International Journal of Applied Mathematics and Soft Computing
|
|
- Marilynn Ross
- 5 years ago
- Views:
Transcription
1 Internatonal Journal of Appled Mathematcs and Soft Computng Presdent: Zhang Jnrong Chef Planner: Hu Yuejuan Executve Chef Edtor: Chen Lhua, Cu Shuzhen, Shuyu Edtoral Board: L Shu, Xu Ya, Gao Shufen, Ya Hu, Su Daq, Albert, Yu Boru, Souza, Pe Lu, Chun Hao, L Dhda, Meng Yu Audt Commttee: Ln Lchan, Xu Ljuan, Dong Pewang, Su Janmn, Al Coskun, You Wenyng, Chen Xngeng, An Xn, Yan Yanhu, Tang Mng, Yang Mng, Zh Zhong, Xao Han, Sun Wenjun, Yoon-seon Lee, Bom Sook Km, Chang-Duk Jun, Jn Hong Cha, Tan Ker Kan, Tan-Hua Huang, Jorge Serra Colna, Yong Shao, Vkram Kate Publsher: HongKong New Century Cultural Publshng House Address: Unt A1, 7/F, Cheuk Nang Plaza, 50 Hennessy Road, Wancha, Hong Kong Tel: Fax: Copyrght 016 HongKong New Century Cultural Publshng House -All Rghts Reserved
2
3 Contents Research on Data Network Equvalence Based on Real Estate Hufeng LONG (1) Spectrum Allocaton of Cogntve Wreless Network based on Immune Clonal Optmzaton Algorthm Hean LIU, Haogu CHEN, Zhke KUANG (6) Analyss on the Securty of Accountng Informaton under the Cloud Xnyu DU (10) Applcaton of Neural Network based on Clusterng Analyss Haogu CHEN (14) Research of Wreless Network based on Immune Genetc Algorthm Gusheng SHU (18)
4
5 Research on Data Network Equvalence Based on Real Estate Hufeng LONG Hunan Cty Unversty, Y yang Hunan , Chna Abstract: Wth the rapd development of real estate ndustry, real estate network data are also ncreasngly large, complex, not easy to manage, n order to solve ths problem, the real estate data network research and applcaton based on peer-to-peer network. Usng the prncple of data technology are analyzed, a seres of research shows that the study than tradtonal the network can be more accurate, more convenent to manage the entre real estate data, t has practcal value. Keywords: Equvalence Network; Node Trust; Informaton Flterng 1. Introducton In recent years, the rapd applcaton development of PP networks has become one of the mportant technologes of affectng the future development of the Internet. The dstrbuted archtecture of PP made t has good scalablty and flexblty, but ts open, anonymous and self-organzng propertes provde a way for the spread of vruses and junk data, and the safety problems caused wdespread concern. Blaze, who for the frst tme the concept of "trust management", the ntroducton of network servces n 1996 [1]. Subsequently, researchers PP network based on trust management model has been extensvely studed. Dependng on the structure of the current PP networks, trust models nto a centralzed trust model and dstrbuted trust model. Centralzed trust model s equpped wth a central server whch s responsble for managng the trust of all the nodes, such as PKI-based trust model []. Dstrbuted Trust Model has no central server, to determne the trust of nodes evaluated by collectng trust other nodes on the target node. Dstrbuted trust model was classfed nto global trust model and local trust model n accordance wth the trust's search. Processng to obtan global trust model need to fnd a trusted node n the network of all transactons wth the target node over node testmony [3-6]. The commonly used methods are teratve and feedback entre network. Iteratve algorthm teratve global trust value of each node n the network updated untl the trust values of all nodes to stablze based on the tradng results over tme. The more famous algorthm had early Egen Rep algorthm model, and model the dynamc Peer Trust TVM algorthm. Convergence of the algorthm and teratve overhead n large-scale network, t has been a major factor restrctng the development of ths model [4]. After the model-based feedback of each transacton, the transacton clent node evaluatons wll feedback drectly to the servce node. Typcal algorthms have TBRM algorthms and dynamc models Peer Trust PSM algorthm. When ths method of calculatng the trust s less overhead, the larger scope of malcous attack was beng dshonest feedback. How to dstngush between honest and dshonest feedback has been facng challenges such models.. Super Trust Model In Super Trust, t makes all nodes n the group as a unt to be dvded, and each group has only one super-node. Smplcty, Super Trust assume that, each node (f not specfcally stated heren "node" refers to common node) belongs to only one group (for a node belongng to a pluralty of groups whch can be seen as the node n each group