The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Fisher linear discriminant analysis (LDA) involves within-class and between-class covariance matrices. For 2-D data such as images, regularized LDA (RLDA) can improve LDA due to the regularized eigenvalues of the estimated within-class matrix. However, it fails to consider the eigenvectors and the estimated between-class matrix. To improve these two matrices simultaneously, we propose in this paper...
On the basis of the interaction law of IT resources and IT application capabilities, using collaborative theory point of view, IT resources and IT application capabilities coupling measure model is established, which involves the active function, coupling degree functions, coupled coordination function and IT resources and IT ability coupling evaluation index system. According to the model, combined...
In cloud computing, complex data analysis usually requires accessing multiple data sets. Existing MapReduce-based multi-join mechanism implements the join of multiple data sets by cascade method, which is flexible but poor efficiency. The paper analyzes existing concurrent join models and proposes a Two-Dimension Reducer matrix based Hierarchized Multi-Join model (TD-HMJ). TD-HMJ handles all the "key"...
Tomography imaging, applied to seismology, requires a new, decentralized approach if high resolution calculations are to be performed in a sensor network configuration. The real-time data retrieval from a network of large-amount wireless seismic nodes to a central server is virtually impossible due to the sheer data amount and resource limitations. In this paper, we presenta distributed multi-resolution...
In this paper, a family of exponential integrators of Runge-Kutta type are formulated for initial value problems of systems of ordinary differential equations with asymptotically stable equilibria. A convenient approach to constructing new exponential RK methods on the base of traditional Runge-Kutta methods is presented. The exponential RK methods are zero-dispersive and zero-dissipative, and are...
The process of transformer fault diagnosis and the theory of DFTA are first presented in this paper and then we apply DFTA to the field of transformer faults diagnosis. By establishing the fault tree of transformer, a practical, easily-extended, interactive and self-learning enabled fault diagnosis system based on DFTA for transformer is designed and implemented. With the implementation and application...
A shared MapReduce cluster is beneficial to build data warehouse which can be used by multiple users. FAIR scheduler gives each user the illusion of owning a private cluster. Moreover, it can dynamic redistribute capacity unused by some users to other users. However, when reassigning the slots, FAIR picks the most recently launched tasks to kill without considering the job character and data locality,...
The network dynamic evaluation is in the proven prescription legal science has truthfully given the trusted degree of the network from the real network to the simulation experiment evaluation concrete model and the realization process. The network modelling process uses the extraction real network data, establishes the simulation environment, under the simulation environment destructive collapse test...
Information security course for undergraduate students is a growing activity in many universities and colleges. One of the primary questions that all instructors face is how to draw student into active learning process. In this paper, we share our experiences on the practice of interactive teaching in an information security course. The three major methods, seminar-style teaching in classroom, topic...
In the instructional process of information technology curriculum, adopting a reasonable way to construct teaching situation and providing space of independent exploring to the learners are the keys to the success of instruction and are also important methods to improving the accumulation of their information literacy. This paper analyses the creating strategies and the practical effects according...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.