The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents an anomaly detection model based on normalized mutual information feature selection (NMIFS) and quantum wavelet neural network (QWNN). The goal of the proposed model is to address the problem of determining the feature subset used to detect an anomaly in a machine learning task. In order to achieve an effective reduction for high-dimensional feature data, the NMIFS method is used...
In order to rapidly response to users request in high-speed mobile environment, achieve efficient content distribution in content center network, this paper proposed a novel multipath routing transmission mechanism based on network coding (MRNC). By using network coding technology, users Interest packet is divided into multiple child interest packet, and the content is divide and random linear codes...
The low and medium frequency signal generator with high precision and high stability is widely used in experiment courses, mechanical, engineering and other fields. In order to meet the special needs of these fields, this paper puts forward a design scheme of signal generator based on DDS. Combined with the advantage of virtual instrument technology, the user can set the signal parameters on PC control...
By combining information security, computer network technology, wireless communication technology and genetic algorithm, this paper puts forward a design scheme of intelligence express logistics system based on RFID and conducts a study on its overall framework and system flow, which emphatically discusses key technologies such as intelligence path planning, the safety of on-vehicle data and electronic...
In view of the low bandwidth, the high error rate and the high delay of wireless networks, this paper analyzes several related parameters of multimedia data flow transmission in wireless network environment and establishes simulation model in NS2. Through the simulation analysis of the different packet error rate, the compression quantization parameter, the length of GOP and packet for image quality...
Plan recognition is a focus of Artificial Intelligence. In this paper, combined with a flexible planning approach, a flexible plan recognition method which is based on the flexible planning is given, and the construction process of flexible planning is supplied. Based on these, we design the method of flexible goal graph extending, give the main theoretical analysis of the goal graph, and greatly...
Plan recognition is an important field in artificial intelligence. In this paper, a new plan recognition algorithm based on plan knowledge graph to predict future actions was presented. The algorithm is more powerful and simpler, comparing with other algorithms. It can be used to handle the condition of partial observation and predict future actions. The experimental results show that the algorithm...
Genetic algorithm is one important method for solving vehicle routing problem. Genetic algorithm has the special advantages in solving vehicle routing problem. A genetic algorithm for logistics vehicle routing problem is designed and implemented in this paper. At the same time the key technologies such as the implementing of the genetic algorithm based on natural number encode in the logistics vehicles...
In a large-scale F-HMIPv6 network, it is important for a mobile node (MN) to select the most appropriate MAP, this paper proposes a new MAP selection scheme, which considers load balancing, session arrival and the movement velocity of MN. The simulation analysis shows that this new MAP selection scheme can be more effective to share the load and enhance robustness for F-HMIPv6 network.
The theory of modern immunology provides a novel idea to study network intrusion detection and defence system. Inspired information processing in biology immune system is a highly parallel and distributed intelligent computation which has learning, memory, and associative retrieval capabilities. The architecture of multi-agent in depth defence based on immune principle is proposed. The agents of intrusion...
The concepts of self, nonself, antibody, antigen and vaccine in in-depth-defense system for network security was presented in this paper, the architecture of in-depth defense for network intrusion and detection based on immune principle is proposed. The intrusion information gotten from current monitored network is encapsulated and sent to the neighbor network as bacterin; therefore the neighbor network...
Plan recognition is useful in many fields. It is significant to develop efficient recognition algorithms. In this paper, the event relations in plan recognition were deliberatively studied, and a new plan recognition algorithm to predict future actions was presented. The algorithm is based on plan knowledge graph and it integrates the bottom-up and top-down methods to construct solution graph. The...
Dominance-based Rough Set Approach (DRSA) is an extension of classical Rough Set Theory (RST) to deal with inconsistent problems. Approximation of class unions is the key method of DRSA and it is a very complex computing job. However, the formal work within DRSA only proposed relative definitions of the concept including approximation of class unions, but no efficient algorithm has been given. So...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.