In this thesis, memory principle and ant colony algorithm are fused and applied in intrusion detection system. The method of controlling pheromone used in ant colony algorithm is applied to simulate the memory process...
详细信息
Artificial immune algorithm has rapid and random overall search ability, but cannot utilize system feedback information sufficiently, which results in redundancy and iteration as well as low solving efficiency. Ant co...
详细信息
In this paper, the concept of the adaptive multi-mode interactive interface based on embedded equipments is proposed and its implementation on digital STB is also brought forward, accompanying with the concrete design...
详细信息
In this paper, the concept of the adaptive multi-mode interactive interface based on embedded equipments is proposed and its implementation on digital STB is also brought forward, accompanying with the concrete design of the program step and the implementation details of the key component. The adaptive multi-mode interactive interface effectually improves the performance of human-computer interaction on digital STB. This not only effectively promotes the process popularized in the digital STB but also provides a good reference to human-computer interaction on embedded equipments.
An improved particle swarm optimization (PSO) method for detecting feature points of large-scale point-based models is presented in this paper. By redefining the particle, fitness, initial and ending conditions, local...
详细信息
An improved particle swarm optimization (PSO) method for detecting feature points of large-scale point-based models is presented in this paper. By redefining the particle, fitness, initial and ending conditions, local optimum and global optimum, iterative equations of PSO, this method can search multi-regions for the feature points in an adaptive random and parallel manner. The fitness is defined as local surface variation. The global search and two different local search methods are combined to detect the feature points quickly. This method can realize the fast displaying of the characteristic of large-scale models. The effectiveness of the algorithm has been proved by the experiments.
In order to solve the problem of "information overflow" in e-learning, an algorithm based on Hebbian learning law is proposed for constructing self-organized communities which can automatically group e-learn...
详细信息
In order to solve the problem of "information overflow" in e-learning, an algorithm based on Hebbian learning law is proposed for constructing self-organized communities which can automatically group e-learners according to their learning interests. Unlike filtering methods,this algorithm takes into consideration of the distributed open environment of e-learning. This paper designed a peer-to-peer architecture and applied Hebbian learning law in constructing e-learner communities, avoiding the difficulty in calculating user similarity. Compared with traditional Hebbian learning based algorithm, this algorithm uses dynamic thresholds to address the problem of unilateral trust weight adjustment in extreme cases, and it also improves the trust weight adaptation and neighbor adjustment policies. Experimental results show that this algorithm achieves faster community construction speed and better scalability and stability.
This paper gives a new design for Ethernet/IP intelligent communication modules (EIICM). The new EIICM module not only acts as the network communication module for the PLCs to facilitate the communications between the...
详细信息
This paper gives a new design for Ethernet/IP intelligent communication modules (EIICM). The new EIICM module not only acts as the network communication module for the PLCs to facilitate the communications between the PLCs and the remote network devices, but also it acts as the CPU of the built-in operation switch to perform the network topology monitoring and maintenance, IGMP snooping, and switch managing and diagnosing. Furthermore, it acts as an Ethernet/IP and MB/TCP end device to provide implicit and explicit messaging services. In this paper, it focuses on the overall architecture, the functional design and some key techniques of new solution in EIICCM, such as ¿structured message broker¿ pattern, ¿management-self adaptable¿ pattern, and device management method. It has given a new solution for the next generation of Ethernet module for industrial PLC.
Traditional English text chunking approach is to identify phrases using only one model and same features. It is shown that one model could not consider each phrasepsilas characteristics, and same features are not suit...
详细信息
Traditional English text chunking approach is to identify phrases using only one model and same features. It is shown that one model could not consider each phrasepsilas characteristics, and same features are not suitable to all phrases. In this paper, a multi-agent text chunking model is proposed. This model uses individual sensitive features of each phrase to identify different phrases. Through testing on the public training and test corpus, this multi-agent model is effective because F score of English chunking using this multi-agent model achieves to 95.70%, which is higher than the best result that has been reported.
Intelligent traffic information service (ITIS) is a typically grid application in shanghaiGrid to achieve effective traffic management. Several issues and challenges needed to be explored in ITIS, such as resource sha...
详细信息
ISBN:
(纸本)9780769533063
Intelligent traffic information service (ITIS) is a typically grid application in shanghaiGrid to achieve effective traffic management. Several issues and challenges needed to be explored in ITIS, such as resource sharing, middleware communication, traffic control grid, and so on. We implemented a prototype system of ITIS and carried out a field testing in shanghai city. We show that by utilizing the grid technology, the expected performance can be obtained, such as stability, scalability, etc. Meantime, traffic status estimation and traffic surveillance can be well handled in ITIS.
Greatly progress has been made in embedded system product recent years. With widely application of embedded system, measures must be taken to assure its quality and accelerate its development time. A static analysis t...
详细信息
Greatly progress has been made in embedded system product recent years. With widely application of embedded system, measures must be taken to assure its quality and accelerate its development time. A static analysis test platform for embedded systems is constructed in this paper with two static analysis tools, PolySpace and Pclint. Since embedded software and ordinary software are not the same, these tools can be useful after complicated configuration. By comparing the differences between embedded software and ordinary software, a set of steps are introduced, which are concluded and verified by authors' practice in recent two years. In order to present organized configuration processes, analysis result of 5 source files are shown to illustrate the effect of this platform. This analysis test platform should be used as early as possible during embedded system development cycle.
A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy ...
详细信息
A proxy re-encryption scheme allows the proxy to transform ciphertext computed under one public key into the different ciphertext that can be decrypted by using another public key. Recently, many identity-based proxy re-encryption schemes have been proposed. However, all of these schemes are only proved secure in the random oracle not in the standard model. In this paper, Based on Waters's identity based encryption, an identity based proxy re-encryption scheme is proposed that is proved fully secure without the random model. The proposed scheme's security can be reduced to the decision Bilinear Diffie-Hellman assumption.
暂无评论