The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Through the continuous collection and in-depth analysis of the quality monitoring data of colleges and universities, we combine the efficiency processing of big data and data evaluation, monitor the status of higher education normally, and construct a higher education quality monitoring and evaluation platform based on Spark. This platform is teaching centered with schools as its basis, including...
Telecommunications fraud, a new type of crime, is showing a rising trend in recent years. However, research from data mining perspectives to detect such frauds is scarce, especially with the behavioral sequences considered. Though the call detail records (CDRs) in telecommunication is generally a snapshot, the history of a caller/callee can be treated as sequences. Indeed, the historical calling sequences...
The accurate extraction of roads is a prerequisite for the automatic extraction of other road features. This letter describes a method for detecting road boundaries from mobile laser scanning (MLS) point clouds in an urban environment. The key idea of our method is directly constructing a saliency map on 3-D unorganized point clouds to extract road boundaries. The method consists of four major steps,...
The mobility and unlimitedness of data streams make the traditional frequent itemsets mining algorithm no longer applicable. In this paper, according to the characteristics of data streams, we propose a novel algorithm MFIBA(Mining Frequent Itemsets based on Bitwise AND) based on bitwise AND operation for mining frequent itemsets. This algorithm updates the sliding window with basic window, and maintains...
With the wide use of web services over the world, an effective and efficient search engine becomes necessary. In this paper, we analyzed the limitation of search method using traditional UDDI, and make it in IR-style and take advantage of approximate string matching. Motivated by the feature of WSDL files which define the interfaces of web services, we make operations defined in WSDL files which compose...
The traditional distributed individual rekeying protocols are inefficient and have high rekeying cost, while batch rekeying protocols are vulnerable to collusions attack. Aiming at those drawbacks, three algorithms are presented: 1) MST algorithm, which is used to merge two subtrees; 2) CARR algorithm, which is resistant to collusions attack, and can avoid a renewed node to be rekeyed more than once;...
Extracting instances of a given target relation from a given Web page corpus seems to be the basic work to exploit nearly endless source of knowledge which provided by the World Wide Web. Supervised learning requires a large amount of labeled data, but the data labeling process can be expensive and time consuming. In this paper we present a kernel-based weakly supervised machine learning algorithm...
We present a hierarchical structure or multi-scales infectious diseases analysis based on meta-population model with heterogenous connectivity and mobility patterns, and study the effect of multi-scales hierarchical connectivity pattern of complex social network on the propagation dynamics of epidemics. The simulation results show that the scale of growth time of outbreaks is inversely proportional...
Desired islanding detection method not only can detect islanding within acceptable duration, but also require it has less adverse impact on power quality. This paper presents an active islanding detection method for a distributed resource (DG) unit which is coupled to a utility grid through grid-connected converter. With the proposed method which is based on adding periodical disturbing current through...
A parse tree contains rich syntactic structured information, and the structured features have been proved effective in relation extraction. In this paper, we proposed another way to efficiently utilize structured features but in a weakly learning way. Co-training algorithm was chosen by us, the structured features were set to be one view of it, and the flat features were set to be the other. Through...
After developing an outer model of the famous-brand product vitality, this paper presents the concept and calculation formula of the famous-brand product vitality index, the concept of customer elasticity on the basis of Product Famous-brand Vitality Index. The paper also takes Haier's product as an example to calculate out its famous-brand vitality index, the customer elasticity index at customer's...
Bandwidth efficiency is a critical concern in wireless communications. To fully utilize the available bandwidth, this paper adopts the superimposed training (ST) scheme in orthogonal frequency division multiplexing (OFDM) systems without using cyclic prefix (CP) and guard interval (GI). If the pilot pattern is fixed, it is shown that the performance of the channel estimation using the ST scheme is...
CPU scheduler is a very important subsystem which affects system throughput, interactivity and fairness. The development of Linux kernel is relatively fast-paced. By now, many CPU schedulers have been designed by researchers, hobbyists and kernel hackers. It is necessary to accurately compare and analyze different characteristics among these schedulers, so as to understand and design better CPU schedulers...
The nondestructive optical coherence tomography measurement can show the shell-nucleus features, quantify the nacre thickness and thus has the potential to identify or grade the pearls [1]. However, the automated thickness measurement of nacreous layer based on OCT has not been reported. In this article, an automated approach is first time proposed to measure the thickness of nacreous layer using...
This paper presents a hybrid approach based on the continuum model proposed by Treuille et al.. Compared to the original method, our solution is well suited for complex environment. We first present an environment structure and a corresponding discretization scheme that help us to organize and simulate crowds in large-scale scenarios. Second, additional discomforts around obstacles are auto-generated...
On the inefficient panel adjustment of large reflector antenna, a method for determination of panel adjustment magnitude according to far field pattern is presented. Using the method of Physical Optics (PO), the relationship between the far field value and the node displacement is derived. Then the panel adjustment vector is related to far field pattern with linear equations. Singular value decomposition...
Traditionally, the composition of Web services to create mashups has been achieved by using an application server as a mediator between a client browser and services. To avoid this bottleneck, mashups are sometimes implemented so that Web service composition takes place directly from the end userpsilas browser. Creating such implementations is difficult because developers must manage the separation...
Identification research originally developed in the area of social psychology and organizational behavior, was here introduced into B2C service context. Using a sample of China's retailing bank consumers (N=439), the authors tested a model in which company-level and employee-level antecedents affect customer-company identification via customer value and customer satisfaction. Overall, each antecedent...
Contemporary face recognition algorithms rely on precise localization of keypoints (corner of eye, nose etc.). Unfortunately, finding keypoints reliably and accurately remains a hard problem. In this paper we pose two questions. First, is it possible to exploit the gallery image in order to find keypoints in the probe image? For instance, consider finding the left eye in the probe image. Rather than...
In order to obtain good performance for inverters and to solve the problem of time delay in digital control, a novel dual-loop control based on state observer with repetitive compensation is proposed. Dual-loop control for PWM inverter can achieve fast dynamic response and inhibit nonlinear load disturbances while observer can solve the problem of duty-cycle regulation caused by sampling and computing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.