there are dfferent denttes). Fgure 1 s the PP network structure wth a super node, the fgure shows the four connectons between groups, S represents super node. The fgure shows three knds of trust type, n the group s 1, settng the relatonshp between super node S p 1 and node p, and the relatonshp between p and p 3 as drect trust relatonshp, and settng the relatonshp between S p 1 and p 3 as the recommended trust relatonshp. The relatonshp between p and p 4 represents the trust relatonshp between the ordnary nodes n dfferent groups, meanwhle, we characterzed the trust relatonshp between the super nodes S p 1 and S p 3. The basc dea of Super Trust s that, the nodes establsh local trust relatonshp to target node accordng to the transacton. If the target node (for example, p 3 ) s n the same group, the node ( p ) wll store the transactons of the target node n the local. If the target node (such as p 4 ) s n other groups, then the node ( p ) wll p 1
6 feedback the outcome of the transacton to ts supergroup node (SP1). The super node S p Where Trsp expressed the trust of super node sp, 1 establshes the trust relatonshp of super node S p n the group of node p4 accordng to the feedback of node p. When the node assesses the trust value of other node wthn the same group, t wll calculate the trust value of the node n accordance wth the group's reputaton-based trust mechansm. The trust value of super nodes s calculated by the global trust n the group wth all of ts nodes. In the followng, t frst descrbes the calculatng way of trust between nodes wthn the same group. Fgure 1. The PP network structure wth super nodes.1. Calculaton of node trust Frst, t gves the calculaton methods of trust between ordnary nodes wthn the same group. We have the trust between ordnary nodes wthn the same group: Tr = λ R + (1 λ)re (1) j j j Where η s a drect trust confdence factor, η values and nteracton related to the number, the more the number of nteractons larger the value of η, 0 η 1. We can take η = h/ HLmt, where h s the node and node j, the number of nteractons between, HL mt to set the threshold number of nteractons heren value s 0... Trust calculaton of super nodes In Super Trust, we assume that the ntal network jonng the PP network nodes are trusted n the ntal stage, whch can be used as super-node, because as a whole PP network bulder and the orgnal user, there s no ulteror motve to destroy ths network. Meanwhle, we entrust super node the followng functons: nvolved n the transacton, to safeguard ther tradng results; mantenance group's node management; n addton, supernode also stores the trust nformaton across the node group transactons. The trust from the node to super node of the group s changng. In Super Trust, the trust calculaton of the node to super node s n accordance wth global trust calculaton, that Trsp = ( RR ) () k KSP k I( G ) I( G ) s a collecton of nodes wthn the group sp, R k represents the partal trust of node. Thus, to the entre group at a certan moment, the trust of super node s unque, rather than a specfc evaluaton node tself. Because trust s determned by the nteracton result and affected by that, after a certan perod of tme, there are changes n the node trust. Thus, the entre group of nodes can perodcally partcpate n the assess of the trust. The super nodes whch falls below a certan threshold can be replaced wth the backup super node replace ths super-node, so you can avod malcous nodes camouflage dentty spoofng. The selecton of backup super node s decded based on the stablty and overall performance of all members. For the new added ordnary node, we requre full trust at the begnnng of the super node wthn the group, wth the deepenng of ther nteracton, and gradually adjust to ths super node trust relatonshp. Thus, n Super Trust, the degree trust of node to super node sp s, 1, n = 1 Trsp = (3) θtrsp, n> 1 In the above equaton, ψ s a constant and 0pψ p 1, R ISP s the drect trust of node to super node sp, s s the trust evaluaton standard devaton of the set of nodes to super node. In the smulaton, ψ = 1 ( 1 ψ). Rsp s. The trust between super node sp and sp j s establshed rely on the overall trust evaluaton of nodes n sp group to sp group. The defnton s as follows..3. Ant- attack capablty j.3.1. Smple malcous nodes (SM) To the smulaton, we assume that the cooperaton node provde a credble probablty of documents to 0.98, so when the system does not have malcous node, the node's successful request for cooperaton was It knows from Fgure 3, when the malcous nodes provde only un-trusted fles, Super Trust and PD Trust can effectvely dentfy malcous nodes n small proporton of malcous nodes, so the success of co-operatve nodes transacton rate decreases slowly as the ncrease n the proporton of malcous nodes. But wth the ncrease of the proporton of malcous nodes, the Super - Trust system performance ndcates a sgnfcant advantage. The RB Trust system success rate of requests sgnfcantly reduce wth the ncrease proporton of malcous nodes, whch s because n the RB Trust system, the node nformaton or the use of local trusted frends and ther frend's recommendaton to determne the val-
