The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Sparse subspace learning has been demonstrated to be effective in data mining and machine learning. In this paper, we cast the unsupervised feature selection scenario as a matrix factorization problem from the view of sparse subspace learning. By minimizing the reconstruction residual, the learned feature weight matrix with the l2,1-norm and the non-negative constraints not only removes the irrelevant...
In this study, we aimed to establish a platinum-based chemotherapy response and toxicity prediction model in advanced non-small cell lung cancer (NSCLC) patients. 416 single nucleotide polymorphisms (SNPs) in 185 genes were genotyped, and their association with drug response and toxicity were estimated using logistic regression. Nine data mining techniques were employed to establish the prediction...
Privacy protection based on association rules aim is to find a data set of the original approach, making the mining of sensitive rules is to implement a data mining process is not to be found. To efficiently achieve privacy protection, this article combine the PPARM algorithm and IMBA algorithm, through the operation of sensitive items to do less, it will hidden sensitive rules more greater degree...
Handover prediction has been considered an effective technology for improvement of LTE Handover performance. Although not a few techniques have been proposed to achieve this goal including handover preparation based on cross-layer optimization and mobility prediction, the fact is that their gains are not usually so high as their cost. To overcome such weaknesses, this paper proposes a simple handover...
P2P systems can be used to form a low latency decentralized data delivery system. Structured P2P systems provide both low latency and excellent load balance with uniform query and data distributions, however, in the real application environment, requests distributions are often skewed and follow a Zipf law, some objects will become hotspots, individual nodes are easily overloaded, resulting in poor...
In this paper, a new method for detecting shot boundaries in video sequences using box-counting to extract texture feature and judging the shot boundaries by an improve method to get a dynamic threshold is proposed. Many techniques have been developed to detect the video shot boundaries. But automatic shot boundary detection is difficult. In particular, gradual transitions are generally more difficult...
Bamboo is one structured P2P overlay, that likes others (e.g. Chord, Kademlia, Pastry), organizes peers into a flat overlay network and offers distributed hash table (DHT) functionality. It is very promising for its efficient routing performance. However, one disadvantage impeding the DHT algorithm popularity is the routing information maintenance overhead; it generates considerable network traffic...
Reduction of operational efforts and complexity are key drivers for RAN Long Term Evolution. It is also of interest to minimise operational effort by introducing self-configuring and self-optimising mechanisms. A self-optimising function shall increase network performance and quality reacting to dynamic processes in the network. To improve the efficiency and performance of the E-UTRAN system, an efficiency...
Both SIP and various peer-to-peer protocols have been widely deployed, there is little operational experience with SIP using overlay networks. Also, some researches have proposed to leverage peer-to-peer computing to control multimedia sessions in a decentralized manner (P2PSIP) [1]. However, most proposals in research only focused on the design of P2PSIP protocols using one specific DHT overlay....
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
The embryo and endosperm of corn seed were analyzed by FTIR spectroscopy. This paper investigated the change of embryo and endosperm under the action of microcystins (MC). The characteristic absorption peaks of embryo and endosperm were confirmed and analyzed on spectrum. The experimental evidence had shown that the ratio (I1743:1648) diminished, with the concentration of MC increased. In conclusion,...
In shot boundary detection, the key technology is to compute the visual content discontinuity values between consecutive video frames. In this paper, a unified framework is proposed to detect the shot boundaries and extract the keyframes of a shot. Firstly, the scale invariant feature transform (SIFT) is adopted to compute the visual content discontinuity values. Then a new method, which is called...
NAT (network address translation) are widely used to isolate the private networks from internet. Unfortunately, NATs block the data transmitted directly between two nodes under different private networks in many peer-to-peer applications. A protocol, STUN (simple traversal of UDP over NATs), has been proposed by IETF to solve the problem, but it costs great network bandwidth and transmission delays...
The critical issue that confronts peer-to-peer networks is the efficient location of the node that stores a desired data item. Chord is a successful resource location protocol based on distributed hash table. However, if the desired data item is stored on a node that is count-clockwise close to the query node on the chord ring, the lookup latency might be high because of its clockwise lookup strategy...
A new algorithm for Web GIS fault location in distribution network is presented by using the trouble calling information in this paper. Through deeply study of rough set theory, the algorithm is considered the topology characteristics of the distribution network which have the large-scale and multi-line equipment. Based on the methods of identification matrix attribute reduction and improved value...
Video data compression is one the core technologies of video conference, which aims to enable significantly high performance data coding. In order to achieve this, a robust rate-distortion optimization (RDO) technique is needed to be employed to select the best coding mode This paper presents optimization solution about inter prediction mode decision algorithm of H.264/AVC for video conference under...
FlexRay [9] is an automotive standard for high-speed and reliable communication that is being widely deployed for next generation cars. The protocol has powerful error-detection mechanisms, but its error-management scheme forces a corrupted frame to be dropped without any notification to the transmitter. In this paper, we analyze the feasibility of and propose an optimization approach for an application-level...
A transformer is one of the most important units in power networks and its fault diagnosis is quite significant. Rough set theory is a relatively new soft computing tool to deal with vagueness and uncertainty. It has received much attention of the researchers around the world. Rough set theory has been successfully applied to many areas including pattern recognition, machine learning, decision support,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.