A novel hierarchical hybrid neural model to the problem of long-term electrical load forecasting is proposed in this paper. The neural model is made up of two self-organizing map nets - one on top of the other -, and ...
详细信息
As online shopping turnover continues to increase year after year [1], more and more business are rushing to establish an online presence In a previous publication [2], the authors of this paper identified usability a...
详细信息
ISBN:
(纸本)9781627486606
As online shopping turnover continues to increase year after year [1], more and more business are rushing to establish an online presence In a previous publication [2], the authors of this paper identified usability as being one of the attributes which most influence the success of an e-commerce systems This paper explores the issues involved in measuring the usability of e-commerce systems and presents a usability measurement framework specifically tailored to online stores The framework provides a quick way to evaluate the usability of online stores through easily automatable mathematical analysis of a site's structure and visual layout, followed by a short checklist to assure that essential usability criteria have been met References are made to a number of research exercises carried out by the authors amongst online shoppers and case studies of well-known e-commerce sites are also presented.
Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem is how to minimise the communication overhead and energy consumptio...
详细信息
We show that Optical Burst Switching (OBS) does not appear to be a viable option for routing in the core network. In order to achieve an acceptably low blocking probability, OBS networks will require an uneconomically...
详细信息
In this paper, we propose a new term weighting scheme called Term Frequency - Inverse Corpus Frequency (TF-ICF). It does not require term frequency information from other documents within the document collection and t...
详细信息
The earlier errors are found, the less costly they are to fix. This also holds true of errors in specifications. While research into Static Program Verification (SPV) in general, and Extended Static Checking (ESC) in ...
详细信息
ISBN:
(纸本)159593586X
The earlier errors are found, the less costly they are to fix. This also holds true of errors in specifications. While research into Static Program Verification (SPV) in general, and Extended Static Checking (ESC) in particular, has made great strides in recent years, there is little support for detecting errors in specifications beyond ordinary type checking. This paper reports on recent enhancements that we have made to ESC/Java2, enabling it to report errors in JML specifications due to (method or Java operator) precondition violations and this, at a level of diagnostics that is on par with its ability to report such errors in program code. The enhancements also now make it possible for ESC/Java2 to report errors in specifications for which no corresponding source is available. Applying this new feature to, e.g., the JML specifications of classes in java.*, reveals over 50 errors, including inconsistencies. We describe the adjustment to the assertion semantics necessary to make this possible, and we provide an account of the (rather small) design changes needed to realize the enhancements. Copyright 2006 ACM.
Studies of ad hoc wireless networks are a relatively new field gaining more popularity for various new applications. In these networks, the Medium Access Control (MAC) protocols are responsible for coordinating the ac...
详细信息
Context awareness is an essential cornerstone in future pervasive computing systems. It has the potential to greatly reduce the user attention and interaction bottlenecks, to give humans the impression that services f...
详细信息
Context awareness is an essential cornerstone in future pervasive computing systems. It has the potential to greatly reduce the user attention and interaction bottlenecks, to give humans the impression that services fade into the background, and to support intelligent personalization features. Nevertheless, in order to create such an environment, a growing amount of personal information has to be provided to the system, either manually or automatically. Hence the digital trace and representation users have in the system is getting dangerously detailed, thus stressing the need for privacy protection. DAIDALOS (Satyanarayanan, 2001) is a European research project in the area of 3G and beyond, which aims to combine heterogeneous networks in a transparent and seamless way, and develop on top of this a pervasive environment for applications and end-users. This paper describes the main models and mechanisms that have been established to provide federated context-aware services and protect the privacy of their users
A robust dynamic evolutionary algorithm (labeled RODEA), where both the robust calculation and mutation operator are based on an orthogonal design, is proposed in this paper. Previous techniques calculate the mean eff...
详细信息
ISBN:
(纸本)1595931864
A robust dynamic evolutionary algorithm (labeled RODEA), where both the robust calculation and mutation operator are based on an orthogonal design, is proposed in this paper. Previous techniques calculate the mean effective objective (for robust) by using samples without much evenly distributing over the neighborhood. The samples by using orthogonal array distribute evenly. Therefore the calculation of mean effective objective more robust. The new technique is generalized from the ODEA algorithm [1]. An orthogonal design method is employed on the niches for the mutation operator to find a potentially good solution that may become the representative in the niche. The fitness of the offspring is therefore likely to be higher than that of its parent. We propose a complex benchmark, consisting of moving function peaks, to test our new approach. Numerical experiments show that the moving solutions of the algorithm are a little worse in objective value but robust.
Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem is how to minimize the communication overhead and energy consumptio...
详细信息
Identifying misbehaviors is an important challenge for monitoring, fault diagnosis and intrusion detection in wireless sensor networks. A key problem is how to minimize the communication overhead and energy consumption in the network when identifying misbehaviors. Our approach to this problem is based on a distributed, cluster-based anomaly detection algorithm. We minimize the communication overhead by clustering the sensor measurements and merging clusters before sending a description of the clusters to the other nodes. In order to evaluate our distributed scheme, we implemented our algorithm in a simulation based on the sensor data gathered from the Great Duck Island project. We demonstrate that our scheme achieves comparable accuracy compared to a centralized scheme with a significant reduction in communication overhead
暂无评论