7 ue of the gven node's trust. And therefore cannot trust Super Trust can effectvely dentfy slander node, leavng effectve access to nformaton for all nodes. Addtonally, most of the attacks neffectve, so when the propor- n our smulaton, cooperatve nodes may provde ton of malcous nodes reaches 0.6, t also has a hgher un-trusted fles because of an error, whle malcous successful transacton rate. The successful tradng rate nodes n order hde ts malcous behavor and provde of RB Trust system decrease rapdly wth an ncrease n credble documents wth a certan probablty, therefore, the proporton of malcous nodes slander, ths s because n RB Trust, nodes may ncorrectly assess the credblty when there are many slander nodes, the untrue of the other nodes, resultng n successful transacton and msleadng nformaton of recommended nformaton rate. becomes avalable, the system can not effectvely 1.0 dstngush these nformaton, the node trust judgment error s large, and therefore can not effectvely choose 0.9 to download the source resultng n successful transacton rate Super Trust PDT Trust RBT Trust Malcous nodes proporton Fgure. Comparson of successful transacton rate under SM Fgure 4 s the rate changes wth the successful transacton of the three types of system smulaton cycle of Super Trust, PD Trust and RB Trust n the proporton of malcous nodes 0.6. It can be seen, Super-Trust optmal system performance, PD Trust second, RB Trust worst, these show the strong ablty to resst attacks of malcous nodes of Super Trust. Successful transacton rate Fgure 3. Changes of successful transacton rate wth the perod.3.. Slander node (DM) Fgure 5 s the comparson of successful transacton rate of the three systems of Super Trust, PD Trust and RB Trust under the attack of malcous slander node. As can be seen from Fgure 5, when the proporton of malcous nodes n system s small, the system successful transacton rate of three mechansms has lttle dfference, But wth the ncrease n the proporton of malcous nodes, the Super Trust system performance ndcates a sgnfcant advantage, whch because we propose feedback flterng algorthm to flter out the cooperatve node slander publshed njustce nformaton, so Fgure 4. The comparson of successful transacton under DM. Fgure 6 s the changes of the three systems successful transacton rate of Super Trust, PD Trust and RB Trust wth smulaton cycle. It can be seen that, the system successful tradng rate of Super Trust rapdly ncrease wth smulaton cycle, and ultmately remaned relatvely stable, and t s always hgher than the other two n the entre transacton cycle, showng the strong slander effectveness of Super Trust aganst attack. Successful transacton rate Fgure 5. Changes of the successful transacton rate under DM wth the perod.3.3. Collusve fraud (CM) Fgure 7 s the comparson stuaton of successful transacton rate of the three systems Super Trust, PD Trust and RB of the malcous nodes. 3
8 In the smulaton experments, we assume that the entre front-end node s a proporton of 1% of malcous nodes. In fgure 9, we gve the successful tradng rate of cooperate nodes n Super Trust, PD Trust and RB Trust system wth a front-end node under fraudulent colluson attack. Whle wth the varous systems malcous nodes under attack fraud conspracy case were compared. Fgure 6. The comparson of successfully request rate of collusve fraud In Super Trust and PD Trust system, a malcous node s assocated wth a transacton cooperatve nodes negatve feedback, whle there have been transactons wth smlar nodes provde a hgh postve feedback. Addtonally, malcous nodes may collude wth each other frequently submtted for each other hgh postve feedback. In RB Trust, assumng a malcous node receves another node recommendaton trust request, f the nqury s smlar malcous node recommendaton trust s gven a value of 1 ; otherwse, t s -1. Fgure 8 shows