How to make use of limited memory space and processing speeds of computer for rapid and accurate data mining has become an important research topic on the stream data cluster analysis. A stream data clustering algorit...
详细信息
How to make use of limited memory space and processing speeds of computer for rapid and accurate data mining has become an important research topic on the stream data cluster analysis. A stream data clustering algorithm based on the minimum spanning tree (MSTSC) is described. MSTSC is divided into online processing and offline clustering. Stream data are analyzed online by using two groups of processing unit respectively. In offline process clusters is taken as representative objects, and the minimum spanning tree algorithm is used in offline clustering. MSTSC can improve the clustering quality on non-spherical clusters. Some experiments are carried out in both real data sets and synthetic data sets. Results show that MSTSC algorithm not only can deal with non-spherical clusters effectively, but also has better efficiency and clustering quality. In addition, MSTSC is insensitive to order of input data, and has a good effect for skewed class distributions.
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher p...
详细信息
In this paper, group velocity dispersion (GVD) and second-order GVD effects are shortly discussed and then the limitations on the bit rate induced by dispersion or second-order GVD are estimated. For relative higher pulse energy and shorter pulse width in 40Gbit/s systems, self-phase modulation(SPM) is significant. The combined effect of GVD and SPM on the propagation pulses are analyzed through Nonlinear Schrödinger Equation(NLSE).
A novel scheme is developed to compute correctly the induced current based on the Electric field integral equation (EFIE) by the Method of moments (MOM) at resonant frequencies. As a First step, the inaccurate induced...
详细信息
A novel scheme is developed to compute correctly the induced current based on the Electric field integral equation (EFIE) by the Method of moments (MOM) at resonant frequencies. As a First step, the inaccurate induced current is obtained by solving the EFIE. Then, the scattered magnetic field due to the inaccurate induced current is calculated at any given point on the surface of the object. Finally, the accurate induced current at any given point is determined through the total magnetic field. The proposed approach is applied to the case of the infinitely Perfectly electric conducting (PEC) cylinder and PEC sphere to check its accuracy and efficiency. It is found that the numerical results match the analytical solution or the Combined field integral equation (CFIE) solution.
China is the largest food consumption country in the world. With the social and economic development, China's food security has become a global attention. Grain security research involves many uncertain factors: a...
详细信息
China is the largest food consumption country in the world. With the social and economic development, China's food security has become a global attention. Grain security research involves many uncertain factors: as well as quantitative and qualitative information. In order to get the grain security status comprehensively, we proposed a method to evaluate risk in grain security based on multifactor information fusion. In the method, the quantitative and qualitative information were used to construct the basic probability assignment, and the attribute weights was got based on the Analytic Hierarchy Process method. After that, the multifactor fusion results were got based on the Dempster combination rule. The effectiveness of the method was verified with a numeric example that the data comes from the yearbook of China in 2007. The Results show that the method is effective and can correctly reflect the grain safety warning degrees.
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, ...
ISBN:
(纸本)9781618399571
To meet the increasing capacity and mobility as well as decrease the costs in next-generation optical access networks, RoF technology is a promising technique in the emerging optical and wireless convergence network, mm-wave generation is a key technique to realize the convergence network. In this paper, existing optical mm-wave generation technologies are introduced, including direct modulation, optical heterodyning and external modulation. Associated with Shanghai University, a scheme based on Optical Frequency Multiplication employing a dual drive Mach-Zehnder Modulator (DD-MZM) is presented. The novel efficient technique does not require expensive high-frequency electrical equipment. Moreover, no optical filtering is used, which significantly reduces the cost.
A modified method of conventional D-S evidence combination rule was presented. The consensus index of evidence based on distance measures of evidence was introduced into modifying the BPAs of hypotheses with the evide...
详细信息
A modified method of conventional D-S evidence combination rule was presented. The consensus index of evidence based on distance measures of evidence was introduced into modifying the BPAs of hypotheses with the evidence sufficiency and evidence importance. By using the D-S combination and new decision rules, the different sets of BPAs for each hypothesis were calculated. A numerical example of the fault diagnosis is used to demonstrate the validity of the method by comparison with other methods.
Identification of protein-protein interaction is crucial for nearly all biological process. In this paper, we introduce a new transformation of protein sequence based on sequence order information. We use 5594 interac...
详细信息
The existing data sampling schemes can not update ROM serial numbers of DS18B20 automatically and locate DS18B20s accurately. For these reasons above, it is difficult to replace the faulty DS18B20s immediately. To sol...
详细信息
According to defocus imaging theory, the amount of blur in the defocus images varies with depth of the object in the scene. So depth in the scene can be recovered by estimating the blur with the knowledge of the lens ...
详细信息
A new backoff algorithm based on logarithmic function is presented by introducing the parameter which can change with the network state, in allusion to the problems of Binary Exponential Backoff algorithm of IEEE 802....
详细信息
暂无评论