Liming Zhang, Huiyou Chang, Ruitian Xu
Currently, FCFS scheduling method is widely used in hospitals for patient admission scheduling, which ignores the impacts of patient length of stay and surgery arrangement on the usage of hospital resources. This paper proposes a more comprehensive mathematical model and evaluation mechanism for the...
Lijuan Ma, Chunhui Zhao
In order to solve the problem of spectral distortion and the fuzzy texture in visible and infrared image fusion technology, a novel visible and infrared image fusion method based on the Nonsubsampled Contourlet Transform (NSCT) and Pulse Coupled Neural Networks (PCNN) is proposed in this paper. First,...
Xingyuan Li, Qingshui Li
In order to find information of interest and found valuable information resources in enrich Internet data. This paper describes a personalized recommendation system, personalized recommendation system is an intelligent recommendation system to help e-commerce site for customers to provide complete personalized...
Yinpeng Yu, Yuhuai Peng, Lei Guo, Meng Song
In order to solve the green energy saving problem with the wireless routing technology, a new energy-efficient survivable routing protocol, called Energy-efficient Survivable AODV (ES-AODV) for unicast demand in green Wireless Mesh Networks (WMNs), is proposed in this paper. The routing protocol uses...
Gang Wang, Yuli Lei, Chongjun Wang, Shaojie Qiao
This paper proposed a framework and an algorithm for identifying communities in dynamic social networks. In order to handle the drawbacks of traditional approaches for social network analysis, we utilize the community similarities and infrequent change of community members combined with community structure...
Xin Yang, Long Zhang, Chunming Li, Guoqiang Li
In this paper, we propose a new type of threshold proxy signature scheme: hybrid threshold proxy signature (HTPS), in which a signature is cooperatively generated by the partial original signers themselves and the proxy signers on behalf of their own original signer in threshold proxy way. We formalize...
Fei-Yu Wang, Zi-Wei Zheng, Wei-Hua Li
In the current study, using methods of signal processing to manage gene prediction has attracted great attention. At first, the voss mapping which can map the DNA alphabetic sequence into the numerical sequence and the 3-base periodicity of exon are introduced. Then a fixed-length sliding window approach...
Xiao-feng Li, An Shi, Jian-guo Luo
To solve the university timetabling problem (UTP) effectively, a immune algorithm-based solution for UTP was proposed. The mathematical model of UTP was expounded, a framework of immune algorithm was given, and simulation experiments were done to validate algorithm. Experimental result shows that proposed...
Qingzhang Chen, Yunfeng Ni, Xinghua Li, Rongjie Wu, Yanjing Lei
Wireless sensor node's localization is a funda-mental technology in Wireless Sensor Networks. There are only quite a few study on three-dimensional (3D) localization which is suffered in slow progress, actually, is one of the main difficulties in WSN localization. Based on the study of the existing two-dimensional...
Qingzhang Chen, Yuzheng Chen, Congling Fan, Fan Yang, Peng Wang
Machine learning uses experience to improve its performance. Using Machine Learing, to locate the nodes in wireless sensor network. The basic idea is that: the network area is divided into several equal portions of small grids, each gird represents a certain class of Machine Learning algorithm. After...
Zhenyou Zhang, Dongguang Wang, Zhi Cao
The data synchronous of the distributed heterogeneous database was one of the important researches for the heterogeneous databases. This paper analyzed the data synchronization optimization mechanism of the distributed heterogeneous database and puts forward to get the minimum change data set from each...
Zhenyou Zhang, Ziqi Zhao, Zhi Cao
Between each node database there must be different in the distributed heterogeneous database system, so how to resolve these different (It's said that realize the mutual transformation between heterogeneous databases) was an basic problem in the heterogeneous database system. This paper analyzes the...
Zhenyou Zhang, Bochen Sun, Zhi Cao
Data island exists in most of the information system. And the system platform integration could eliminate the existence of the information island. This paper visited database information system through the EJB component technology, and using the metadata way to extracted data information from the heterogeneous...
Ling-Dong Su, Ming-Yue Zhai, Zhi-Yu Zhu
Since real-time and communication amount is crucial for the wireless sensor network target tracking, the performance of target tracking in the wireless sensor network is critically depended on real-time and communication amount reduction. This paper presents a target tracking method based on distributed...
Junyi Chen, Pingyuan Xi
As the main influence factors on price fluctuations of corn futures is more complex, so analyzing these factors that is very difficult. In this paper, China's consumer confidence index and consumer price index are selected as variables of the rational expectations so that the econometric model is created...
Junyi Chen, Shuping Han
At present, the credit management mode of commercial bank in lianyungang for the SMEs is still in the exploring, although the various credit policy for the small and medium-sized enterprises has been come out, the risk management plan and operation method that really suit for credit demand for the SMEs...
