This paper proposes a new image restoration technique, in which the resulting regularized image approximates the optimal solution steadily. The affect of the regular-ization operator and parameter on the lower band an...
详细信息
This paper proposes a new image restoration technique, in which the resulting regularized image approximates the optimal solution steadily. The affect of the regular-ization operator and parameter on the lower band and upper band energy of the residue of the regularized image is theoretically analyzed by employing wavelet transform. This paper shows that regularization operator should generally be lowstop and highpass. So this paper chooses a lowstop and highpass operator as regularization operator, and construct an optimization model which minimizes the mean squares residue of regularized solution to determine regularization parameter. Although the model is random, on the condition of this paper, it can be solved and yields regularization parameter and regularized solution. Otherwise, the technique has a mechanism to predict noise energy. So, without noise information, it can also work and yield good restoration results.
A fast algorithm is proposed to solve a kind of high complexity multi-objective problems in this paper. It takes advantages of both the orthogonal design method to search evenly, and the statistical optimal method to ...
详细信息
A fast algorithm is proposed to solve a kind of high complexity multi-objective problems in this paper. It takes advantages of both the orthogonal design method to search evenly, and the statistical optimal method to speed up the computation. It is very suitable for solving high complexity problems, and quickly yields solutions which converge to the Pareto-optimal set with high precision and uniform distribution. Some complicated multi-objective problems are solved by the algorithm and the results show that the algorithm is not only fast but also superior to other MOGAS and MOEAs, such as the currently efficient algorithm SPEA, in terms of the precision, quantity and distribution of solutions.
The linear model of market value functions is a new method for direct marketing. Just like other methods in direct marketing, attribute reduction is very important to deal with large databases. We apply the algorithm ...
详细信息
Based on the analysis of characteristics of current attacks,a collaborative intrusion detection model using coordination agent is *** this paper defines the inner structure of intrusion detection agents, introduces it...
详细信息
Based on the analysis of characteristics of current attacks,a collaborative intrusion detection model using coordination agent is *** this paper defines the inner structure of intrusion detection agents, introduces its collaboration principle and security solution. On the basis of the above research,an effective algorithm of collaborative detection is put *** this model,the complicated collaboration task is finished by some separate coordination agents,which are responsible for synthetically analyzing the detection task that the lower agents are unable to finish and are able to assign the task to the lower associated *** not only simplifies the building of detection agents and improves the extent and efficiency of collaboration,thus overcoming the shortcomings of direct collaboration among agents in traditional methods,but also enhances the capability of detecting complex *** the same time,an example shows the feasibility and validity of the model and the algorithm.
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolut...
详细信息
Many practical problems in commerce and industry involve finding the best way to allocate scarce resources a-mong competing activities. This paper focuses on the problem of integer programming, and describes an evolutionary soft a-gent model to solve it. In proposed model, agent is composed of three components: goal, environment and behavior. Experimental shows the model has the characters of parallel computing and goal driving.
In order to construct a secure network, attack and intrusion mode of intruders are analyzed for improving the capability of IDS and firewall systems. This paper presents a method for constructing a network intrusion a...
详细信息
ISBN:
(纸本)0780378652
In order to construct a secure network, attack and intrusion mode of intruders are analyzed for improving the capability of IDS and firewall systems. This paper presents a method for constructing a network intrusion and attack detection system on Honeynet, which is a true network that is constructed for the purpose of gathering information of intruders and attackers. Analyzing these data with data mining algorithm can work our attack modes, in this paper, we propose some method for mining patterns on various data from firewall records and log server in Honeynet, and the result can be in various forms such as associated rules of historic data or certain data structures required by IDS and firewall systems.
Based on the analysis of characteristics of current attacks, a collaborative intrusion detection model using coordination agent is proposed. Then we define the inner structure of intrusion detection agents, introduces...
详细信息
Based on the analysis of characteristics of current attacks, a collaborative intrusion detection model using coordination agent is proposed. Then we define the inner structure of intrusion detection agents, introduces its collaboration principle and security solution. On the basis of the above research, an effective algorithm of collaborative detection is put forward. In this model, the complicated collaboration task is finished by some separate coordination agents, which are responsible for synthetically analyzing the detection task that the lower agents are unable to finish and are able to assign the task to the lower associated agents. It not only simplifies the building of detection agents and improves the extent and efficiency of collaboration, thus overcoming the shortcomings of direct collaboration among agents in traditional methods, but also enhances the capability of detecting complex attacks. At the same time, an example shows the feasibility and validity of the model and the algorithm.
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smar...
详细信息
ISBN:
(纸本)0780378652
In the ubiquitous computing environment (UCE), how to seamlessly provision the service or application to its occupant or its mobile user is an interesting research topic. This paper introduces our two UCEs called smart classroom (SCR) and intelligent meeting room (IMR) respectively. When a teacher gives his lesson in the SCR, different services will automatically be provisioned to him according to captured context information. When the users with various kinds of portable devices, such as PDA, mobile phone or laptop, attend a meeting in IMR, they can easily organize a meeting and unobtrusively access the services provided by IMR, for example, they could give presentation by "projector service". The paper also describes the software infrastructure of SCR and IMR - smart platform, a multi agents (MAs) system.
The real-time process algebra (RTFA) is a set of new mathematical notations for formally describing software system architectures, and static and dynamic behaviors. To bring RTPA into industrial software development p...
详细信息
ISBN:
(纸本)0780377818
The real-time process algebra (RTFA) is a set of new mathematical notations for formally describing software system architectures, and static and dynamic behaviors. To bring RTPA into industrial software development practice, tools are needed for analyzing and visualizing RTPA specifications. The first step to develop the supporting tools is to build a grammar parser for recognizing the RTPA notation system. In this paper, a parser of RTPA is described. The parser takes a textual RTPA specification as input, and generates an abstract syntax tree (AST) as its output. The generated AST represents RTPA tokens and lexical information in a structured format, which provides a foundation for further semantic analysis, code generation, visualization, and validation.
As e-commerce developing rapidly, it is becoming a research focus about how to capture or find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. Recommendation system ...
详细信息
ISBN:
(纸本)0769519326
As e-commerce developing rapidly, it is becoming a research focus about how to capture or find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. Recommendation system in electronic commerce is one of the successful applications that are based on such mechanism. We present a new framework in recommendation system by finding customer model from business data. This framework formalizes the recommending process as knowledge representation of the customer shopping information and uncertainty knowledge inference process. In our approach, we firstly build a customer model based on Bayesian network by learning from customer shopping history data, then we present a recommendation algorithm based on probability inference in combination with the last shopping action of the customer, which can effectively and in real time generate a recommendation set of commodity.
暂无评论