the case of fraud n the colluson, when the proporton of malcous nodes s 0.6, the changes stuaton of successful tradng rate of the three types of system wth the smulaton perod. It can be seen that, the system successful tradng rate of Super Trust rapdly ncrease and eventually reman relatvely stable wth the smulaton cycle. PD Trust and RB Trust system has declned wth ncreased system performance, and the overall performance of PD Trust than RB Trust, because the feedback nformaton drectly PD Trust smple summaton of the system calculated for each node n the global trust value, when a hgh proporton of malcous nodes, the system performance s completely controlled by malcous nodes. To the RB Trust, the credblty of nformaton can determne the credblty of a gven node accordng to the local node, so the performance s better than PD Trust. Successful transacton rate Fgure 7. The changes of successful transacton rate under fraudulent colluson wth cycle.4. The collusve fraud wth a front-end node Fgure 8. The comparson of successful transacton rate under CF Under the attack of colluson fraud wth a front-end node, as the same as n the fraudulent conspracy of malcous nodes under attack, the successful transacton rate of Super Trust s better than that of PD Trust and RB Trust. But the dfference s that, n Super Trust system, the rate of successful tradng system under attack n the CM attack s better than the CF, whle n PD Trust and opposte RB Trust systems. Ths s because n the smulaton, we set the node Super Trust as long as the number of nodes n the cluster are smlar, that all nodes n the cluster as a whole s smlar to the attack of CF, malcous concealment of front-end node behavor makes t smlar to the node wth the ncreased possblty of cooperaton, and to become members of the cluster evaluaton, whch submtted a hghly malcous nodes postve comments n PD Trust and RB Trust systems, the proporton of malcous nodes n the same crcumstances, under the attack of CF, the CM system has more nodes to provde vald documents, so the system successful tradng has hgher attack rate n the CF. Fgure 10 s the comparson between colluson wth fraud and conspracy to fraud under the attack of contrast under the three systems of Super Trust, PD Trust and RB Trust whle a malcous node rato s 0.5. The system performance under the colluson attack has a front end node colluson fraud reasons as descrbed above, however, PD Trust and RB Trust opposte two mechansms, transacton success rate of the system has a front end node of colluson fraud under all the above. It s because the front end node n the sake of provdng effectve document, but PD Trust n colluson attack, the system front-end node of the hghest reputaton, and wth the ncrease of the smulaton perod, front-end node enhanced ablty to provde servces, so there cannot be effectve from the start node to dentfy malcous 4
9 front-end node capabltes, the system performance has the upward trend. 3. Concluson For the ssue of trust between the nodes n PP networks, ths paper presents a PP network trust model based on super nodes Super Trust. The model for trust ordnary nodes wthn the same group calculated usng the node nformaton and the use of local trust group belongs to recommendaton trust nformaton to determne the value of the target node's trust. Trust evaluaton super node mode usng the global trust group all nodes n the calculaton of super nodes. Fgure 9. The changes of successful transacton rate under CF wth cycle.5. Rato of malcous nodes affectng the success rate for the download In the fle download process, malcous nodes percentage success rate for the download has some nfluence, as shown n Fgure 9, because Super Trust for dentfyng malcous nodes reasonable and effectve, and to dentfy a hgh success rate, so n ths model, the rato of malcous nodes success rate for download to reduce the nfluence of some. Super Trust and PD Trust, RB Trust compared to download the success rate has greatly mproved, and wth the larger rato of malcous nodes, download success rate declned. Expermental results show that, Super Trust has a stronger ablty to resst rsks n response to changes n the proporton of malcous nodes. References [1] Raul Medna-Mora, Kelly W. Cartron. ActonWorkflow n Use: Clark County Department of Busness Lcense. In Proceedngs of the Twelfth Internatonal Conference on Data Engneerng, IEEE Computer Socety Washngton, DC, USA, 1996: [] Jan Yun, Xaotong L, Chunxa Wang. Smulaton of Conductng Early-warnng to the Endangered State of Language. Journal of Multmeda, Vol 8, No 5 (013), [3] Edward A,Stohr J, Loan Zhao. Workflow Automaton: Overvew and Research Issuse, Informaton Systems Fronters, 010, 3(3): [4] Y Yang. An Archtecture and the Related Mechansms for Web-based Global Cooperatve Teamwork Support. Internatonal Journal of Computer Informaton, 000, 4(1): [5] Fe Lu, Guangzhou Zeng. A Multagent Cooperatve Learnng Algorthm. Lecture Notes n Computer Scence, 007,440: [6] Benatalhth B,Sheng Q Z,Dumas M. The Self-serv Envronment for Web Servces Composton. IEEE Internet Computng, 013, 7(1); Fgure 10. Downloads affect the success rate of download 5
