This paper continues the study that has been begun in the series of authors' papers and has devoted to clarifying the interconnection between denotational and operational approaches for modelling logical time base...
详细信息
The Karmarkar algorithm performs a sequence of projective transformations each followed by optimization over an inscribed sphere and then inverse projective transformation. These steps are implemented on the authors...
详细信息
The Karmarkar algorithm performs a sequence of projective transformations each followed by optimization over an inscribed sphere and then inverse projective transformation. These steps are implemented on the authors' model with two neural-like circuits, one embedded inside the other. The inner circuit finds least square error solutions using the complementary slackness condition. The outer circuit finds a novel interior primal solution using the delta rule by making use of the error in the comput.tion of dual solution. This circuit exhibits potential for applications where real-time optimization is required-as is the case in robotics, satellite guidance, etc.< >
A system for performing highly parallel, predictable real-time image filtration is described. The application software was developed using a special class of abstract data types (ADT) constructed in the RT-X language ...
详细信息
In this abstract, we propose a new anisotropic acoustic wave equation for 2D TTI media. This is the extension of our previous work on VTI media to TTI media. Similar to VTI case, we follow the same procedures as Zhou ...
详细信息
This paper introduces least square projection (LSP), a fast technique for projection of multi-dimensional data onto lower dimensions developed and tested successfully in the context of creation of text maps based on t...
详细信息
This paper introduces least square projection (LSP), a fast technique for projection of multi-dimensional data onto lower dimensions developed and tested successfully in the context of creation of text maps based on their content. Current solutions are either based on comput.tionally expensive dimension reduction with no proper guarantee of the outcome or on faster techniques that need some sort of post-processing for recovering information lost during the process. LSP is based on least square approximation, a technique originally employed for surface modeling and reconstruction. Least square approximations are capable of comput.ng the coordinates of a set of projected points based on a reduced number of control points with defined geometry. We extend the concept for general data sets. In order to perform the projection, a small number of distance calculations is necessary and no repositioning of the final points is required to obtain a satisfactory precision of the final solution. Textual information is a typically difficult data type to handle, due to its intrinsic dimensionality. We employ document corpora as a benchmark to demonstrate the capabilities of the LSP to group and separate documents by their content with high precision
Human housekeeping genes (HKGs) are widely expressed in various tissues, which involve in cell maintenance or sustaining cell function, and are often taken as experimental control and normalization references in gene ...
详细信息
This paper presents a novel 2 1/2 -dimensional systolic array architecture. The novel systolic array has a logical three-dimensional communication network, but it can be realized on a two-dimensional wafer surface by ...
详细信息
This paper presents a novel 2 1/2 -dimensional systolic array architecture. The novel systolic array has a logical three-dimensional communication network, but it can be realized on a two-dimensional wafer surface by making use of multiple-layer metalization or multiple chip module technology. The architectural details are discussed in terms of graph theory. Based on several case study, the comput.tional efficiency and hardware overheads for the proposed array are summarised with respect to conventional systolic arrays.< >
All perfect fluid, spherically symmetric spacetimes admitting a proper inheriting conformal Killing vector (ICKV) which is neither parallel to nor orthogonal to the fluid 4-velocity are found, thereby completing the a...
All perfect fluid, spherically symmetric spacetimes admitting a proper inheriting conformal Killing vector (ICKV) which is neither parallel to nor orthogonal to the fluid 4-velocity are found, thereby completing the analysis of a previous work. In particular, the results in this and earlier work are summarized in terms of a general theorem.
It was pointed out that the simple authenticated key agreement (SAKA) protocol suffered three weaknesses. Several improved protocols, such as improved Lin protocol, E-SAKA protocol, then were proposed as claimed being...
详细信息
It was pointed out that the simple authenticated key agreement (SAKA) protocol suffered three weaknesses. Several improved protocols, such as improved Lin protocol, E-SAKA protocol, then were proposed as claimed being free of these three weaknesses. After reviewing of these protocols, proofs are given that these protocols still suffer from the password guessing attack. Besides, the weakness that the attacker on the E-SAKA protocol can get the session key also is pointed out. By introducing hash function a new protocol based on improved Lin's protocol is proposed, which is free of the three weaknesses and also can prevent man-in-the-middle attack as well as the password guessing attack.
Forensics analyses of an email network were more based on the email communication structure, while the email content was seldom considered. In this paper, we propose a forensics analysis method for an email network ba...
详细信息
ISBN:
(纸本)9781467376839
Forensics analyses of an email network were more based on the email communication structure, while the email content was seldom considered. In this paper, we propose a forensics analysis method for an email network based on the Latent Dirichlet Allocation topic model and the Centrality algorithm. The method takes into full consideration the email content and the email communication structure. In order to calculate the email communication correlation with the topic of the criminal case, we get the similarity of the email content based on the Latent Dirichlet Allocation model. Combined with the Centrality algorithm, we can obtain the mail accounts that have the greater influence on the email network. Experimental results show that this method can more effectively analyze an email network and find the specific email accounts.
暂无评论