Shu-Guang Jia, Li-Peng Lu, Ling-Dong Su, Gui-Lan Xing, Ming-Yue Zhai
Smart grid has become one hot topic at home and abroad in recent years. Wireless Sensor Networks (WSNs) has applied to lots of fields of smart grid, such as monitoring and controlling. We should ensure that there are enough active sensors to satisfy the service request. But, the sensor nodes have limited...
Yongxian Song, Juanli Ma, Xianjin Zhang
The resources of wireless sensor nodes are limited, and the power of nodes is supplied with battery whose capacity is very limited, once the energy of battery is run out, the nodes will lose their effect, so there are serious energy constraint in wireless sensor network. In this paper, the specific energy...
Hui Yao, Ying Wu
For estimating two-dimensional direction of arrival (DOA) of local scattering distributed source, the computational complexity of various algorithms for DOA is prohibitively high, induced by high dimension searching manipulation. According to this problem, an ESPRIT-like algorithm is proposed. The proposed...
Wei Yuan, Liyi Zhang
An optimized fast fixed point algorithm based on modified Newton iteration method has been proposed. With good performance of the blind image separation, the optimized algorithm can improve the convergence speed greatly. We proposed a new adaptive enhancement parameter to enhance the separated images...
Yulian Shang, Xiujuan Wang, Yujuan Li, Yufei Zhang
Based on Elliptic Curve cryptosystem, a threshold signature scheme characterized by (k, l) joint verification for (t, n) signature is put forward. After being signed by a signer company employing (t, n) threshold signature scheme, the information m is transmitted to a particular verifier company, and...
Si Ha, Enbo Tang
With the development of natural language processing technology, a powerful tool containing semantic information is in great need in lexical semantic processing. Aiming at automatic processing of words in machine translation and automatic proofreading, Wordnet mainly provides semantic information in the...
Yancheng Li, Hua Duan, Qingtian Zeng, Faming Lu
User-interactive question answering systems are catching more and more attention, however users’ complaints arise within it from such problems as unfair compensation. This paper focuses on a -calculus-based formal model for the complaint process of a user-interactive question answering system. The formal...
Wei SHEN
The power line communications (PLC) channel is noisy one, which can be modeled by the Markov process. The order is the key concerning when used the Markov process. the level of complexity will be incurred from using higher order , while the first-order Markov models may lead to the less accurate channel...
Hui Wang, LianZhong Liu
As an extremely important platform of data storage, database management system(DBMS) is widely used in all kinds of enterprises and departments. The availability and security is a critical performance index for database. How to help administrator keep database secure and effective is a key job of database...
Liang Zhang, Jiwen Dong
Aiming at solving the problems of occlusion and illumination in face recognition, a new method of face recognition based on Kernel Principal Components Analysis (KPCA) and Collaborative Representation Classifier (CRC) is developed. The KPCA can obtain effective discriminative information and reduce the...
Yuqiao Deng, Ge Song
This paper proposes a new verifiable visual cryptography scheme for general access structures using pi-sigma neural networks (VVCSPSN), which is based on probabilistic signature scheme (PSS), which is considered as security and effective verification method. Compared to other high-order networks, PSN...
Zhiying Tan, Ying Chen, Kun She, Yong Feng
Kernel methods can effectively deal with the nonlinear problem. The methods not only can be used for data de-noising, also be effective for classification problems. Using kernel PCA method, we provide a more precise Zernike expansion, which can apparently improve the reconstruction accuracy. At the same...
Fulu Jin, Yunpeng Li, Hongrui Wang
To automatic test the function and performance of an airborne radar, changeable test adapter is adopted to implement the hardware and software design of the automatic test set of the antenna, transceiver and indicator of the radar based on AT89C52. Problems such as t the different types of interfaces,...
Xiaowei Gao, Zemin Jiang, Rui Jiang
Recently, Hota et al. present a Capability-based Cryptographic Data Access Control in Cloud Computing. This scheme implements data storage, user authorization, data access and integrity checking. However, we find two fatal attacks in the data exchange between CSP and User. These attacks makes a registered...
JunHui Wu, TongDi Qin, Jie Chen, HuiPing Si, KaiYan Lin
In order to solve the problem of slotting optimization management with automated storage and retrieval system (AS / RS), the genetic algorithms of the slotting optimization process with stereo warehouse were discussed. The process of the slotting optimization was designed by the real-number coding. The...
Xiaodong Wang, Jun Tian
Building an efficient data structure for range selection problems is considered. While there are several theoretical solutions to the problem, only a few have been tried out, and there is little idea on how the others would perform. The computation model used in this paper is the RAM model with word-size...
Xiangyu Wu, Jinrui Liu, Hang Gong, Gang Ou
Data simulation is an important auxiliary method for baseband signal processing algorithm design of digital IF GNSS receiver. Especially when the high sensitivity and high dynamic receivers are developed, or multipath and cross correlation mitigation techniques are considered, exact and complete tests...