Cluster Analysis of Electrical Behavior
Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School
More informationA KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE
A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationProfessional competences training path for an e-commerce major, based on the ISM method
World Transactons on Engneerng and Technology Educaton Vol.14, No.4, 2016 2016 WIETE Professonal competences tranng path for an e-commerce maor, based on the ISM method Ru Wang, Pn Peng, L-gang Lu & Lng
More informationResearch of Dynamic Access to Cloud Database Based on Improved Pheromone Algorithm
, pp.197-202 http://dx.do.org/10.14257/dta.2016.9.5.20 Research of Dynamc Access to Cloud Database Based on Improved Pheromone Algorthm Yongqang L 1 and Jn Pan 2 1 (Software Technology Vocatonal College,
More informationNUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS
ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana
More informationLoad Balancing for Hex-Cell Interconnection Network
Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,
More informationAnalysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD
Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,
More informationA Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI
216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent
More informationA Load-balancing and Energy-aware Clustering Algorithm in Wireless Ad-hoc Networks
A Load-balancng and Energy-aware Clusterng Algorthm n Wreless Ad-hoc Networks Wang Jn, Shu Le, Jnsung Cho, Young-Koo Lee, Sungyoung Lee, Yonl Zhong Department of Computer Engneerng Kyung Hee Unversty,
More informationLearning the Kernel Parameters in Kernel Minimum Distance Classifier
Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationA New Approach For the Ranking of Fuzzy Sets With Different Heights
New pproach For the ankng of Fuzzy Sets Wth Dfferent Heghts Pushpnder Sngh School of Mathematcs Computer pplcatons Thapar Unversty, Patala-7 00 Inda pushpndersnl@gmalcom STCT ankng of fuzzy sets plays
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationSimulation Based Analysis of FAST TCP using OMNET++
Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months
More informationEfficient Distributed File System (EDFS)
Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate
More informationA New Transaction Processing Model Based on Optimistic Concurrency Control
A New Transacton Processng Model Based on Optmstc Concurrency Control Wang Pedong,Duan Xpng,Jr. Abstract-- In ths paper, to support moblty and dsconnecton of moble clents effectvely n moble computng envronment,
More informationA Clustering Algorithm for Chinese Adjectives and Nouns 1
Clusterng lgorthm for Chnese dectves and ouns Yang Wen, Chunfa Yuan, Changnng Huang 2 State Key aboratory of Intellgent Technology and System Deptartment of Computer Scence & Technology, Tsnghua Unversty,
More informationA Fast Visual Tracking Algorithm Based on Circle Pixels Matching
A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng
More informationOutline. Self-Organizing Maps (SOM) US Hebbian Learning, Cntd. The learning rule is Hebbian like:
Self-Organzng Maps (SOM) Turgay İBRİKÇİ, PhD. Outlne Introducton Structures of SOM SOM Archtecture Neghborhoods SOM Algorthm Examples Summary 1 2 Unsupervsed Hebban Learnng US Hebban Learnng, Cntd 3 A
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationVirtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory
Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process
More informationApplication of Improved Fish Swarm Algorithm in Cloud Computing Resource Scheduling
, pp.40-45 http://dx.do.org/10.14257/astl.2017.143.08 Applcaton of Improved Fsh Swarm Algorthm n Cloud Computng Resource Schedulng Yu Lu, Fangtao Lu School of Informaton Engneerng, Chongqng Vocatonal Insttute
