We have studied the AC-4 algorithm and then present value ordering heuristic for solving algorithm BT-MSV which is based on the AC-4 algorithm. This algorithm takes full advantage of supported information which is rec...
详细信息
We propose a parallel MAX-MIN Ant System (MMAS) algorithm that is suitable for an implementation on graphics processing units (GPUs). Multi ant colonies with respective parameter settings are whole offloaded to the GP...
详细信息
One of the major problems of axiom pinpointing for incoherent terminologies is the precise positioning within the conflict axioms. In this paper we present a formal notion for the entailment-based axiom pinpointing of...
详细信息
One of the major problems of axiom pinpointing for incoherent terminologies is the precise positioning within the conflict axioms. In this paper we present a formal notion for the entailment-based axiom pinpointing of incoherent terminologies, where the parts of an axiom is defined by atomic entailment. Based on these concepts, we prove the one-to-many relationship between existing axiom pinpointing with the entailment-based axiom pinpointing. For its core task, calculating minimal unsatisfiable entailment, we provide algorithms for OWL DL terminologies using incremental strategy and Hitting Set Tree algorithm. The feasibility of our method is shown by case study and experiment evaluations.
Underwater optical imaging produces images with high resolution and abundant information and hence has outstanding advantages in short-distance underwater target ***,low-light and high-noise scenarios pose great chall...
详细信息
Underwater optical imaging produces images with high resolution and abundant information and hence has outstanding advantages in short-distance underwater target ***,low-light and high-noise scenarios pose great challenges in un-derwater image and video *** improve the accuracy and anti-noise performance of underwater target image edge detection,an underwater target edge detection method based on ant colony optimization and reinforcement learning is proposed in this ***,the reinforcement learning concept is integrated into artificial ants’movements,and a variable radius sensing strategy is pro-posed to calculate the transition probability of each *** methods aim to avoid undetection and misdetection of some pixels in image ***,a double-population ant colony strategy is proposed,where the search process takes into account global search and local search *** results show that the algorithm can effectively extract the contour information of underwater targets and keep the image texture well and also has ideal anti-interference performance.
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this p...
详细信息
ISBN:
(纸本)9781601320254
Description Logics are formalisms for representing knowledge of various domains in a structured and formally well-understood way. Typically, DLs are limited to dealing with precise and well defined concepts. In this paper we first present a fuzzy extension of ALC and define its syntax and semantics. Then we devote to taking advantage of the expressive power and reasoning capabilities of fuzzy ALC by encoding flexible planning problems within the framework of fuzzy ALC. Both theory and experimental results have shown that our method is sound and efficient.
Modularity and rigor are two key elements for multi-agent technology. Hong Zhu's multi-agent system (MAS) development method provides proper language facilities supporting modularity. To enhance this method with r...
详细信息
Modularity and rigor are two key elements for multi-agent technology. Hong Zhu's multi-agent system (MAS) development method provides proper language facilities supporting modularity. To enhance this method with rigor advocates a DL method to map the specification of MAS into a DL TBox. Thus, we can use the existing DL reasoners and systems to verify and validate some system's properties.
We have studied the AC-4 algorithm and then present key value ordering heuristic forming the new solving algorithm BT-KVV, which is based on the AC-4 algorithm. This algorithm takes full advantage of the state informa...
详细信息
Reverse k-nearest neighbor (RkNN) query is a hot-spot in spatio-temporal database. With the developing of mobile devices, continuous RkNN query becomes more and more important. Most of the previous methods use the two...
详细信息
Reverse k-nearest neighbor (RkNN) query is a hot-spot in spatio-temporal database. With the developing of mobile devices, continuous RkNN query becomes more and more important. Most of the previous methods use the two-step (filter-refinement) processing. However, for large k, the amount of calculation becomes very heavy, especially in the filter step. This is not acceptable for most mobile devices. This paper presents a novel algorithm for continuous RkNN queries based on pruning heuristics. The experiments show that the processing time of our method is still acceptable for most mobile devices when k is large.
According to the security features of WiMAX-based wireless communication network, a fresh new wireless communication authentication protocol called WCAP was advanced and designed adopting the dual-key authentication s...
详细信息
In this paper an intrusion detection method based on Dynamic Growing Neural Network (DGNN) for wireless networking is presented. DGNN is based on the Hebbian learning rule and adds new neurons under certain conditions...
详细信息
暂无评论