With the aim of resolving the issue of cluster analysis more precisely and validly, a new approach was proposed based on biogeography-based optimization (abbreviated as BBO) algorithm. (Method) First, we reformulated ...
详细信息
Maintaining Generalized Arc Consistency (GAC) during search is considered an efficient way to solve non-binary constraint satisfaction problems. Bit-based representations have been used effectively in Arc Consistency ...
详细信息
Maintaining Generalized Arc Consistency (GAC) during search is considered an efficient way to solve non-binary constraint satisfaction problems. Bit-based representations have been used effectively in Arc Consistency algorithms. We propose STRbit, a GAC algorithm, based on simple tabular reduction (STR) using an efficient bit vector support data structure. STRbit is extended to deal with compression of the underlying constraint with c-tuples. Experimental evaluation show our algorithms are faster than many algorithms (STR2, STR2-C, STR3, STR3-C and MDDc) across a variety of benchmarks except for problems with small tables where complex data structures do not payoff.
Peak search for three-dimensional rotation electron diffraction image is almost the most important step in crystal structure determination. The difference of Gaussian method is the traditional approach for this task w...
详细信息
ISBN:
(纸本)9781509055227
Peak search for three-dimensional rotation electron diffraction image is almost the most important step in crystal structure determination. The difference of Gaussian method is the traditional approach for this task with the disadvantage that values of three tunable parameters need to be determined by users. To address this drawback, this paper presents a local gradient based peak search algorithm that needs only one tunable parameter. Experiments show that our proposed method is as effective as the difference of Gaussian method in peak detection task, but has obvious advantages in speed and convenience.
In this paper,the authors first apply the Fitzpatrick algorithm to multivariate vectorvalued osculatory rational *** based on the Fitzpatrick algorithm and the properties of an Hermite interpolation basis,the authors ...
详细信息
In this paper,the authors first apply the Fitzpatrick algorithm to multivariate vectorvalued osculatory rational *** based on the Fitzpatrick algorithm and the properties of an Hermite interpolation basis,the authors present a Fitzpatrick-Neville-type algorithm for multivariate vector-valued osculatory rational *** may be used to compute the values of multivariate vector-valued osculatory rational interpolants at some points directly without computing the interpolation function explicitly.
With the rapid development of information technology,semantic web data present features of massiveness and complexity. As the data-centric science, social computing have great influence in collecting and analyzing sem...
详细信息
With the rapid development of information technology,semantic web data present features of massiveness and complexity. As the data-centric science, social computing have great influence in collecting and analyzing semantic data. In our contribution, we propose an integrity constraint validation for DL-Lite R based ontology in view of data correctness issue in the progress of social computing ***, at the basis of translations from integrity constraint axioms into a set of conjunctive queries, integrity constraint validation is converted into the conjunctive query answering over knowledge bases. Moreover, rewriting rules are used for reformulating the integrity constraint axioms using standard axioms. On this account, the integrity constraint validation can be reduced to the query evaluation over the ABox, and use query mechanisms in database management systems to optimize integrity constraint validation. Finally, the experimental result shows that the rewritingbased method greatly improves the efficiency of integrity constraint validation and is more appropriate to scalable data in the semantic web.
When several actions preformed at the same time, or performed concurrently, the possibility of multiple concurrent and mutually interacting make the planning solving process difficult. In this paper, we reform the fra...
详细信息
The context of objects can provide auxiliary discrimination beyond objects. However, this effective information has not been fully explored. In this paper, we propose Tri-level Combination for Image Representation (Tr...
详细信息
Group key management plays an important role in ensuring the safety and reliability of the VANET(vehicular ad-hoc network) over the channelThrough considering the characteristics of VANET communication and topology, a...
详细信息
ISBN:
(纸本)9781510828087
Group key management plays an important role in ensuring the safety and reliability of the VANET(vehicular ad-hoc network) over the channelThrough considering the characteristics of VANET communication and topology, a VANET group key management scheme is proposed based on random transmission which is combined with the construction of polynomial and key updating by Hash chainThe scheme achieves the random transmission function of group key and the node revocation capabilityMoreover, it can ensure the forward and backward and other security attributes of the group keyThe results show that the proposed scheme has less communication complexity and better communication performance, also it can suitable for large scale VANET group.
A minimum cover set coverage algorithm(MCSCA) for pursuing low energy is presented in this paper to prolong the lifetime of wireless sensor networks. The proposed algorithm improves energy efficiency in three aspect...
A minimum cover set coverage algorithm(MCSCA) for pursuing low energy is presented in this paper to prolong the lifetime of wireless sensor networks. The proposed algorithm improves energy efficiency in three aspects. First, when generating cover sets, the selection strategy of the algorithm considers the contributions of sensor nodes, energy variance, and other factors. The algorithm can cover all targets with a few sensor nodes. Second, useless coverage optimization reduces coverage areas without target nodes to save energy. Third, redundant coverage optimization further saves energy by reducing redundant coverage in wireless sensor networks. Compared with similar heuristic algorithms, the proposed MCSCA can extend network lifetime by 11% on average.
暂无评论