IJCNIS Vol. 3, No. 4, Jun. 2011
Cover page and Table of Contents: PDF (size: 149KB)
The configuration of port’s loading-and-unloading equipment is an optimization problem, which endeavors to put limited handling equipment to each operating line to achieve the maximum overall production efficiency. We set up the T-stage decision-making model of loading-and-unloading line equipment configuration by using the method of Multi-stage Decision, and design the algorithm of the mathematical model. Research results in this paper lay the foundation for the development of loading-and-unloading equipment configuration system, and provide scientific basis for the decision of type selection and rational quantity of loading-and-unloading equipment.[...] Read more.
By our analysis, the QoS routing is the optimization problem under the satisfaction of multiple QoS constraints. The Particles Swarm Optimization (PSO) is an optimization algorithm which has been applied to finding shortest path in the network. However, it might fall into local optimal solution, and is not able to solve the routing based on multiple constraints. To tackle this problem, we propose a new method of solving the multiple constraints routing. This paper firstly sets up a multi constrained QoS routing model and constructs the fitness value function by transforming the QoS constraints with a penalty function. Secondly, the iterative formulas of the original PSO are improved to tailor to non-continuous search space of the routing problem. Finally, the natural selection and mutation ideas of the Genetic Algorithm (GA) are applied to the PSO to improve the convergent performance. The simulation results show that the proposed GA-PSO algorithm can not only successfully solve the multi-constrained QoS routing problem, but also achieves a better effect in the success rate of the searching optimal path.[...] Read more.
The firing activity of a neuronal population is correlated, which has been linked to information coding and exchanging. Short-term synaptic plasticity allows synapses to increase (facilitate) or decrease (depress) over a wide range of time scales. It is critical to understand the characteristics and mechanisms of the correlated firing and the role of short-term synaptic plasticity in regulating firing activity. The short-term synaptic depression and facilitation are examined at the synapses in the inhibitory feedback loop of feedback neural networks. Numerical simulations reveal that the modulation of the correlated firing by dynamics of depression and facilitation is due to their effects on the synaptic strength. By varying synaptic time constants, the enhancement in either firing rate or intensity of oscillations can improve the correlated firing. Our study thus provides a general computational analysis of the sequential interaction of short-term plasticity with neuronal firing.[...] Read more.
In order to achieve the integrated optimization in developing the big network system, this paper presented the concepts and principles of layered design method and collaborative development using of different tools firstly. Then we gave a recommended layered architecture for the distributed computing network system and also analyzed its pros and cons. At last, we extended the distributed computing network system to an information server cluster based on the task scheduling of dynamic and self-adaptive algorithm. The application of real-time information system designed by layered architecture shows that the method proposed in this paper is practical and efficient.[...] Read more.
A square root based spherical simplex unscented transform was adopted in micro satellite attitude determination filter. The filter computation cost was reduced evidently by means of spherical simplex unscented transformation (SSUT) and the square root technique with modified Rodrigues parameters (MRPs). The filter performance and numerical stability were guaranteed by unscented transformation with positive-semi definiteness of the state covariance propagation. The simulation results of some micro-satellite showed that this algorithm could insure accuracy, fast convergence and high robustness with high computation efficiency, which was suitable for the attitude estimation of micro-satellite.[...] Read more.
The interference constraints of genetic spectrum assignment model in cognitive radio networks are analyzed in this paper. An improved genetic spectrum assignment model is proposed. The population of genetic algorithm is divided into two sets, the feasible spectrum assignment strategies and the randomly updated spectrum assignment strategies. The penalty function is added to the utility function to achieve the spectrum assignment strategy that satisfies the interference constraints and has better fitness. The proposed method is applicable in both the genetic spectrum assignment model and the quantum genetic spectrum assignment mode. It can ensure the randomness of partial chromosomes in the population to some extent, and reduce the computational complexity caused by the constraints-free procedure after the update of population. Simulation results show that the proposed method can achieve better performance than the conventional genetic spectrum assignment model and quantum genetic spectrum assignment model.[...] Read more.
Using Service-Oriented Architecture (SOA) to build an information system is a hot topic at present. The primary goal of this paper is to investigate how to build a SOA-based information system in a special industry-the field of emergency vehicles in environment protection industry. The paper provides a presentation of current compositions of the emergency vehicles information system and then gives out the system structure. The paper proceeds with the business process flow and working principle of an emergency vehicle information system. A service-oriented architecture framework for emergency vehicles information system is proposed.[...] Read more.
Privacy preservation is an important challenge for wireless health monitoring system. This paper analyses the privacy threat types based on the wireless health monitoring system architecture, and built the key system model for identity threat and context privacy preservation based on traffic analysis threat. To resist these threat , the integrated message encryption, identity authentication and traffic context privacy preservation, based on identity-based cryptography(IBC) and identity-based signature(IBS), is carried out at one time during the process of sending, receiving and accessing the patients’ health information. Extensive analysis demonstrates the effectiveness of the proposed scheme.[...] Read more.