Particle swarm optimization (PSO) has shown its good performance on numerical function problems. However, on some multimodal functions the PSO easily suffers from premature convergence because of the rapid decline in ...
详细信息
Particle swarm optimization (PSO) has shown its good performance on numerical function problems. However, on some multimodal functions the PSO easily suffers from premature convergence because of the rapid decline in velocity. In this paper, a hybrid PSO algorithm, called HPSO, is proposed, which employs a modified velocity model to guarantee a non-zero velocity. In addition, a Cauchy mutation operator conducted on the global best particle is used for improving the global search ability of PSO. Experimental studies on a suite of multimodal functions with many local minima show that the HPSO outperforms the standard PSO, CEP, Gaussian swarm with Gaussian mutation (GPSO+GJ) and Gaussian swarm with Cauchy mutation (GPSO+CJ) on most test functions.
Taking the characteristics of mobile devices and the demands for graphics rendering into account, this paper gives a set of definitions of attributes to express the performance of mobile terminals and algorithm pe...
详细信息
Taking the characteristics of mobile devices and the demands for graphics rendering into account, this paper gives a set of definitions of attributes to express the performance of mobile terminals and algorithm performance. And then, according to the relationship of these attributes, a point-based rendering architecture for mobile devices is proposed. It includes pre-processing simplification, data organization and rendering. Instead of just simplifying the algorithm on PC, the entire process takes the multi-attributes of mobile devices and algorithm into account. Experiments shows that it can make full use of the limited resources to carry out a relatively realistic and real-time rendering.
The prediction of the transmissibility of avian influenza A viruses from birds to humans is very important for the public health. Recently, two categories of molecular patterns, which were associated with the phenotyp...
详细信息
The prediction of the transmissibility of avian influenza A viruses from birds to humans is very important for the public health. Recently, two categories of molecular patterns, which were associated with the phenotype of interspecies transmission, were found to exist among avian influenza A viruses with different subtypes. In the paper, we used the similar method based on wavelet packet decomposition to transform the viral sequences and used the energy features of viral genome as input to train BP neural network. The good results of experimentation were got to discriminate the two categories of molecular patterns. A novel method was constructed to predict the transmissibility of avian influenza A viruses.
Global optimization has many real-world applications. Most methods for solving it are based on search,so decreasing its search space can increase the efficiency for their solving. Symmetry-breaking is an important tec...
详细信息
Global optimization has many real-world applications. Most methods for solving it are based on search,so decreasing its search space can increase the efficiency for their solving. Symmetry-breaking is an important technique for decreasing search space and it has been widely used in SAT,CSP and so on. In this paper, we try to decrease the search space of an unconstrained optimization problem by symmetry *** present a method for extracting symmetries of an unconstrained optimization problem, and a method for constructing constraints to break those symmetries. The experimental results show that our methods are effective and efficient and symmetry-breaking can indeed increase the efficiency of global optimization problems solving.
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz ...
详细信息
Fuzz testing is an effective technique for finding security vulnerabilities in software. Traditionally fuzz testing tools use random inputs and watch the resulting values. In this paper, we present a model-based fuzz framework for systematic automated testing of a TCG trusted software stack implementation. This framework is based on blackbox fuzz testing methods, integrated with target profiling, data modeling and test algorithm etc. With the generation of smart, semantic-aware test cases, a more complete and deep testing can be provided. We also demonstrate the use of our model-based fuzz framework which can identity several vulnerabilities in some form of TSS implementation.
This paper is going to present a new algorithm called "PP" (a RFID anti-collision algorithm based on pipeline and pre-detecting mechanism) to solve the problem of collisions among the tags in RFID system. Th...
详细信息
This paper is going to present a new algorithm called "PP" (a RFID anti-collision algorithm based on pipeline and pre-detecting mechanism) to solve the problem of collisions among the tags in RFID system. This algorithm provides a hardware architecture consisting of two antennas: a pre-detection antenna for pre-detecting and a reading antenna for tag reading, the two processes of which will work respectively and concurrently based on pipeline system. Compared with other related researches, this algorithm that avoids the waste of time in the process of pre-detecting and free from the limitation-the ratio of the length of detection slot to reading slot-will contribute to a non-stop reading operation. Our simulation illuminates that the proposed PP algorithm outperforms the existing ones in efficiency, stability and the leakage rate of tags.
After multiple-objective optimized decision about the East Lake in Wuhan,combining of expert system 's identification and adjustment,we get weights of F(tourism function),F(flood storage function),F(water sup...
After multiple-objective optimized decision about the East Lake in Wuhan,combining of expert system 's identification and adjustment,we get weights of F(tourism function),F(flood storage function),F(water supply function),F(aquaculture function),F(water sports function),F(vocation land and sanitaria function) and F(lake shore garden function),each of which is:0.5,0.1,0.05,0.05,0.05,0.05,0.2.F,will become more and more outstanding and become the most important function in comprehensive utilization of the East *** the improvement of urban basic facilities,ability of pumping stations will be improved,and F could be maintained.F will be developed in adjustment.
For large and complex composite Web services which are composed by BPEL and a set of WSDL and XSD documents, we urgently need the aid of the tools in designing and selecting test cases. However, most of mature testing...
详细信息
For large and complex composite Web services which are composed by BPEL and a set of WSDL and XSD documents, we urgently need the aid of the tools in designing and selecting test cases. However, most of mature testing tools which generate test data with the information of WSDL are used for single service while the research for composition remains in the realm of theory. So we apply the theory of data-flow testing and try to develop a testing tool for Web services composition which can automatically detects harmful data-flow anomalies and generate test paths according to all kinds of data flow coverage criteria.
As a structured overlay network, DHT (Distributed Hash Table) has been widely used in P2P systems. Existing resource publishing algorithms, including One-step publishing in eMule, do not completely exploit features of...
详细信息
As a structured overlay network, DHT (Distributed Hash Table) has been widely used in P2P systems. Existing resource publishing algorithms, including One-step publishing in eMule, do not completely exploit features of DHTs and incur heavy network load. In this paper, we propose a novel resource publishing algorithm: Step-by-step publishing, in DHT networks. It is more effective and scalable with lower network load than the existing publishing algorithms. We also utilise the techniques of vector space model and user relevance feedback to optimise the Step-by- step publishing algorithm, which effectively improves search hit ratio and reduces network load. After analysing the dynamics of P2P systems, we present index maintenance schemes under highly dynamic P2P networks. Based on real datasetsfrom Maze system, simulation experiment results show that this proposed approach has low network overhead and publishing cost, high search and download hit ratio.
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting bro...
Routing in wireless mesh networks presents a great challenge due to unreliable wireless links and collisions. Recently, a new routing method, opportunistic routing (OR), is proposed to deal with them by exploiting broadcast nature of wireless networks. OR relies on the global knowledge of networks to select relays and determine priorities. In this paper, we propose a new routing scheme, OxDSR, which combines OR and dynamic source routing (DSR) and performs opportunistic transmissions with the help of the local information and the traditional route obtained by DSR. By taking the duplicates and additional wireless resource consumed by multiple ACK frames into consideration, we propose a new metric, equivalent data rate, to select and prioritize relays. Extensive simulation study shows that the proposed OxDSR is more resilient and achieves higher throughput than DSR based on the expected transmission count routing metric.
暂无评论