The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Regression trees are extended to be learnt from data with epistemic uncertainty. Modelling uncertainty with belief functions, the attribute selection strategy based on error interval is discussed and a complete tree construction procedure is proposed. As a general approach, error intervals weighted by mass functions are calculated for making the best splitting choice. Including classical regression...
In today's technology industry where machine learning has become essential, the effectiveness of algorithms ultimately depends on a robust data pipeline, and fast model prototyping and tuning require easy feature discovery and consumption. Careful management of ETL processes and their produced datasets is key to both model development in the research stage and model execution in the production environment...
The continuous increase of spatial data volumes available from many sources raises new challenges for their effective understanding. Spatial knowledge discovery in spatial data repositories involves processes and activities that are heterogeneous, collaborative, and distributed in nature. The Grid is a profitable infrastructure that can be effectively exploited for handling distributed spatial data...
The mining of workflow process aims at finding valuable objective information from log data. It leads useful implications for new business processes and analysis. Unfortunately most of business process data is incomplete and noisy which brings deficiencies for describing and mining workflow. The existing algorithms ignore time-based parameters, which is important for processing the incomplete workflow...
This paper made a short review of Cloud Computing and Big Data, and discussed the portability of general data mining algorithms to Cloud Computing platform. It revealed the Cloud Computing platform based on Map-Reduce cannot solve all the Big Data and data mining problems. Transplanting the general data mining algorithms to the real-time Cloud Computing platform will be one of the research focuses...
Data mining is a key in knowledge discovery process. In recent years, its application is becoming a fast growing field, and more and more software products are developed based on different application background. In this paper, we make a survey of data mining tools used for real projects, evaluate their impact factors with a new definition and reveal that open source softwares are becoming more widely...
In this paper, the author attempted to study on the land use of Changping District (2005 and 2008) with spatial data mining through geo-statistics method, and explored new method for land use spatial data mining. The land use data (2005 and 2008) were divided into 1km×1km, 2km×2km, 4km×4km grid cells respectively. And use spatial autocorrelation to analysis the land use structure and its changes in...
The purpose of this paper was to find some feature pattern which may be used in diagnosis of blood stasis syndrome (BSS, a unique concept of traditional Chinese medicine) with myocardial ischemia. After establishing an animal model of Chinese experimental miniature swine, 7 indicators in plasma, e.g. troponin T (cTNT), heat shock protein 27 (HSP27), cytochrome C (Cyt C), endothelin-1 (ET-1), calcitonin...
With trust degree set to be the foundation of component service selection in composite service, the execution and selection of composite services could be carried out more effectively based on the trust degree of service; It is favorable for those component services with higher trust degree to join into the process of service composition, thus, enhances the trustiness of composite service. Through...
This paper introduces an improved evolutionary algorithm based on the imperialist competitive algorithm. The original approach in the imperialist competitive algorithm has difficulty in implement practically with the increase of the dimension of the search spaces, as the ambiguous definition of the ??random angle?? in the process of optimization. Compare to the original algorithm, the proposed approach...
Coronary heart disease is now a severe burden on society and family in both industrialized and developing countries, but the traditional related factors can not explain the whole situations. The effect of treatment is very limited. Determination of treatment based on the symptoms and signs in Traditional Chinese Medicine (TCM) have certain curative effect. But the objective of the syndrome diagnose...
Partially blind signature, which allows a signer to sign a partially blind message including pre-agreed information, is a variant of blind signature. In 2007 Hu et al presented an efficient ID-based partially blind signature scheme that was believed as a secure one. In 2008, Tseng et al shows that Hu et al's scheme could suffer from serious forgery attack, but they didn't propose the corresponding...
Secret sharing is an important information security issue in many applications. We propose a novel general secret sharing scheme based on the modified Weil pairing function and two hard assumptions (computational Weil Diffie-Hellman assumption and elliptic curve discrete logarithmic assumption). The new scheme can present from adversaries' attacks. Since the secret shadows are chosen by the participants...
Classification of network vulnerability is critical to detection and risk analysis of network vulnerability. A broad range of classification methods have been proposed in literature. This paper reviews a total of 25 selected approaches and identifies the differences and relations among them. It also points out some open issues for research in this field.
Utilizing the complexity and good pseudorandom property of the spatiotemporal chaotic system, a novel image encryption algorithm is proposed. The plain-image block data is masked by the values extracted from the spatiotemporal chaotic system. Then the masked data is shuffled according to the maximum state value in the system. A cipher block chaining (CBC) mode is employed to adjust the state value...
Unstable angina (UA) is now a severe burden on society and family in both industrialized and developing countries, but the traditional related factors can not explain the whole situations. The effect of treatment is very limited. Determination of treatment based on the symptoms and signs in Traditional Chinese Medicine (TCM) have certain curative effect. But the objective of the syndrome diagnose...
There exit many problems in current industrial design teaching and learning for Chinese higher education. The aims and objectives of our research are to provide personalized training scheme for students through improving current curriculum. For the aim, the questionnaires are made to get information about design innovation and design innovative personal. Through data mining and PCA (principle component...
Peer-to-Peer (P2P) file sharing is an important Internet application. Among lots of P2P systems, BitTorrent is the most efficient P2P collaborative file sharing protocol and the de facto standard of this kind of system. However, BitTorrent protocol requires publishing the Torrent file by Web and allocating neighbors by a dedicated tracker. These requirements hinder the usage of this protocol. In this...
Although the conventional performance indexes, such as accuracy, are commonly used in classifier selection or evaluation, information-based criteria, such as mutual information, are becoming popular in feature/model selections. In this work, we analyze the classifier learning model with the maximization normalized mutual information (NI) criterion, which is novel and well defined in a compact range...
With trust degree set to be the foundation of component service selection in composite service, the execution and selection of composite services could be carried out more effectively based on the trust degree of service; It is favorable for those component services with higher trust degree to join into the process of service composition, thus, enhances the trustiness of composite service. Through...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.