Peak search for three-dimensional rotation electron diffraction image is almost the most important step in crystal structure determination. The difference of Gaussian method is the traditional approach for this task w...
详细信息
ISBN:
(纸本)9781509055227
Peak search for three-dimensional rotation electron diffraction image is almost the most important step in crystal structure determination. The difference of Gaussian method is the traditional approach for this task with the disadvantage that values of three tunable parameters need to be determined by users. To address this drawback, this paper presents a local gradient based peak search algorithm that needs only one tunable parameter. Experiments show that our proposed method is as effective as the difference of Gaussian method in peak detection task, but has obvious advantages in speed and convenience.
With the aim of resolving the issue of cluster analysis more precisely and validly, a new approach was proposed based on biogeography-based optimization (abbreviated as BBO) algorithm. (Method) First, we reformulated ...
详细信息
With the rapid development of information technology,semantic web data present features of massiveness and complexity. As the data-centric science, social computing have great influence in collecting and analyzing sem...
详细信息
With the rapid development of information technology,semantic web data present features of massiveness and complexity. As the data-centric science, social computing have great influence in collecting and analyzing semantic data. In our contribution, we propose an integrity constraint validation for DL-Lite R based ontology in view of data correctness issue in the progress of social computing ***, at the basis of translations from integrity constraint axioms into a set of conjunctive queries, integrity constraint validation is converted into the conjunctive query answering over knowledge bases. Moreover, rewriting rules are used for reformulating the integrity constraint axioms using standard axioms. On this account, the integrity constraint validation can be reduced to the query evaluation over the ABox, and use query mechanisms in database management systems to optimize integrity constraint validation. Finally, the experimental result shows that the rewritingbased method greatly improves the efficiency of integrity constraint validation and is more appropriate to scalable data in the semantic web.
In this paper,the authors first apply the Fitzpatrick algorithm to multivariate vectorvalued osculatory rational *** based on the Fitzpatrick algorithm and the properties of an Hermite interpolation basis,the authors ...
详细信息
In this paper,the authors first apply the Fitzpatrick algorithm to multivariate vectorvalued osculatory rational *** based on the Fitzpatrick algorithm and the properties of an Hermite interpolation basis,the authors present a Fitzpatrick-Neville-type algorithm for multivariate vector-valued osculatory rational *** may be used to compute the values of multivariate vector-valued osculatory rational interpolants at some points directly without computing the interpolation function explicitly.
When several actions preformed at the same time, or performed concurrently, the possibility of multiple concurrent and mutually interacting make the planning solving process difficult. In this paper, we reform the fra...
详细信息
Group key management plays an important role in ensuring the safety and reliability of the VANET(vehicular ad-hoc network) over the channelThrough considering the characteristics of VANET communication and topology, a...
详细信息
ISBN:
(纸本)9781510828087
Group key management plays an important role in ensuring the safety and reliability of the VANET(vehicular ad-hoc network) over the channelThrough considering the characteristics of VANET communication and topology, a VANET group key management scheme is proposed based on random transmission which is combined with the construction of polynomial and key updating by Hash chainThe scheme achieves the random transmission function of group key and the node revocation capabilityMoreover, it can ensure the forward and backward and other security attributes of the group keyThe results show that the proposed scheme has less communication complexity and better communication performance, also it can suitable for large scale VANET group.
A minimum cover set coverage algorithm(MCSCA) for pursuing low energy is presented in this paper to prolong the lifetime of wireless sensor networks. The proposed algorithm improves energy efficiency in three aspect...
A minimum cover set coverage algorithm(MCSCA) for pursuing low energy is presented in this paper to prolong the lifetime of wireless sensor networks. The proposed algorithm improves energy efficiency in three aspects. First, when generating cover sets, the selection strategy of the algorithm considers the contributions of sensor nodes, energy variance, and other factors. The algorithm can cover all targets with a few sensor nodes. Second, useless coverage optimization reduces coverage areas without target nodes to save energy. Third, redundant coverage optimization further saves energy by reducing redundant coverage in wireless sensor networks. Compared with similar heuristic algorithms, the proposed MCSCA can extend network lifetime by 11% on average.
Joint mechanism is a key factor for a snake robot adjusting its postures adapted to clutter environments in search and rescue *** joint mechanisms in prior research simply consist of serially connected revolute joints...
详细信息
ISBN:
(纸本)9781509009107
Joint mechanism is a key factor for a snake robot adjusting its postures adapted to clutter environments in search and rescue *** joint mechanisms in prior research simply consist of serially connected revolute joints,which are lack of great load carrying *** nature snake structure,a modular bionic parallel joint mechanism(BPJM) is proposed for the rescue snake *** analysis of the BPJM is necessary for its optimal design and control,providing the force and constraint that must be resisted by joints,links and *** reduce the dynamics computation load,Newton equation and Euler equation are combined by synchronizing the inertial force and inertial moment with the aid of screw ***,the dynamics equations for moving platform and links are formulated in a simplified *** friction at the joints and external force acting on BPJM,which actually affect the motion,are both considered in the ***,the virtual prototype is provided in order to visualize the joint mechanism and the numerical results from the dynamics analysis are given.
Attribute selection is an effective approach to improve the inference efficiency of data-based schedulingstrategies system and many researchers have studied the attribute selection based on computational intelligence ...
详细信息
Attribute selection is an effective approach to improve the inference efficiency of data-based schedulingstrategies system and many researchers have studied the attribute selection based on computational intelligence *** computational intelligence methods,concept lattice,an important tool for knowledge extraction andanalysis,has nature advantages in attribute
Trust, as a major part of human interactions, plays an important role in helping users collect reliable infor-mation and make decisions. However, in reality, user-specified trust relations are often very sparse and fo...
详细信息
Trust, as a major part of human interactions, plays an important role in helping users collect reliable infor-mation and make decisions. However, in reality, user-specified trust relations are often very sparse and follow a power law distribution; hence inferring unknown trust relations attracts increasing attention in recent years. Social theories are frameworks of empirical evidence used to study and interpret social phenomena from a sociological perspective, while social networks reflect the correlations of users in real world; hence, making the principle, rules, ideas and methods of social theories into the analysis of social networks brings new opportunities for trust prediction. In this paper, we investigate how to exploit homophily and social status in trust prediction by modeling social theories. We first give several methods to compute homophily coe?cient and status coe?cient, then provide a principled way to model trust prediction mathe-matically, and propose a novel framework, hsTrust, which incorporates homophily theory and status theory. Experimental results on real-world datasets demonstrate the effectiveness of the proposed framework. Further experiments are conducted to understand the importance of homophily theory and status theory in trust prediction.
暂无评论