FuPeng Qiu, HongJie Wan, XueWei Wang
In order to satisfy the requirement of the underwater acoustic positioning system for offshore oil exploration, a design idea for water surface communication system of ultra short base line(USBL) positioning system. The main function of this design is to achieve high-quality communication with underwater...
Xinlian Zhou, Sheng Chen
One fundamental task of wireless sensor networks (WSNs) is to save sensor power, and try to prolong the lifetime of WSNs. Traditional routing protocols are almost based on homogeneous WSNs, all sensors are use single hop or multi-hop to transmit data to base station, which lead to overload sensors next...
Yang Liu, Jinzhao Wu
Under the network environment, it inevitably exists inconsistency and dynamic information in users’ requirements because of the complicated and volatile network, update, restructuring and so on. This paper studies how to handle the inconsistent information and keep correctness of the requirement goals...
Jing He, Wei Zhou, Shipu Wang
Nowadays, peer-to-peer technology has provided users with cheap and powerful communicating facilities. However, P2P streaming system faces two challenges. Firstly, how to improve the poor Quality-of-Experience (QoE) in unpopular channel Secondly, how to select peers to contribute their resources for...
Lei Zhuang, Zhen Gao, Hao Wu, ChunXin Yang, Miao Zheng
Software testing play a significant role in modern software development and maintenance process, which is also an important means to ensure software reliability and improve software quality. With the continuous improvement of quality requirements of the software products and software engineering technology...
Yulin Zhang, Tongtong Wang, Changbin Shang
The Internet of Things accelerates the development of RFID technology. Logistics, transportation, aviation and other fields has increasingly high demand on the reader's identification distance and reliability. In order to meet the market demand, the design of RFID reader based on the dual-mode was proposed....
Shangfu Gong, Ligang Wu, Yanjun Wang
Video surveillance, convenience and rich information, has been widely used in security, protection, monitoring and other occasions, and has already been one of the most important precautionary measures in commercial, residential and transportation areas. However, considering the massive data transmission...
Naining Wen, Shangfu Gong, Yanjun Wang
Illustrating the advantages and disadvantages of several commonly used methods to develop serial communication program under Microsoft Windows, this article uses a serial communication class through a third party, namely the use the Remon Spekrijse provided free serial port class CSerial the Port class,...
Jieyun Xia, Shuaibin Lian
LLE is a very effective non-linear dimension reduction algorithm and widely explored in machine learning, pattern recognition, data mining and etc. ‘Locally linear, Globally non-linear’ has always been regarded as the features and advantages of LLE. However, the theoretical derivation presented in this...
Fu Li, Xue-fen Chi, Jia-sheng Zhang, Xu-dong Li
To investigate and forecast the traffic characteristics of important M2M service--Small data service, we modeled its arrival process and analyzed the effects it has on current wireless network. By simulating service logic and designing traffic generation function of typical M2M small data service on...
Hang Li, Zhongzhi Luan
We present a performance tool for Earth system models development to aid in analyzing the performance of the climate modeling applications. It is difficult for existing tools to handle with the complex, coupled structure and the long execution time of models. Our performance tool implements rapid analysis...
Ya-qin Fan, Ling Lv, Mei-lin Liu, Fei Xie
In this paper, through specific description of the concept of virtual private network VPN, operating principles and the IPSec protocol, and using the OPNET software for performance simulation of IPSec VPN network, we get the result of IPSec VPN throughput of the network, which is unstable. o though IPSec...
Ya-qin Fan, Yu Ding, Mei-lin Liu, Xin Zhang
Wireless sensor network ( WSN ) is a kind of energy constrained network, by using data fusion technology, the elimination of redundant data, can save energy, prolong the network life purpose. Data fusion in wireless sensor network can realize different protocol layers, Based on the introduction of wireless...
Chen Wang, Lianzhong Liu, Lijie Gao
Nowadays, people pay great attention to the privacy protection, therefore the technology of anonymization has been widely used. However, most of current methods strictly depend on the predefined ordering relation on the generalization layer or attribute domain, making the anonymous result is a high degree...
Yukun Yao, Zhihu Liu, Zhi Ren, Yadi Wen
To address the problems in Opportunistic Networks that nodes employing routing algorithms based on epidemic mechanism can’t sense their neighboring nodes timely and many redundant data packets permeate through the network, an efficient routing algorithm based on XOR network coding was proposed (Xor Network...
Jian Zhang, Changgao Xia
According to the real dimension of the braking disc, the finite element modeling for three-dimensional transient cyclic symmetry during the long downhill braking is established. The distribution of the transient temperature field of the brake disc during the braking are analyzed. The variation of the...
Ping Li, Yong Li
In order to reduce the workload of constructing domain ontology, this paper proposes a transformation method from thesaurus into domain ontology. We can take building the cereal crops’ domain ontology as an example to detail narrative of the process of the transformation and to prove the effectiveness...