Advanced Materials Research Vols. 756-759

Paper Title Page

Abstract: Designed a DNA-based genetic algorithm under the universal architecture of organic computing, combined particle swarm optimization algorithm, introduced a crossover operation for the particle location, can interfere with the particles speed, make inert particles escape the local optimum points, enhanced PSO algorithm's ability to get rid of local extreme point. Utilized improved algorithms to train the RBF neural network models, predict short-time traffic flow of a region intelligent traffic control. Simulation and error analysis of experimental results showed that, the designed algorithms can accurately forecast short-time traffic flow of the regional intelligent transportation control, forecasting effects is better, can be effectively applied to actual traffic engineering.
2785
Abstract: Network externality is a vital characteristic of the products in economics of networks. Network congestion will lead to negative network externality when digital products are communicated in the net. It will effectively decrease the negative network externality via developing a suitable pricing mechanism. This paper begins with the utility of a single user and that of the whole network to build a network congestion utility model to analyze it. As TCP connection has an autonomous congestion-detecting mechanism which can increase the utilization of network resources, we regard the TCP connection pricing as the basis of our research.
2790
Abstract: With development of wireless Internet, the interworking of the third generation (3G) and wireless Local Area Network (WLAN) has become a focus research. Fusion of 3GWLAN has complementary advantages. The background and scheme of 3G and WLAN Fusion are discussed. The security of Fusion was analysed. Presents two security Fusion schemes has given. The first is called a loose coupling, The second is called close coupling. Two schemes are complement each other, realize the 3G and WLAN user unified management and 3G signing based on user WAPI security mechanism of WLAN access, and protect the user privacy.
2795
Abstract: In order to solve knapsack problems efficiently, an improved genetic algorithm based on adaptive evolution in dual population (called DPAGA) is proposed. In DPAGA, the new population produced by selecting operation is regarded as main population. The population composed by the individuals washed out by selecting operation is regarded as subordinate population. The individual evolution strategy of main population is different from that of subordinate population. The crossover operators and mutation operators are all adjusted non-linearly and adaptively. DPAGA is used to solve knapsack problems. The experimental results show that its convergence speed and solution quality are all better then that of simple genetic algorithm. It is also suited to solve other optimization problems.
2799
Abstract: With the expansion of the research field, the research object of some original seemingly unrelated properties have been studied together. At this time, the number of attribute in formal context has changed. For the increased attributes, we need to construct a new concept lattice. The existing incremental building algorithms of concept lattice need the original formal context as the basis, with single attribute or a set of attribute of the object to rebuild the concept lattice. They can't effectively utilize these existing concept lattice that have not relation in attributes. Here, the paper presents one new algorithm for incorporating concept lattice based on the existed concept lattices. We can directly build the together lattice from bottom to top by direct product operation on the existed concept lattices and the mapping relation between the direct product lattice of two existed concept lattices and the together lattice. Formal contexts that attribute sets have no intersection are fit for this algorithm.
2803
Abstract: Computing the roots of polynomials is an important issue in various geometric problems. In this paper, we introduce a new family of iterative methods with sixth and seventh order convergence for nonlinear equations (or polynomials). The new method is obtained by combining a different fourth-order iterative method with Newtons method and using the approximation based on the divided difference to replace the derivative. It can improve the order of convergence and reduce the required number of functional evaluations per step. Numerical comparisons demonstrate the performance of the presented methods.
2808
Abstract: In view of the present medical neurons characteristic cognition and human brain plan in the neurons of the limitation of recognition, this paper puts forward the neurons identification method. First the L - Measure software to neuron geometry feature extraction, and then to extract high dimensional feature through the principal component analysis dimension reduction processing. Combined classifier with pyramidal neurons, general Ken wild neurons, motor neuron, sensory neurons, double neurons, level 3 neurons and multistage neurons 7 kinds of neurons are classified. Experimental results prove that the probabilistic neural network, the BP neural network, fuzzy classifier composed of classifier recognition effect is superior to the arbitrary single classifier.
2813
Abstract: Probabilistic neural network compared with the traditional BP neural network structure is simpler and it is faster to be identificated, so it is widely used in the field of pattern recognition. This paper is mainly focused on similar gesture recognition research, propose an probabilistic neural network gesture recognition algorithm. The simulation results show that the improved probabilistic neural network algorithm on the recognition rate and training time is better than the traditional BP network.
2819
Abstract: Parallel computing is in parallel computer system for parallel processing of data and information, often also known as the high performance computing or super computing. The content of parallel computing were introduced, the realization of parallel computing and MPI parallel programming under Linux environment were described. The parallel algorithm based on divide and conquer method to solve rectangle placemen problem was designed and implemented with two processors. Finally, Through the performance testing and comparison, we verified the efficiency of parallel computing.
2825
Abstract: Server virtualization is to create and run several independent operation systems at the same time to maximize the utilization efficiency and flexibility of IT resource, the most serious security problem of which, however, is the unauthorized access of unsafe virtual machines. This paper presents a SELinux-based secure server virtualization method against the issue. With SELinux access control, virtual machine process is isolated from system processes by setting up different type labels and access control policies. Whats more, different virtual machine processes can be independent with each other by introducing Multi Category Security (MCS) protection mechanism, thus to achieve secure access of server virtualization. Finally the realization of the method is presented.
2829

Showing 571 to 580 of 959 Paper Titles