proposes a method of the fault detection and diagnosis for the railway turnout based on the current curve of switch machine. Exact curve matching fault detection method and SVM-based fault diagnosis method ...
详细信息
The Locality-weight fuzzy c-means clustering method has been presented *** this approach can improve the clustering accuracies,it often gains the unstable clustering results because some random samples are employed fo...
详细信息
ISBN:
(纸本)9781467349970
The Locality-weight fuzzy c-means clustering method has been presented *** this approach can improve the clustering accuracies,it often gains the unstable clustering results because some random samples are employed for the initial *** this paper,an initialization method based on the core clusters is used for the locality-weight fuzzy c-means *** core clusters can be formed by constructing the σ-neighborhood graph and their centers are regarded as the initial centers of the locality-weight fuzzy c-means *** investigate the effectiveness of our approach,several experiments are done on three *** results show that our proposed method can improve the clustering performance compared to the previous locality-weight fuzzy c-means clustering.
Cough Recognition is a valuable classification problem in healthcare. Generally, feature representation contributes a lot to the overall classifying performance. In this paper, a novel feature extraction method, Gamma...
详细信息
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to acc...
Since wireless sensor networks (WSN) are often deployed in an unattended environment and sensor nodes are equipped with limited computing power modules, user authentication is a critical issue when a user wants to access data from sensor nodes. Recently, M.L. Das proposed a two-factor user authentication scheme in WSN and claimed that his scheme is secure against different kinds of attack. Later, Khan and Alghathbar (K-A) pointed out that Das’ scheme has some security pitfalls and showed several improvements to overcome these weaknesses. However, we demonstrate that in the K-A-scheme, there is no provision of non-repudiation, it is susceptible to the attack due to a lost smart card, and mutual authentication between the user and the GW-node does not attained. Moreover, the GW-node cannot prove that the first message comes from the user. To overcome these security weaknesses of the K-A-scheme, we propose security patches and prove our scheme.
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role ...
详细信息
Considering characteristic of mHealth communication and problems of existing methods, this paper presents a real-time communication method for mHealth based on extended XMPP protocol. The method can maintain the role status efficiently and reduce data latency during the communication process. Meanwhile, it can be extended flexibly to meet increasing communication demands of mHealth services. Furthermore, a system framework is presented to support telemonitoring scene. Finally, system implementation and feasibility tests verify the effectiveness of the method and framework.
In the initialization of the traditional semi-supervised k-means, the mean of some labeled data belonging to one same class was regarded as one initial center and the number of the initial centers is equal to the numb...
详细信息
暂无评论