In wireless ad hoc networks environment, Bellovin and Merritt first developed a password-based Encrypted Key Exchange (EKE) protocol against offline dictionary attacks using both ...
Combining with the characteristics of equestrian sports and the psycho diagnosis technology and using the tools such as Visual Basic, Photoshop, Microsoft Access, Psychodiagnosis ...
Neural decoding is an important task for understanding how the biological nervous system performs computation and communication. This paper introduces a novel continuous neural de...
In spatial clustering, the scale of spatial data is usually very large. Spatial clustering algorithms need high performance, good scalability, and are able to deal with noise and ...
The driving forces of China's Economic Growth are investigated in this paper based on the 1997 2002 and 2007 input-output data and the following conclusions are gotten: (1) T...
This paper's research is based on the model of BDI Agent, carries out the research of the modeling and simulating the Virtual Enterprise's partner selection using Swarm ...
Because the characteristic of wavelet transform is multi-resolution, their unique advantage of the data model is multi-scale analysis. Then, it's widely used the Wavelet-base...
Information fused by multi-sensors is an important factor for obtaining reliable contextual information in smart spaces which use the pervasive and ubiquitous computing techniques...
Hyun Lee, Byoungyong Lee, Kyungseo Park, Ramez Elm...
Granular Computing (GrC), a knowledge-oriented computing which covers the theory of fuzzy information granularity, rough set theory, the theory of quotient space and interval comp...
Electric power generation requires a great deal of production equipment, such as steam turbines, boilers, etc., how to insure the well-run condition of such equipment is the key f...