Advanced Materials Research Vols. 255-260

Paper Title Page

Abstract: Polynomial smooth techniques are applied to Support Vector Regression model by an accurate smooth approximation which is offered by Hermite Interpolation polynomial. We use Hermite Interpolation to generate a new polynomial smooth function which is proposed for the function in ε-insensitive support vector regression of interpolation functions. Their important property is discussed. It can be shown that the approximation accuracy and smoothing rank of polynomial functions can be as high as required.
2215
Abstract: A new congestion control algorithm of code division multiple access (CDMA) is developed to reduce the cost of system. Firstly,the paper defines the utility function of resource throughout,and then set up the mathematics model according to the wireless resource characteristic. In the approach only the non-linear compensating term, solution of a sequence of adjoint vector differential equations, is required iteration. By taking the finite iteration of non-linear compensating term of optimal solution sequence, a suboptimal congestion control algorithm of CDMA can be obtained. It is proved by analysis in theory and system level simulation that the congestion control algorithm can enlarge system throughput while controlling system load.
2220
Abstract: Advances in networking technologies and the continued growth of the internet have triggered a new trend towards outsourcing data management and information technology needs to external service providers, and privacy requirements have an increasing impact on such real-world applications. In this paper, we propose a solution to enforce data privacy over outsourced database services. The approach starts from a flexible definition of privacy constraints on a relational schema, applies encryption on information in parsimonious way and mostly relies on attribute partition to protect sensitive information. Based on the approximation algorithm for the minimal encryption of attribute partition and the decomposition of SQL queries, the approach allows storing the outsourced data on a single database server and minimizing the amount of data represented in encrypted format, and allows executing queries over encrypted outsourced database efficiently.
2224
Abstract: This article detailedly elaborated the design principles of the two-vehicle joint operating control system based on joint-movement navigation,meanwhile it presented the frame of hardware circuit and software design. Adopting passive acoustic detection triangulation technique and two- vehicle navigation by the same sound frequency and time-sharing operation, together with dynamic route optimization strategy, so as to make sure that the two-vehicle has a higher joint-movement speed and positioning accuracy, and it automatically avoids obstacles and site boundary.
2229
Abstract: There is a problem that the difficulty in text classification will increase when the number of classes increases, to which hierarchical structure is a viable solution. Well, a document’s hierarchical structure is usually maintained only by hand, which require substantial manpower to find the correct position of a document in the class hierarchy or to reconstruct the hierarchy. Constructing the hierarchical structure automatically by clustering the training samples can effectively reduce the cost of manual maintenance, and at the same time, it can avoid the conflict between the prior knowledge and the statistical properties of the sample set caused by artificial maintenance of the hierarchy.
2233
Abstract: We propose a novel scheme, called Content-based Multilevel Caching Policy (CMCP) for super-peer networks that support hierarchical P2P architecture. Peers share information according the content between peers and between shared files to self-organise into clustered groups. Simulation experiments show that the CMCP policy achieves significant improvements in terms of access latency and global cache hit ratio.
2238
Abstract: A secure communication scheme based on piecewise linear chaotic system is proposed. Two Chaotic Systems are used in this algorithm, with a symbolic sequence generated by a Chaotic System the message sequence is tracked, employing the chaotic masking technique the message for transmitted is encrypted with a binary sequence extracted from another Chaotic System. The theoretic and experience results stated that the proposed algorithm has many properties such as high speed and easy implementing and high security and it is suitable for practical use in the secure communication.
2242
Abstract: An intelligent algorithm is proposed to extract the zipper teeth region image from color origin’s. First, some pixels in the original image are selected arbitarily and their gray level comatrix with different neighbourhood scale are calculated in order to establish the texture feature matrix. Second, the rough k-means is employed to cluster all the arbitarily selected pixels. The arbitarily selected pixels which are located in zipper teeth area would be classified in the same cluster. Then, the convex hull of those pixels located in zipper teeth is calculated in order to extract the regional image. The experiments show that the new proposal not only can be quick and accurate to extract the zipper teeth regional image but can extract different color and styles zipper teeth without setting any parameters by human, which reflects the new algorithm has good adaptability.
2248
Abstract: A smart predictive control algorithm which can be designed for temperature control is proposed in this paper. The control algorithm is implemented by establishing the model of heating furnaces and calculating its model parameters online. The computational load of this algorithm is very small since the complex matrix computing can be avoided. Experimental results show that the temperature controller using this algorithm has good tracking performance and little overshoot. Moreover, it is better than a fuzzy PID controller.
2253
Abstract: This paper mainly discusses the performance of three typical data dissemination schemes in opportunistic sensor networks, which include rumor spread protocol, direct dissemination protocol and the protocol based on evolvement strategy. The main idea of the protocol based on evolvement strategy is that in the process of data dissemination, those nodes with higher dissemination validity are dynamically to substitute the node with lower dissemination validity. This paper makes detail theory analysis on the performance of these protocols. The performance of these protocols also is compared with simulation experiments further more.
2257

Showing 441 to 450 of 837 Paper Titles