Entity

Time filter

Source Type

Banja Luka, Bosnia and Herzegovina

Li C.S.,University for Business Studies
Procedia Engineering | Year: 2011

This paper defines nearest neighbor pair and puts forward four assumptions about nearest neighbor pairs, based on which a center initialization method for K-means algorithm over data sets with two clusters is build. Experiments on real data sets show that the proposed method is not preferable but at least comparable to the ones in literatures. The contribution of the proposed method is to open up a new approach to devising center initialization method for K-means algorithm. © 2011 Published by Elsevier Ltd. Source


Yuan J.-J.,University for Business Studies
Jisuanji Jicheng Zhizao Xitong/Computer Integrated Manufacturing Systems, CIMS | Year: 2012

Aiming at the complexity of rational balance between product family's commonality and difference without transcendental information, a multi-objective constraints optimization model of scale-based product family with commonality maximization and average performance lose minimization was proposed under multi-platform design of scale-based product family. Based on the ideas of non-dominated sort and crowding distance sort, the compare operation and the update operation of traditional firefly brightness were improved, and a modified firefly algorithm adapt to solve multi-objective constraint optimization problem was presented. To solve the optimization model of scale-based product family, a expression pattern of two-layer artificial firefly structure with common variable ability was constructed. A simulation study on optimization design of motor product family was provided to evaluate the effectiveness of proposed model and algorithm. Source


Liu Y.,University for Business Studies
Mathematical Methods in the Applied Sciences | Year: 2013

Results on the existence of solutions of a periodic-type boundary value problem of singular multi-term fractional differential equations with the nonlinearity depending on D0+αx are established and being singular at t = 0 and t = 1. The analysis relies on the well-known fixed-point theorems. An example is given to illustrate the efficiency of the main theorems. Copyright © 2013 John Wiley & Sons, Ltd. Source


Liu Y.,University for Business Studies
UPB Scientific Bulletin, Series A: Applied Mathematics and Physics | Year: 2011

In this article, we establish the existence of at least three positive solutions to a boundary-value problem of the nonlinear singular fractional differential equation. Our analysis rely on the well known fixed point theorem in the cone. Source


Deng Y.,University for Business Studies
Advanced Materials Research | Year: 2011

Digital signature schemes allow a signer to transform any message into a signed message, such that anyone can verify the validity of the signed message using the signer's public key, but only the signer can generate signed messages. A proxy re-signature, which is a type of digital signatures, has significant applications in many areas. Proxy signature scheme was first introduced by Blaze, Bleumer, and Strauss, but that scheme is inefficient and with limited features. After that, some Proxy re-signature schemes were proposed by researchers. This paper constructs a blind proxy re-signatures scheme. Comparing to the previous proxy re-signature schemes, the scheme adds a message blinded feature, and then the security of the scheme is proven. Source

Discover hidden collaborations