The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In order to solve the problems of traditional machine learning methods for automatic classification of vulnerability, this paper presents a novel machine learning method based on LDA model and SVM. Firstly, word location information is introduced into LDA model called WL-LDA (Weighted Location LDA), which could acquire better effect through generating vector space on themes other than on words. Secondly,...
Access is a useful and necessary course in college teaching. In this paper, we propose an example running through Access teaching instruction, all the teaching objects have relationships, which is easy to understand for the students, and a simple project will be implemented after the course, which will arise the students interest.
The number of digital photos in the personal computer is exploding. Existing photo annotation and management systems suffer from some problems (some among them are quite serious), which discussed at the beginning of the full paper. Aiming at these problems, this paper proposed a solution based on ontology. First of all, the Family Album ontology is built to organize the domain knowledge and provide...
Frequent itemset mining is a very important problem in data mining. Closed frequent itemsets is the condensed representation of frequent itemsets thus spend less memory, so it is much suitable for stream mining. But on the other hand, when the minimum support is much lower, the size of closed frequent itemsets turns larger, which makes the performance reduced a lot. In this paper, we introduce a threshold...
Most traditional mining approaches of frequent item sets consider mainly on databases and thus can use the second storage and need multiple scans which are not adapted to mining of stream. Some new algorithms over stream's sliding window are presented recently, which perform addition and deletion over stream independently, so the common deleting strategy which removes the earliest transaction is used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.