Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
Reflects downloads up to 13 Nov 2024Bibliometrics
Skip Table Of Content Section
article
RBF neural network based on q-Gaussian function in function approximation

To enhance the generalization performance of radial basis function (RBF) neural networks, an RBF neural network based on a q-Gaussian function is proposed. A q-Gaussian function is chosen as the radial basis function of the RBF neural network, and a ...

article
A robust extraction algorithm for biomedical signals from noisy mixtures

Blind source extraction (BSE) is widely used to solve signal mixture problems where there are only a few desired signals. To improve signal extraction performance and expand its application, we develop an adaptive BSE algorithm with an additive noise ...

article
An efficient approach to representing and mining knowledge from Qing court medical records

Research on Qing Court Medical Records (RQCMR) is a large-volume book which was edited and annotated by the sixth co-author Keji, Chen and his colleagues, and consists of all the medical records of imperial families and ...

article
Answering contextual questions based on ontologies and question templates

Contextual question answering (CQA), in which user information needs are satisfied through an interactive question answering (QA) dialog, has recently attracted more research attention. One challenge is to fuse contextual information into the ...

article
Nearest-neighbor classifier motivated marginal discriminant projections for face recognition

Marginal Fisher analysis (MFA) is a representative margin-based learning algorithm for face recognition. A major problem in MFA is how to select appropriate parameters, k 1 and k 2, to construct the ...

article
Approximation operators based on vague relations and roughness measures of vague sets

Rough set theory and vague set theory are powerful tools for managing uncertain, incomplete and imprecise information. This paper extends the rough vague set model based on equivalence relations and the rough fuzzy set model based on fuzzy relations to ...

article
Identity-based key distribution for mobile Ad Hoc networks

An identity-based cryptosystem can make a special contribution to building key distribution and management architectures in resource-constrained mobile ad hoc networks since it does not suffer from certificate management problems. In this paper, based ...

article
On cross-correlation indicators of an S-box

Substitution boxes (S-boxes) are often used as the most important nonlinear components in many symmetric encryption algorithms. The cryptographic properties of an S-box directly affect the security of the whole cipher system. Recently, generalized ...

article
Two-thirds simulation indexes and modal logic characterization

Two-thirds simulation provides a kind of abstract description of an implementation with respect to a specification. In order to characterize the approximate two-thirds simulation, we propose the definition of a two-thirds simulation index which ...

article
Certifying assembly programs with trails

In this paper, we introduce a new way of certifying assembly programs. Unlike previous program logics, we extract the control-flow information from the code and generate an intermediate trail between the specification and the real code. Trails are ...

article
A recursive model for static empty container allocation

Backlogged empty containers have gradually turned into a serious burden to shipping networks. Empty container allocation has become an urgent settlement issue for the container shipping industry on a global scale. Therefore, this paper proposes an ...

article
Non-cooperative optimization games in market-oriented overlay networks: an integrated model of resource pricing and network formation

In this paper, we formulate a non-cooperative optimization game in market-oriented overlay networks where participating peers share their own computing resources to earn virtual money called energy. We model an overlay network as a set of non-...

article
Research on resource allocation for multi-tier web applications in a virtualization environment

Resource allocation for multi-tier web applications in virtualization environments is one of the most important problems in autonomous computing. On one hand, the more resources that are provisioned to a multitier web application, the easier it is to ...

article
A PTS-PGATS based approach for data-intensive scheduling in data grids

Grid computing is the combination of computer resources in a loosely coupled, heterogeneous, and geographically dispersed environment. Grid data are the data used in grid computing, which consists of large-scale data-intensive applications, producing ...

Comments