The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the rising popularity of smartphones and the rapid growth of mobile applications, understanding the app usage behavior of mobile users is of growing importance for both app designers and service providers. Different from previous studies mining the correlation between apps and physical world factors, e.g. location, time, etc., in this paper we focus on the interdependency among apps and try to...
Association rules model is widely used in data mining and the apriori is the most famous association rule mining algorithm. Based on the classic Apriori association rules algorithm, this paper gives the UML class design diagram based on the agile design principles and selects the popular OOP language Java to achieve. In practical applications, it can be used in a variety of data application.
We offer a logic of probability entailment with threshold-surety approach to a probabilistic logic, which treats a finite set of premises in a knowledge base as assertions that are true with probability at least some primary threshold, and consider as consequences those assertions probabilistically entailed to have probability at least some suitable threshold. We use the concept of fuzzy c-partition...
In this paper, theories of Chi-square test of multinomial distribution and contingency table analysis, and their applications in customer satisfaction are introduced, and empirical analyses are carried out.
Timer in communication supporting system guarantees the reliable and high-efficient operation of communication. On the basis of the analysis of the regular algorithms, a new algorithm is proposed. The multi-doubly linked lists and label nodes resolve the defects of regular algorithms and enhance the efficiency of sorting. Results of the test demonstrate that the new algorithm enables the timer to...
Feature select ion is an important problem in the fields of machine learning and pat tern recognition. Data stream data classification with high dimensional and sparse, and the dimension of the need for compression, feature selection methods suitable for data stream classification study of very value of this area is currently a lack of in-depth study. This paper summarizes the current data flow classification...
Large vocabulary continuous speech recognition system performance largely depends on the quality of speech corpus and how to select corpus is the key of corpus design. By taking Tibetan Amdo dialect in XiaHe as the research object, this paper builds continuous speech corpus based on triphone. At first, we collect text corpus with 100 thousand sentences and transform them to IPA according to pronunciation...
In order to collocate materials more effectively in industrial design, a method that based on VAS as part of Kansei Engineering, is proposed in this paper to study the users' perceptual degree toward different material collocating. Vacuum Cup is used as an example to elaborate the process and methods of this research. The results show that the collocating of materials can lead to significant differences...
Support Vector Machine (SVM) is based on statistical learning theory which developed from the common machine learning. It is an effective tool to deal with limited samples. This paper proposes a model of the dissolved gas analysis (DGA) of transformer based on Multi-class SVM. Firstly, with the combination of SVM multi-class classification methods one-versus-rest (1-v-r) and one-versus-one (1-v-1),...
The auto-compensation and harmonic shielding converter transformer, namely the new converter transformer, adopts the prolonged delta wiring in the secondary winding, and there is a tap between the common winding and the prolonged winding, which is connected with the inductive filters. Compared with the traditional converter transformer, the electrical connection in the new converter transformer is...
The leakage loss is very important to the economics of steam turbine. But in the practical operation process, the radial clearance often is enlarged in steam turbine flow passage. Aimed at this phenomenon, the influences of clearance leakage on the relative internal efficiency and the power of steam turbine are studied in this paper. The results show that, not only in the impulse stage, but also in...
Selective per antenna rate control (S-PARC) technique has been decided to be deployed in time division-synchronous code division multiple access (TD-SCDMA) high speed packet access plus (HSPA+) system. In this paper, we propose an enhanced data stream selection algorithm for the proposal of S-PARC to improve Node B average throughput and initial block error rate (BLER) by pre-processing signal to...
A verification method based on memory monitoring is proposed for harmonizing the execution of RTL simulator and system-level model (SLM) simulator, in the situation that the SLM is a `black-box' to the designers. This method can quickly and efficiently find the differences of big benchmarks' executing process between the RTL simulation and SLM simulation, and help the verification engineers rapidly...
In this paper, a new derivation of the polar format algorithm (PFA) for spotlight synthetic aperture radar (SAR) imaging is presented, which is useful when investigating its response to the moving target. Our derivation starts with examining the mostly adopted implementation of the PFA, i.e., the separable 1-D range and azimuth resampling procedures for their roles in range cell migration (RCM) correction,...
As a wireless sensor, the traffic detection radar (TDR) is recently a new application at civilian areas. The system can provide various types of real-time information about the moving entities day-and-night in all weather conditions. However, the price to realize the accurate information extraction from the echo signals is an efficient mathematic algorithm. In this paper, the date acquisition model...
This paper proposed a load balance k-hop clustering algorithm (LBKC) for ad hoc works. Each node uses criteria to decide whether join the contention of cluster-heads. After k rounds of Floodmax[1], the IDs of cluster members are converged to potential cluster-head nodes of the network. Based on these informations, overloaded cluster-heads balance their loads with selected under-loaded cluster-heads...
China is one of the countries in the world that suffer serious natural disasters. Frequent and serious biological disasters cause great damage to crop production. The plant disease data of multiform could be analyzed and then a forecasting report was made.This article according to characteristic of the plant disease, introduced forecasts system's design and key technologies realization based on data...
Problems on the combination of human with machine and on the development of automatization are analysed. It is concluded that the developmental direction of the human-machine combination is unmanned automatization, and that the human-machine combination in the realization of function is one of the main practical forms in technological researches and engineering applications and also will be one of...
A high-speed image processing system is designed in this paper in order to resolve the problems such as low system integration, slow-speed processing existing in image processing of vehicle-loaded computer. The system realizes functions of image acquisition, memorizing and overlapping by configuring Nios II soft core CPU and function modules such as image preprocessing, processing and display to build...
P2P worm based on loopholes spreading in peer-to-peer network is a serious security threat. According to the characteristics of P2P worms, a signature-behavior-based P2P worm detection approach detecting the known P2P worm based on characteristic string matching is proposed. In addition, this method can also detect unknown P2P worms based on behavior. This method is mainly composed of the technology...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.