• Publications
  • Influence
Inver-over Operator for the TSP
TLDR
In this paper we investigate the usefulness of a new operator, inver-over, for an evolutionary algorithm for the TSP. Expand
  • 195
  • 17
  • PDF
Simulated recovery of information in shadow areas on IKONOS image by combing ALS data
Retrieval of image density information of shadow areas in IKONOS imageries is investigated to recover image quality degradation due to shadow by combining IKONOS image with Airborne Laser ScannerExpand
  • 31
  • 2
  • PDF
Stability of finite difference numerical simulations of acoustic logging-while-drilling with different perfectly matched layer schemes
In acoustic logging-while-drilling (ALWD) finite difference in time domain (FDTD) simulations, large drill collar occupies, most of the fluid-filled borehole and divides the borehole fluid into twoExpand
  • 21
  • 2
  • PDF
Wavefield simulation and data-acquisition-scheme analysis for LWD acoustic tools in very slow formations
Propagating wavefields from monopole, dipole, and quadrupole acoustic logging-while-drilling (LWD) tools in very slow formations have been studied using the discrete wavenumber integration method.Expand
  • 25
  • 2
Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree
TLDR
This paper puts forward an improved code plagiarism detection algorithm based on abstract syntax tree, which is proved effective on detecting if-statement plagiarisms. Expand
  • 12
  • 1
Principle of and Protection of Man-in-the-middle Attack Based on ARP Spoofing
  • Guo Hao, G. Tao
  • Computer Science
  • J. Inf. Process. Syst.
  • 30 September 2009
TLDR
This paper describes a method of man-in-the-middle attack based on ARP spoofing, and proposes some precautionary measures for preventing such attacks. Expand
  • 6
  • 1
  • PDF
Amoxapine-Induced Tardive Dyskinesia
A case report of amoxapine-induced tardive dyskinesia following discontinuation of amoxapine therapy is reported. During 68 weeks of therapy, the patient received a maximum of amoxapine 400 mg/d. SixExpand
  • 8
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications
Cryptographic misuse affects a sizeable portion of Android applications. However, there is only an empirical study that has been made about this problem. In this paper, we perform a systematicExpand
  • 9
A New Type of Neural Network For Reservoir Identification Using Geophysical Well Logs
TLDR
We have developed a neural network algorithm of radial basis network (RBN) type for geoscience applications. Expand
  • 5
Based on Single-Chip Microcomputer Temperature and Humidity Data Acquisition System Design
In the actural production of life in many cases are to consider the influence of temperature and humidity environment and precise control, Then came the data acquisition system. Because the CAN busExpand
  • 5
  • PDF