More informationTerm Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task
Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto
More informationA Low Energy Algorithm of Wireless Sensor Networks Based on Fractal Dimension
Sensors & Transducers 2014 by IFSA Publshng, S. L. http://www.sensorsportal.com A Low Energy Algorthm of Wreless Sensor Networks ased on Fractal Dmenson Tng Dong, Chunxao Fan, Zhgang Wen School of Electronc
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More informationSecurity Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments
Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationApplication of VCG in Replica Placement Strategy of Cloud Storage
Internatonal Journal of Grd and Dstrbuted Computng, pp.27-40 http://dx.do.org/10.14257/jgdc.2016.9.4.03 Applcaton of VCG n Replca Placement Strategy of Cloud Storage Wang Hongxa Computer Department, Bejng
More informationScheduling Remote Access to Scientific Instruments in Cyberinfrastructure for Education and Research
Schedulng Remote Access to Scentfc Instruments n Cybernfrastructure for Educaton and Research Je Yn 1, Junwe Cao 2,3,*, Yuexuan Wang 4, Lanchen Lu 1,3 and Cheng Wu 1,3 1 Natonal CIMS Engneerng and Research
More informationAvailable online at Available online at Advanced in Control Engineering and Information Science
Avalable onlne at wwwscencedrectcom Avalable onlne at wwwscencedrectcom Proceda Proceda Engneerng Engneerng 00 (2011) 15000 000 (2011) 1642 1646 Proceda Engneerng wwwelsevercom/locate/proceda Advanced
More informationAn Improved Image Segmentation Algorithm Based on the Otsu Method
3th ACIS Internatonal Conference on Software Engneerng, Artfcal Intellgence, Networkng arallel/dstrbuted Computng An Improved Image Segmentaton Algorthm Based on the Otsu Method Mengxng Huang, enjao Yu,
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationVideo Proxy System for a Large-scale VOD System (DINA)
Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,
More informationResearch on Categorization of Animation Effect Based on Data Mining
MATEC Web of Conferences 22, 0102 0 ( 2015) DOI: 10.1051/ matecconf/ 2015220102 0 C Owned by the authors, publshed by EDP Scences, 2015 Research on Categorzaton of Anmaton Effect Based on Data Mnng Na
More informationBioTechnology. An Indian Journal FULL PAPER. Trade Science Inc.
[Type text] [Type text] [Type text] ISSN : 0974-74 Volume 0 Issue BoTechnology 04 An Indan Journal FULL PAPER BTAIJ 0() 04 [684-689] Revew on Chna s sports ndustry fnancng market based on market -orented
More informationX- Chart Using ANOM Approach
ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are
More informationWireless Sensor Network Localization Research
Sensors & Transducers 014 by IFSA Publshng, S L http://wwwsensorsportalcom Wreless Sensor Network Localzaton Research Lang Xn School of Informaton Scence and Engneerng, Hunan Internatonal Economcs Unversty,
More informationContent Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers
IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth
More informationRegional Load Balancing Circuitous Bandwidth Allocation Method Based on Dynamic Auction Mechanism
ATEC Web of Conferences 76, (8) IFID 8 https://do.org/./matecconf/876 Regonal Load Balancng Crcutous Bandwdth Allocaton ethod Based on Dynamc Aucton echansm Wang Chao, Zhang Dalong, Ran Xaomn atonal Dgtal
More informationMachine Learning: Algorithms and Applications
14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of
More informationAn Internal Clustering Validation Index for Boolean Data
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 6 Specal ssue wth selecton of extended papers from 6th Internatonal Conference on Logstc, Informatcs and Servce Scence
More informationImprovement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration
Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,
More informationSubspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;
Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features
More informationResearch Article A Game-Based Secure Localization Algorithm for Mobile Wireless Sensor Networks
Internatonal Dstrbuted Sensor Networks Volume 205, Artcle ID 64207, 8 pages http://dxdoorg/055/205/64207 Research Artcle A Game-Based Secure Localzaton Algorthm for Moble Wreless Sensor Networks Tanyue
More informationEvaluation of an Enhanced Scheme for High-level Nested Network Mobility
IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.
