16 articles in this issue
Hao Chen,Qinghe Du,Pinyi Ren
Cognitive radio has recently emerged as a promising technology to improve the utilization efficiency of the radio spectrum. In cognitive radio networks, secondary users (SUs) must avoid causing any harmful interference to primary users (PUs) and transpare... see more
Morteza Damanafshan,Ehsan Khosrowshahi-Asl,Maghsoud Abbaspour
Computing least-cost multicast routing tree while satisfying QoS constraints has become a key issue especially by growing communication networks. To solve this problem, a triplex algorithm called GASANT which is based on Ant Colony Optimization (ACO), Gen... see more
Zeliu Ding,Deke Guo,Xueshan Luo,Xi Chen
Data centers are created as distributed information systems for massive data storage and processing. The structure of a data center determines the way that its inner servers, links and switches are interconnected. Several hierarchical structures have been... see more
Daji Ergu,Gang Kou,Yi Peng,Feixiong Li,Yong Shi
Timely response is extremely important in emergency management. However, cardinal inconsistent data may exist in a judgment matrix because of the limited expertise, preference conflict as well as the complexity nature of the decision problems. The existin... see more
Yin Feng,Wang Yao-nan,Yang Yi-min
Neural networks with their inherent learning ability have been widely applied to solve the robot manipulator inverse kinematics problems. However, there are still two open problems: (1) without knowing inverse kinematic expressions, these solutions have t... see more
Junhui Hou,Shuai Wan
In this paper, a two-dimensional (2D) rate model is proposed considering the joint impact of spatial (i.e., the frame size) and SNR (i.e., the quantization step) resolutions on the overall rate-distortion performance. A related 2D quality model is then pr... see more
Jungkyu Lee,Jihoon Yang
This paper presents a fast and scalable re-routing algorithm that adapts to dynamically changing networks. The proposed algorithm, DGA, integrates Dijkstra’s shortest path algorithm with the genetic algorithm. Dijkstra’s algorithm is used to define the pr... see more
Naiqian Li,Xinhui Yao,Dongpin Tian
Sequential pattern mining is an important data mining problem that can extract frequent subsequences from sequences. However, the times between successive items in a sequence is typically used as user-specified constraints to pre-process the input data or... see more
Ting Liu,Zhiwen Wang,Haijun Wang,Ke Lu
Intrusion Detection System (IDS) typically generates a huge number of alerts with high false rate, especially in the large scale network, which result in a huge challenge on the efficiency and accuracy of the network attack detection. In this paper, an en... see more
ThanhQuyen Ngo,M. Hung Nguyen,YaoNan Wang,Ji Ge,ShuNing Wei,T. Long Mai
In this paper, adaptive iterative learning control (AILC) of uncertain robot manipulators in task space is considered for trajectory tracking in an iterative operation mode. The control scheme incluces a PD controller with a gain switching technique plus ... see more
Arthanari Rajendran,Raghavan Dhanasekaran
Deformable or snake models are extensively used for medical image segmentation, particularly to locate tumor boundaries in brain tumor MRI images. Problems associated with initialization and poor convergence to boundary concavities, however, has limited t... see more
Vesna Rankovic,Jasna Radulovic,Nenad Grujovic,Dejan Divac
In this paper the synthesis of the predictive controller for control of the nonlinear object is considered. It is supposed that the object model is not known. The method is based on a digital recurrent network (DRN) model of the system to be controlled, w... see more
Toshiyuki Satoh,Kotaro Kaneko,Naoki Saito
A practical approach for improving tracking performance of the predictive functional control (PFC) is proposed. The disturbance observer is utilized to nominalize the actual plant and to reduce the predicted output error in the PFC algorithm by canceling ... see more
Honglei Su,Fuzheng Yang,Jiarun Song
To realize real-time and non-intrusive quality monitoring for networked video, a content-adaptive packet-layer model for quality assessment is proposed. Considering the fact that the coding distortion of a video is dependent not only on the bit-rate but a... see more
Mourad Talbi,Anis Ben Aicha,Lotfi Salhi,Adnene Cherif
We consider the problem of speech denoising using source separation. In this study we have proposed a hybrid technique that consists in applying in the first step, the Bionic Wavelet Transform (BWT) to two different mixtures of the same speech signal with... see more