More informationImproved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment
JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School
More informationHelsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)
Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute
More informationDetermining the Optimal Bandwidth Based on Multi-criterion Fusion
Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More informationUser Authentication Based On Behavioral Mouse Dynamics Biometrics
User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA
More informationReview of approximation techniques
CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated
More informationOptimizing Document Scoring for Query Retrieval
Optmzng Document Scorng for Query Retreval Brent Ellwen baellwe@cs.stanford.edu Abstract The goal of ths project was to automate the process of tunng a document query engne. Specfcally, I used machne learnng
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationPositive Semi-definite Programming Localization in Wireless Sensor Networks
Postve Sem-defnte Programmng Localzaton n Wreless Sensor etworks Shengdong Xe 1,, Jn Wang, Aqun Hu 1, Yunl Gu, Jang Xu, 1 School of Informaton Scence and Engneerng, Southeast Unversty, 10096, anjng Computer
More informationA Robust Webpage Information Hiding Method Based on the Slash of Tag
Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based
More informationNetwork Intrusion Detection Based on PSO-SVM
TELKOMNIKA Indonesan Journal of Electrcal Engneerng Vol.1, No., February 014, pp. 150 ~ 1508 DOI: http://dx.do.org/10.11591/telkomnka.v1.386 150 Network Intruson Detecton Based on PSO-SVM Changsheng Xang*
More informationBIN XIA et al: AN IMPROVED K-MEANS ALGORITHM BASED ON CLOUD PLATFORM FOR DATA MINING
An Improved K-means Algorthm based on Cloud Platform for Data Mnng Bn Xa *, Yan Lu 2. School of nformaton and management scence, Henan Agrcultural Unversty, Zhengzhou, Henan 450002, P.R. Chna 2. College
More informationModular PCA Face Recognition Based on Weighted Average
odern Appled Scence odular PCA Face Recognton Based on Weghted Average Chengmao Han (Correspondng author) Department of athematcs, Lny Normal Unversty Lny 76005, Chna E-mal: hanchengmao@163.com Abstract
More informationSolitary and Traveling Wave Solutions to a Model. of Long Range Diffusion Involving Flux with. Stability Analysis
Internatonal Mathematcal Forum, Vol. 6,, no. 7, 8 Soltary and Travelng Wave Solutons to a Model of Long Range ffuson Involvng Flux wth Stablty Analyss Manar A. Al-Qudah Math epartment, Rabgh Faculty of
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationA Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems
A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty
More informationAn IPv6-Oriented IDS Framework and Solutions of Two Problems
An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of
More informationMaintaining temporal validity of real-time data on non-continuously executing resources
Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan
More informationThe Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole
Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng
More informationThe Research of Support Vector Machine in Agricultural Data Classification
The Research of Support Vector Machne n Agrcultural Data Classfcaton Le Sh, Qguo Duan, Xnmng Ma, Me Weng College of Informaton and Management Scence, HeNan Agrcultural Unversty, Zhengzhou 45000 Chna Zhengzhou
More informationA Clustering Algorithm Solution to the Collaborative Filtering
Internatonal Journal of Scence Vol.4 No.8 017 ISSN: 1813-4890 A Clusterng Algorthm Soluton to the Collaboratve Flterng Yongl Yang 1, a, Fe Xue, b, Yongquan Ca 1, c Zhenhu Nng 1, d,* Hafeng Lu 3, e 1 Faculty
More informationLearning-Based Top-N Selection Query Evaluation over Relational Databases
Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationTsinghua University at TAC 2009: Summarizing Multi-documents by Information Distance
Tsnghua Unversty at TAC 2009: Summarzng Mult-documents by Informaton Dstance Chong Long, Mnle Huang, Xaoyan Zhu State Key Laboratory of Intellgent Technology and Systems, Tsnghua Natonal Laboratory for
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationOverview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION
Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup
More informationSecurity Vulnerabilities of an Enhanced Remote User Authentication Scheme
Contemporary Engneerng Scences, Vol. 7, 2014, no. 26, 1475-1482 HIKARI Ltd, www.m-hkar.com http://dx.do.org/10.12988/ces.2014.49186 Securty Vulnerabltes of an Enhanced Remote User Authentcaton Scheme Hae-Soon
More informationEvaluation of Parallel Processing Systems through Queuing Model
ISSN 2278-309 Vkas Shnde, Internatonal Journal of Advanced Volume Trends 4, n Computer No.2, March Scence - and Aprl Engneerng, 205 4(2), March - Aprl 205, 36-43 Internatonal Journal of Advanced Trends
More informationAn Image Fusion Approach Based on Segmentation Region
Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua
More informationMathematics 256 a course in differential equations for engineering students
Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the
More informationFINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK
FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,
More informationReal-time Fault-tolerant Scheduling Algorithm for Distributed Computing Systems
Real-tme Fault-tolerant Schedulng Algorthm for Dstrbuted Computng Systems Yun Lng, Y Ouyang College of Computer Scence and Informaton Engneerng Zheang Gongshang Unversty Postal code: 310018 P.R.CHINA {ylng,
More informationEvaluation of the application of BIM technology based on PCA - Q Clustering Algorithm and Choquet Integral
IETI Transactons on Busness and Management Scences, 2016, Volume 1, Issue 1, 47-55. http://www.et.net/tc An Internatonal Open Access Journal Evaluaton of the applcaton of BIM technology based on PCA -
More informationSome material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier
Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More informationEfficient Broadcast Disks Program Construction in Asymmetric Communication Environments
Effcent Broadcast Dsks Program Constructon n Asymmetrc Communcaton Envronments Eleftheros Takas, Stefanos Ougaroglou, Petros copoltds Department of Informatcs, Arstotle Unversty of Thessalonk Box 888,
More informationDesign of Structure Optimization with APDL
Desgn of Structure Optmzaton wth APDL Yanyun School of Cvl Engneerng and Archtecture, East Chna Jaotong Unversty Nanchang 330013 Chna Abstract In ths paper, the desgn process of structure optmzaton wth
More informationFAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks
2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng
More informationQuery Clustering Using a Hybrid Query Similarity Measure
Query clusterng usng a hybrd query smlarty measure Fu. L., Goh, D.H., & Foo, S. (2004). WSEAS Transacton on Computers, 3(3), 700-705. Query Clusterng Usng a Hybrd Query Smlarty Measure Ln Fu, Don Hoe-Lan
More informationHigh-Boost Mesh Filtering for 3-D Shape Enhancement
Hgh-Boost Mesh Flterng for 3-D Shape Enhancement Hrokazu Yagou Λ Alexander Belyaev y Damng We z Λ y z ; ; Shape Modelng Laboratory, Unversty of Azu, Azu-Wakamatsu 965-8580 Japan y Computer Graphcs Group,
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationHybrid Non-Blind Color Image Watermarking
Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationA Novel Distributed Collaborative Filtering Algorithm and Its Implementation on P2P Overlay Network*
A Novel Dstrbuted Collaboratve Flterng Algorthm and Its Implementaton on P2P Overlay Network* Peng Han, Bo Xe, Fan Yang, Jajun Wang, and Rumn Shen Department of Computer Scence and Engneerng, Shangha Jao
More informationUB at GeoCLEF Department of Geography Abstract
UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department
More informationKey-Selective Patchwork Method for Audio Watermarking
Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng
More informationA Fast Content-Based Multimedia Retrieval Technique Using Compressed Data
A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,
More informationOn the Virtues of Parameterized Uniform Crossover
On the Vrtues of Parameterzed Unform Crossover Wllam M. Spears Naval Research aboratory Washngton, D.C. 20375 USA spears@ac.nrl.navy.ml Kenneth A. De Jong George Mason Unversty Farfax, VA 22030 USA kdejong@ac.gmu.edu
More informationResearch and Application of Fingerprint Recognition Based on MATLAB
Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department
More informationREFRACTIVE INDEX SELECTION FOR POWDER MIXTURES
REFRACTIVE INDEX SELECTION FOR POWDER MIXTURES Laser dffracton s one of the most wdely used methods for partcle sze analyss of mcron and submcron sze powders and dspersons. It s quck and easy and provdes
More informationChinese Word Segmentation based on the Improved Particle Swarm Optimization Neural Networks
Chnese Word Segmentaton based on the Improved Partcle Swarm Optmzaton Neural Networks Ja He Computatonal Intellgence Laboratory School of Computer Scence and Engneerng, UESTC Chengdu, Chna Department of
More informationy and the total sum of
Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton
More information